{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T00:31:28Z","timestamp":1778200288894,"version":"3.51.4"},"reference-count":88,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T00:00:00Z","timestamp":1684800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>The theoretical and practical progress that has occurred in the field of computer networks during the past fifteen years has enhanced the economical efficiency and social relevance of related real-world use cases. Nevertheless, this ubiquitous usage has also introduced numerous security risks. Therefore, monitoring hardware and software resources represents one of the main instruments used in order to prevent potential attacks and to ensure the security and reliability of a network. Various solutions have been reported in the related scientific literature. In essence, most of the existing approaches are not suitable to implement a real-time hardware monitoring and management solution, particularly in heterogeneous networks. Therefore, the main contribution of this paper is represented by an architectural and implementational model, which is effective in order to build an interconnected system that can help system and network administrators to secure a network. This requirement is met by considering symmetrical design and implementation features related to various operating systems. Thus, the existing symmetrical relationships among identified parameters allow for the data to be wrapped into the same custom network packages, which are transported over the communication medium or are stored using the same data structures or tables. The system has been thoroughly assessed considering several real-world use case scenarios, and the results demonstrate that the proposed model can be applied to software-defined networks, which can be protected by relevant intrusion detection systems (IDS).<\/jats:p>","DOI":"10.3390\/sym15061134","type":"journal-article","created":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T09:13:50Z","timestamp":1684833230000},"page":"1134","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Real-Time Monitoring and Management of Hardware and Software Resources in Heterogeneous Computer Networks through an Integrated System Architecture"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2922-621X","authenticated-orcid":false,"given":"Constantin Lucian","family":"Aldea","sequence":"first","affiliation":[{"name":"Department of Mathematics and Computer Science, Transilvania University of Brasov, 500091 Brasov, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6577-1904","authenticated-orcid":false,"given":"Razvan","family":"Bocu","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Transilvania University of Brasov, 500091 Brasov, Romania"}]},{"given":"Robert Nicolae","family":"Solca","sequence":"additional","affiliation":[{"name":"Department of Electronics and Computers, Transilvania University of Brasov, 500024 Brasov, Romania"}]}],"member":"1968","published-online":{"date-parts":[[2023,5,23]]},"reference":[{"key":"ref_1","unstructured":"(2023, January 18). Common Vulnerabilities and Exposures (CVE). Available online: https:\/\/cve.mitre.org."},{"key":"ref_2","unstructured":"(2023, January 18). Common Weakness Enumeration (CWE). Available online: https:\/\/cwe.mitre.org."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Yadav, T., and Rao, A.M. (2015, January 10\u201313). Technical aspects of cyber kill chain. Proceedings of the International Symposium on Security in Computing and Communication, Kochi, India.","DOI":"10.1007\/978-3-319-22915-7_40"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1108\/IMCS-07-2013-0053","article-title":"Current challenges in information security risk management","volume":"22","author":"Fenz","year":"2014","journal-title":"Inf. Manag. Comput. Secur."},{"key":"ref_5","unstructured":"Mehnen, J., He, H., Tedeschi, S., and Tapoglou, N. (2017). Cybersecurity for Industry 4.0, Springer International Publishing."},{"key":"ref_6","unstructured":"Manogaran, G., Thota, C., Lopez, D., and Sundarasekar, R. (2017). Cybersecurity for Industry 4.0, Springer International Publishing."},{"key":"ref_7","unstructured":"Wu, Q., Ferebee, D., Lin, Y., and Dasgupta, D. (June, January 30). An integrated cyber security monitoring system using correlation-based techniques. Proceedings of the 2009 IEEE International Conference on System of Systems Engineering (SoSE), Albuquerque, NM, USA."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.comnet.2014.03.007","article-title":"Network monitoring: Present and future","volume":"65","author":"Lee","year":"2014","journal-title":"Comput. Netw."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2026","DOI":"10.1016\/j.future.2013.02.011","article-title":"GMonE: A complete approach to cloud monitoring","volume":"29","author":"Montes","year":"2013","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2093","DOI":"10.1016\/j.comnet.2013.04.001","article-title":"Cloud monitoring: A survey","volume":"57","author":"Aceto","year":"2013","journal-title":"Comput. Netw."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Chang, C.C., Yang, S.R., Yeh, E.H., Lin, P., and Jeng, J.Y. (2017, January 4\u20138). A Kubernetes-Based Monitoring Platform for Dynamic Cloud Resource Provisioning. Proceedings of the GLOBECOM 2017\u20142017 IEEE Global Communications Conference, Singapore.","DOI":"10.1109\/GLOCOM.2017.8254046"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Kshirsagar, D., and Patil, A. (2013, January 4\u20136). Blackhole attack detection and prevention by real time monitoring. Proceedings of the 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode, India.","DOI":"10.1109\/ICCCNT.2013.6726597"},{"key":"ref_13","unstructured":"Gentry, C. (2009). A Fully Homomorphic Encryption Scheme, Stanford University."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Carlucci, G., Cicco, L.D., and Mascolo, S. (2015, January 13\u201317). HTTP over UDP: An Experimental Investigation of QUIC. Proceedings of the 30th Annual ACM Symposium on Applied Computing, Salamanca, Spain.","DOI":"10.1145\/2695664.2695706"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Yan, L., Cao, S., Gong, Y., Han, H., Wei, J., Zhao, Y., and Yang, S. (2019). SatEC: A 5G Satellite Edge Computing Framework Based on Microservice Architecture. Sensors, 19.","DOI":"10.3390\/s19040831"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"de Jesus Martins, R., Dalla-Costa, A.G., Wickboldt, J.A., and Granville, L.Z. (2020, January 2\u20136). SWEETEN: Automated Network Management Provisioning for 5G Microservices-Based Virtual Network Functions. Proceedings of the 2020 16th International Conference on Network and Service Management (CNSM), Izmir, Turkey.","DOI":"10.23919\/CNSM50824.2020.9269063"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/j.jnca.2019.04.019","article-title":"Recent research in cloud radio access network (C-RAN) for 5G cellular systems\u2014A survey","volume":"139","author":"Hossain","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Hsieh, C.Y., Chang, Y.W., Chen, C., and Chen, J.C. (2021, January 25\u201329). Design and implementation of a generic 5G user plane function development framework. Proceedings of the 27th Annual International Conference on Mobile Computing and Networking, New Orleans, LA, USA.","DOI":"10.1145\/3447993.3482867"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Xinjian, O., Jingjing, L., Chaofeng, C., Zilin, Y., Xiang, L., and Shukai, H. (2021, January 13\u201316). Research on 5G Microservices Capability Open Architecture and Deterministic Bearing Technology. Proceedings of the 2021 IEEE 21st International Conference on Communication Technology (ICCT), Tianjin, China.","DOI":"10.1109\/ICCT52962.2021.9658109"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"106008","DOI":"10.1016\/j.ijepes.2020.106008","article-title":"IEC 61850 based substation automation system: A survey","volume":"120","author":"Aftab","year":"2020","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comnet.2015.05.007","article-title":"SoftAir: A software defined networking architecture for 5G wireless systems","volume":"85","author":"Akyildiz","year":"2015","journal-title":"Comput. Netw."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/MVT.2018.2792198","article-title":"A 5G-Enabling Technology: Benefits, Feasibility, and Limitations of In-Band Full-Duplex mMIMO","volume":"13","author":"Xia","year":"2018","journal-title":"IEEE Veh. Technol. Mag."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MWC.2017.1700067","article-title":"Extracting and Exploiting Inherent Sparsity for Efficient IoT Support in 5G: Challenges and Potential Solutions","volume":"24","author":"Khalfi","year":"2017","journal-title":"IEEE Wirel. Commun."