نتایج جستجو برای: security concern

تعداد نتایج: 277671  

2013
Ajay Jangra

Mobile ad hoc networks are self organizing, infrastructure-less, low power networks, design to deploy bandwidth-shared radio channel communicat ion and to work under vulnerable environment. Security is primary concern in MANETs and in order to achieve high security (confidentiality, integrity, authentication, availability and non repudiation), several techniques have been exp lored in which b i...

2006
Hiroya Itoga Atsushi Ohnishi

In this paper the authors propose security requirements elicitation method by scenario weaving. When the stakeholders write the behaviors of a system in scenarios or use cases, they may not have concern on software security. We prepare scenario fragments based on security evaluation criteria and weave them into the scenarios. Then we elicit the advices of weaving. The advices express the condit...

Journal: :Science 2003
Mark W Rosegrant Sarah A Cline

Global food security will remain a worldwide concern for the next 50 years and beyond. Recently, crop yield has fallen in many areas because of declining investments in research and infrastructure, as well as increasing water scarcity. Climate change and HIV/AIDS are also crucial factors affecting food security in many regions. Although agroecological approaches offer some promise for improving...

2004
Damith C. Ranasinghe Daniel W. Engels Peter H. Cole

Low cost Radio Frequency Identification (RFID) systems are increasingly being deployed in industry and commerce. These contactless devices have raised public concern regarding violation of privacy and information security. There is a growing need in the RFID community to discover and develop techniques and methods to overcome several problems posed by the above-mentioned concerns. This paper pr...

2010
ALAN C. SCHULTZ

The junction of AI and computer security is an area of increasing concern, due to the imminent application of AI to fielded systems. Two new areas of research need are identified: artificial intelligence techniques in the development of secure systems and in analyzing the security characteristics of software; and verification of the security of artificial intelligence. Current and proposed rese...

1995
Tsau Young Lin Thomas H. Hinke Donald G. Marks Bhavani M. Thuraisingham

Database mining can be defined as the process of mining for implicit, previously unknown, and potentially useful information from very large databases by efficient knowledge discovery techniques. Naturally such a process may open up new inference channels, detect new intrusion patterns, and raises new security problems. New security concern and research problems are addressed and identified. Fi...

2013
Annan Naidu Paidi

Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wire line networks, the unique characteristics of mobile ad hoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium, stringent resource constraints, and highly dynamic ne...

2008
Jing Dong Tieniu Tan

The security of multimedia information in general and the security of visual information in particular have increasingly become an issue of great concern in our networked society. Biometrics, cryptography and data hiding provide effective and often complementary solutions to information security from different perspectives. In this paper, we present a brief overview on the state-of-the-art of r...

2014
Shaily Garg Vijay Maheshwari

Security of multimedia data is an imperative issue because of fast evolution of digital data exchanges over unsecured network. With the progress in data exchange by the electronic system, we need to secure information. In this paper 128 bit image encryption is used for securing the image. Many security issues are also concern with this exchange and sharing of information. These may be authentic...

2013
S. H. Mortazavi P. S. Avadhani

This paper is discussed the security of computer networks is a concern for businesses and individuals who are aware of its advantages due to its flexibility. With the increase security of IDS for companies and homes, where information property are shared continually, security is of the nature.. Cryptography is seen as a major instrumentation in the line of defense of network security. This pape...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید