Using Cloud Transforming for Big Network Management Procedure
Main Article Content
Abstract
This research is addressed on an overview of a specialized system for the migration/assimilation of a hybrid enterprise network system with the possibility of embedded identification, through a remote encrypted connection to a new cyber ecosystem, without the active process ceasing to function until the first system is finally assimilated into the new one, without being disturbed the balance of its cyber security.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
How to Cite
References
G. O. Young, “Synthetic structure of industrial networks (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New York: McGraw-Hill, 2014, pp. 15–64.
W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 2003, pp. 123–135.
H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 2015, ch. 4.
B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.
E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas Propagat., to be published.