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1229","DOI":"10.1109\/JIOT.2017.2726014","article-title":"A Survey of Clustering Techniques in WSNs and Consideration of the Challenges of Applying Such to 5G IoT Scenarios","volume":"4","author":"Xu","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Spyridis, Y., Lagkas, T., Sarigiannidis, P., Argyriou, V., Sarigiannidis, A., Eleftherakis, G., and Zhang, J. (2021). Towards 6G IoT: Tracing Mobile Sensor Nodes with Deep Learning Clustering in UAV Networks. Sensors, 21.","DOI":"10.3390\/s21113936"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Gholami, A., Rao, K., Hsiung, W.P., Po, O., Sankaradas, M., and Chakradhar, S. (2022, January 25\u201329). ROMA: Resource Orchestration for Microservices-based 5G Applications. Proceedings of the NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium, Budapest, Hungary.","DOI":"10.1109\/NOMS54207.2022.9789821"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Guija, D., and Siddiqui, M.S. (2018, January 27\u201330). Identity and Access Control for micro-services based 5G NFV platforms. Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany.","DOI":"10.1145\/3230833.3233255"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Soenen, T., Rossem, S.V., Tavernier, W., Vicens, F., Valocchi, D., Trakadas, P., Karkazis, P., Xilouris, G., Eardley, P., and Kolometsos, S. (2018, January 23\u201327). Insights from SONATA: Implementing and integrating a microservice-based NFV service platform with a DevOps methodology. Proceedings of the NOMS 2018\u20142018 IEEE\/IFIP Network Operations and Management Symposium, Taipei, Taiwan.","DOI":"10.1109\/NOMS.2018.8406139"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Orduz, J.S., Orozco, G.D., Tobar-Arteaga, C.H., and Rendon, O.M.C. (2019, January 14\u201317). \u03bcvIMS: A Finer-Scalable Architecture Based on Microservices. Proceedings of the 2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), Osnabrueck, Germany.","DOI":"10.1109\/LCNSymposium47956.2019.9000664"},{"key":"ref_30","unstructured":"Lee, G.M., Um, T.W., and Choi, J.K. (2018, January 26\u201328). AI AS A MICROSERVICE (AIMS) OVER 5G NETWORKS. Proceedings of the 2018 ITU Kaleidoscope: Machine Learning for a 5G Future (ITU K), Santa Fe, Argentina."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/IOTM.0001.2000191","article-title":"Toward Blockchain for Edge-of-Things: A New Paradigm, Opportunities, and Future Directions","volume":"4","author":"Prabadevi","year":"2021","journal-title":"IEEE Internet Things Mag."},{"key":"ref_32","unstructured":"Gayialis, S.P., Kechagias, E., Papadopoulos, G.A., and Konstantakopoulos, G.D. (2019). IFIP Advances in Information and Communication Technology, Springer International Publishing."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Salhab, N., Rahim, R., and Langar, R. (May, January 29). NFV Orchestration Platform for 5G over On-the-fly Provisioned Infrastructure. Proceedings of the IEEE INFOCOM 2019\u2014IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Paris, France.","DOI":"10.1109\/INFCOMW.2019.8845141"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Costache, C., Machidon, O., Mladin, A., Sandu, F., and Bocu, R. (2014, January 11\u201313). Software-defined networking of Linux containers. Proceedings of the 2014 RoEduNet Conference 13th Edition: Networking in Education and Research Joint Event RENAM 8th Conference, Chisinau, Moldova.","DOI":"10.1109\/RoEduNet-RENAM.2014.6955310"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/MCOM.2016.7378433","article-title":"Management and orchestration challenges in network functions virtualization","volume":"54","author":"Mijumbi","year":"2016","journal-title":"IEEE Commun. Mag."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Rao, K., Coviello, G., Hsiung, W.P., and Chakradhar, S. (2021, January 10\u201313). ECO: Edge-Cloud Optimization of 5G applications. Proceedings of the 2021 IEEE\/ACM 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid), Melbourne, Australia.","DOI":"10.1109\/CCGrid51090.2021.00078"},{"key":"ref_37","first-page":"89","article-title":"Microservices-Based Provisioning and Control of Network Services for Heterogeneous Networks","volume":"16","author":"Nadaf","year":"2022","journal-title":"Int. J. Comput. Syst. Eng."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1109\/TNSM.2021.3076922","article-title":"Dynamic Microservice Allocation for Virtual Reality Distribution With QoE Support","volume":"19","author":"Alencar","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/MNET.013.2100087","article-title":"Artificial Intelligence Powered Mobile Networks: From Cognition to Decision","volume":"36","author":"Luo","year":"2022","journal-title":"IEEE Netw."