Wrote by Wassim B., Cybersecurity Expert SQUAD As illustrated in Figure 2, the proposed anomaly detector monitors VNFs (Section 1), preprocesses the monitored data (Section 2), trains models (Section 3), evaluates models’ performance and detects anomalies. 1) VNF Monitoring VNFs …
Time series modeling carefully collects and studies the past observations expressed as a time series for the purpose of developing an appropriate model which describes the inherent structure of the series. One of the most frequently used stochastic time series …
Wrote by Wassim B., Cybersecurity Expert SQUAD Nowadays, network Functions Virtualization (NFV) [1] and Cloud-native Network Functions (CNFs) offer new ways of designing, scaling and operating networks, as customer-centric services can be elastically scaled and easily orchestrated, not only at …
Wrote by Naoufal E., Cloud Expert Making serverless architectures tied to microservices architectures on the AWS Cloud is a fun job, and it allows us to learn new things every day ! But mostly, we need Abstract Patterns that already …
Written by Nikola BOŽIĆ - TheExpert SQUAD / Lip6, Sorbonne Université During our research on blockchain we have examined several platforms to test our solutions and evaluate the system performances. Hyperledger Fabric, the blockchain platform, offers several options when it …