Retracted: Computer Network Security Management of Data Encryption Technology
نویسندگان
چکیده
منابع مشابه
Data Mining Technology for Efficient Network Security Management
Several Network systems are suffering from various security threats including network worms, large scale network attacks, etc, and network security situation awareness is an effective way for solve these problems. The general process is to perceive the network security events happened in a certain time period and cyberspace environment, synthetically manipulate the security data, analyse the at...
متن کاملSecurity and Management of Local Computer Data
In the computer system, only the data storing in the computer are the real fortune, and the protection of information and data are crucial. In the day that data security becomes more and more important, the stable and self-contained backup system has been the key to ensure the normal running of the system. Data backup is not only the conservation of data, but includes more important content, i....
متن کاملData Security Management in Distributed Computer Systems
This research deals with data security management in distributed and client/server computer systems, placing special emphasis on access security. The paper presents the subject of data security management in these systems by describing them, examining their vulnerable points and presenting adequate solutions. The paper includes a survey on the subject of authorization, authentication, encryptio...
متن کاملSensor Data Encryption Protocol for Wireless Network Security
Wireless Sensor Network consisting of a large number of sensor nodes that connected through wireless media has emerged as a ground breaking technology that offers unprecedented ability to monitor the physical word accurately. The privacy preservation is an important issue in wireless sensor network. Developing effective security solutions for wireless sensor networks are not easy due to limited...
متن کاملProposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wireless Communications and Mobile Computing
سال: 2023
ISSN: ['1530-8669', '1530-8677']
DOI: https://doi.org/10.1155/2023/9893172