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Kaur, K., Guillemin, F., Rodriguez, V.Q., and Sailhan, F. (2022, January 8\u201311). Latency and network aware placement for cloud-native 5G\/6G services. Proceedings of the 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC49033.2022.9700582"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"107216","DOI":"10.1016\/j.asoc.2021.107216","article-title":"HANSEL: Adaptive horizontal scaling of microservices using Bi-LSTM","volume":"105","author":"Yan","year":"2021","journal-title":"Appl. Soft Comput."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"100415","DOI":"10.1016\/j.cosrev.2021.100415","article-title":"Securing microservices and microservice architectures: A systematic mapping study","volume":"41","author":"Hannousse","year":"2021","journal-title":"Comput. Sci. Rev."},{"key":"ref_43","unstructured":"Huang, Z., Friderikos, V., Dohler, M., and Aghvami, H. (2021). Design Innovation and Network Architecture for the Future Internet, IGI Global."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MIC.2021.3056230","article-title":"AI-Driven Provisioning in the 5G Core","volume":"25","author":"Sheoran","year":"2021","journal-title":"IEEE Internet Comput."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Mateo-Forn\u00e9s, J., Pag\u00e8s-Bernaus, A., Pl\u00e0-Aragon\u00e9s, L.M., Castells-Gasia, J.P., and Babot-Gaspa, D. (2021). An Internet of Things Platform Based on Microservices and Cloud Paradigms for Livestock. Sensors, 21.","DOI":"10.3390\/s21175949"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Ying, F., Zhao, S., and Deng, H. (2022). Microservice Security Framework for IoT by Mimic Defense Mechanism. Sensors, 22.","DOI":"10.3390\/s22062418"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1:1","DOI":"10.1147\/JRD.2017.2755524","article-title":"A homomorphic encryption-based system for securely managing personal health metrics data","volume":"62","author":"Bocu","year":"2018","journal-title":"IBM J. Res. Dev."},{"key":"ref_48","first-page":"67","article-title":"FitPi: Wearable IoT solution for a daily smart life","volume":"10","author":"Pruna","year":"2020","journal-title":"Int. J. Adv. Stat. IT&C Econ. Life Sci."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Kim, S., Kim, J., Kim, M.J., Jung, W., Kim, J., Rhu, M., and Ahn, J.H. (2022, January 18\u201322). Bts: An accelerator for bootstrappable fully homomorphic encryption. Proceedings of the 49th Annual International Symposium on Computer Architecture, New York, NY, USA.","DOI":"10.1145\/3470496.3527415"},{"key":"ref_50","first-page":"1550147720903629","article-title":"Low-voltage electricity network monitoring system: Design and production experience","volume":"16","author":"Stoimenov","year":"2020","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Colace, F., Khan, M., Lombardi, M., and Santaniello, D. (2020, January 20\u201321). A multigraph approach for supporting computer network monitoring systems. Proceedings of the Fifth International Congress on Information and Communication Technology, London, UK.","DOI":"10.1007\/978-981-15-5859-7_46"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"1332","DOI":"10.1109\/LCOMM.2019.2922184","article-title":"Optimizing Distributed Network Monitoring for NFV Service Chains","volume":"23","author":"Hohemberger","year":"2019","journal-title":"IEEE Commun. Lett."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1145\/3305218.3305255","article-title":"An Efficient Network Monitor for SDN Networks","volume":"46","author":"Shen","year":"2019","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.comcom.2021.01.021","article-title":"Deep Learning for Network Traffic Monitoring and Analysis (NTMA): A Survey","volume":"170","author":"Abbasi","year":"2021","journal-title":"Comput. Commun."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"1234","DOI":"10.1016\/j.scib.2019.07.004","article-title":"Internet of Things to network smart devices for ecosystem monitoring","volume":"64","author":"Li","year":"2019","journal-title":"Sci. Bull."