This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders… (More)
As networks grow in size, heterogeneity, and complexity of applications and network services, an efficient network management system needs to work effectively even in face of incomplete management information , uncertain situations and dynamic changes. We use Bayesian networks to model the network management and consider the probabilis-tic backward… (More)
Bayesian network is a complete model for the variables and their relationships, it can be used to answer probabilistic queries about them. A Bayesian network can thus be considered a mechanism for automatically applying Bayes' theorem to complex problems. In the application of Bayesian networks, most of the work is related to probabilistic inferences. Any… (More)
—Recent years, requirements in network management and control have been amended by emerging network and etc. This paper presents a survey of the evolution of networks and their trends, the challenges of management for emerging networks and services, and the evolution of network management strategies and solutions in network management.
The growing complexity of distributed systems in terms of hardware components, operating system, communication and application software and the huge amount of dependencies among them have caused an increase in demand for distributed management systems. An efficient distributed management system needs to work effectively even in face of incomplete management… (More)
—With the rising popularity of the Internet, the resulting increase in the number of available vulnerable machines, and the elevated sophistication of the malicious code itself, the detection and prevention of unknown malicious codes meet great challenges. Traditional anti-virus scanner employs static features to detect malicious executable codes and is… (More)
Acknowledgements I would like to acknowledge my supervisors, Prof. not have been possible without the financial support from DAAD. Many thanks are due to Mr. Carsten Schippang for intensive discussions in distributed systems management and for providing the sample management data of the campus network of FernUniversität Hagen for the year 2003. I thank Ms.… (More)