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Clot, B., Gilge, S., Hajkova, L., Magyar, D., Scheifinger, H., Sofiev, M., B\u00fctler, F., and Tummon, F. (2020). The EUMETNET AutoPollen programme: Establishing a prototype automatic pollen monitoring network in Europe. Aerobiologia, 1\u20139.","DOI":"10.1007\/s10453-020-09666-4"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"7003","DOI":"10.1109\/ACCESS.2022.3140646","article-title":"Prediction of Network Traffic in Wireless Mesh Networks Using Hybrid Deep Learning Model","volume":"10","author":"Mahajan","year":"2022","journal-title":"IEEE Access"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"5041","DOI":"10.1007\/s00521-021-05906-x","article-title":"Exploiting a fleet of UAVs for monitoring and data acquisition of a distributed sensor network","volume":"34","author":"MahmoudZadeh","year":"2022","journal-title":"Neural Comput. Appl."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Ali, G., Hass, J., Sill, A., Hojati, E., Dang, T., and Chen, Y. (2022, January 30). Redfish-Nagios: A Scalable Out-of-Band Data Center Monitoring Framework Based on Redfish Telemetry Model. Proceedings of the Fifth International Workshop on Systems and Network Telemetry and Analytics, Minneapolis, MN, USA.","DOI":"10.1145\/3526064.3534108"},{"key":"ref_60","unstructured":"(2023, January 23). Redfish Telemetry White Paper. Available online: https:\/\/www.dmtf.org\/sites\/default\/files\/standards\/documents\/DSP2051_1.0.0.pdf."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"108113","DOI":"10.1016\/j.ymssp.2021.108113","article-title":"Structural health monitoring using wireless smart sensor network\u2014An overview","volume":"163","author":"Sofi","year":"2022","journal-title":"Mech. Syst. Signal Process."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"108719","DOI":"10.1016\/j.comnet.2021.108719","article-title":"NFStream: A flexible network data analysis framework","volume":"204","author":"Aouini","year":"2022","journal-title":"Comput. Netw."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"1368","DOI":"10.1007\/s11036-022-01921-x","article-title":"The Calculation Method of the Network Security Probability of the Multi-rail Division Based on Fuzzy Inference","volume":"27","author":"Yin","year":"2022","journal-title":"Mob. Networks Appl."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"23186","DOI":"10.1109\/ACCESS.2022.3153471","article-title":"Reliable Deep Learning and IoT-Based Monitoring System for Secure Computer Numerical Control Machines Against Cyber-Attacks With Experimental Verification","volume":"10","author":"Tran","year":"2022","journal-title":"IEEE Access"},{"key":"ref_65","first-page":"1","article-title":"Security-aware routing on wireless communication for E-health records monitoring using machine learning","volume":"11","author":"Sengan","year":"2022","journal-title":"Int. J. Reliab. Qual. E-Healthc. (IJRQEH)"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"6663","DOI":"10.1109\/TII.2022.3159583","article-title":"A Cybertwin Based Multimodal Network for ECG Patterns Monitoring Using Deep Learning","volume":"18","author":"Qi","year":"2022","journal-title":"IEEE Trans. Ind. Informatics"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"1226","DOI":"10.1002\/qre.2944","article-title":"Monitoring dynamic networks: A simulation-based strategy for comparing monitoring methods and a comparative study","volume":"38","author":"Yu","year":"2022","journal-title":"Qual. Reliab. Eng. Int."},{"key":"ref_68","unstructured":"Ageyev, D., Radivilova, T., Mulesa, O., Bondarenko, O., and Mohammed, O. (2022). Information Security Technologies in the Decentralized Distributed Networks, Springer."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1080\/00207721.2021.1936275","article-title":"A novel iterative identification based on the optimised topology for common state monitoring in wireless sensor networks","volume":"53","author":"Lu","year":"2022","journal-title":"Int. J. Syst. Sci."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Alsharif, M.H., Jahid, A., Kelechi, A.H., and Kannadasan, R. (2023). Green IoT: A Review and Future Research Directions. Symmetry, 15.","DOI":"10.3390\/sym15030757"},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Mahnke, W., Leitner, S.H., and Damm, M. (2009). OPC Unified Architecture, Springer.","DOI":"10.1007\/978-3-540-68899-0"},{"key":"ref_72","unstructured":"Pardo-Castellote, G. (2003, January 19\u201322). OMG data-distribution service: Architectural overview. Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops, Providence, RI, USA."},{"key":"ref_73","unstructured":"eCAL\u2014Enhanced Communication Abstraction Layer (2022, April 06). A Fast Publish-Subscribe Cross-Platform Middleware Using Shared Memory and UDP. Available online: https:\/\/github.com\/continental\/ecal."},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Wu, M.Y., Ke, C.K., and Lai, S.C. (2022). Optimizing the Routing of Urban Logistics by Context-Based Social Network and Multi-Criteria Decision Analysis. Symmetry, 14.","DOI":"10.3390\/sym14091811"},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Marcos-Pablos, S., and Garc\u00eda-Pe\u00f1alvo, F. (2019). Technological Ecosystems in Care and Assistance: A Systematic Literature Review. Sensors, 19.","DOI":"10.3390\/s19030708"},{"key":"ref_76","unstructured":"Aldea, C.L. (2010). Elemente de Securitate a Datelor in Retele de Calculatoare, Transilvania University of Brasov Publishing House."},{"key":"ref_77","first-page":"81","article-title":"RESTEasy JAX-RS Login Web Service and Android Client","volume":"7","author":"Aldea","year":"2014","journal-title":"Bull. Transilv. Univ. Brasov Math. Inform. Phys. Ser. III"},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Tsai, C.C., Jain, B., Abdul, N.A., and Porter, D.E. (2016, January 18\u201321). A study of modern Linux API usage and compatibility. Proceedings of the Eleventh European Conference on Computer Systems, London, UK.","DOI":"10.1145\/2901318.2901341"},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Schauland, D., and Jacobs, D. (2016). Troubleshooting Windows Server with PowerShell, Apress.","DOI":"10.1007\/978-1-4842-1851-8"},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Trivedi, K.S., Vasireddy, R., Trindade, D., Nathan, S., and Castro, R. (2006, January 18\u201320). Modeling High Availability. Proceedings of the 2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC\u201906), Riverside, CA, USA.","DOI":"10.1109\/PRDC.2006.45"},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1186\/s13673-018-0143-8","article-title":"Reliability and high availability in cloud computing environments: A reference roadmap","volume":"8","author":"Mesbahi","year":"2018","journal-title":"Hum. Centric Comput. Inf. Sci."},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"You, P., Peng, Y., Liu, W., and Xue, S. (2012, January 18\u201321). Security Issues and Solutions in Cloud Computing. Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China.","DOI":"10.1109\/ICDCSW.2012.20"},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Huang, S.Y., Chen, C.Y., Chen, J.Y., and Chao, H.C. (2023). A Survey on Resource Management for Cloud Native Mobile Computing: Opportunities and Challenges. Symmetry, 15.","DOI":"10.3390\/sym15020538"},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Katal, A., Wazid, M., and Goudar, R.H. (2013, January 8\u201310). Big data: Issues, challenges, tools and Good practices. Proceedings of the 2013 Sixth International Conference on Contemporary Computing (IC3), Noida, India.","DOI":"10.1109\/IC3.2013.6612229"},{"key":"ref_85","unstructured":"(2023, January 23). Introduction to Control Groups (cgroups). Available online: https:\/\/access.redhat.com\/documentation\/en-us\/red_hat_enterprise_linux\/6\/html\/resource_management_guide\/ch01."},{"key":"ref_86","unstructured":"Solca, R.N., and Aldea, C.L. (2023, January 24). Network Resource Monitor: Cross Platform Network Resource Monitor. Available online: https:\/\/github.com\/q1e123\/Network-resource-monitor."},{"key":"ref_87","unstructured":"Solca, R.N., and Aldea, C.L. (2023, January 24). Network Resource Monitor Web Application: Web App For Network Resource Monitor. Available online: https:\/\/github.com\/q1e123\/Network-resource-monitor-web."},{"key":"ref_88","unstructured":"Reuters (2023, May 02). SolarWinds Hack Was \u2019Largest and Most Sophisticated Attack\u2019 Ever: Microsoft President. Available online: https:\/\/www.reuters.com\/article\/us-cyber-solarwinds-microsoft-idUSKBN2AF03R."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/15\/6\/1134\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:40:25Z","timestamp":1760125225000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/15\/6\/1134"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,23]]},"references-count":88,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2023,6]]}},"alternative-id":["sym15061134"],"URL":"https:\/\/doi.org\/10.3390\/sym15061134","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,23]]}}}