نتایج جستجو برای: security threats

تعداد نتایج: 201039  

2011
Gaurav Soni Sandeep Kaushal

This paper examines threats to the security of the Mobile WiMax/ 802.16e broadband wireless access technology. Threats associated with the physical layer and MAC layer are reviewed in detail. Threats are listed and ranked according to the level of risk they represent. This review work can be used to prioritize future research directions in Mobile WiMax/802.16e security.

2014
Mouna Jouini Latifa Ben Arfa Rabai Anis Ben Aissa

Information systems are frequently exposed to various types of threats which can cause different types of damages that might lead to significant financial losses. Information security damages can range from small losses to entire information system destruction. The effects of various threats vary considerably: some affect the confidentiality or integrity of data while others affect the availabi...

2013
Disha H. Parekh

Vendors offer a pool of shared resources to their users through the cloud network. Nowadays, shifting to cloud is a very optimal decision as it provides pay-as-you-go services to users. Cloud has boomed high in business and other industries for its advantages like multi-tenancy, resource pooling, storage capacity etc. In spite of its vitality, it exhibits various security flaws including loss o...

2005
Ramnath K. Chellappa Paul A. Pavlou

Electronic commerce (EC) transactions are subject to multiple information security threats. Proposes that consumer trust in EC transactions is influenced by perceived information security and distinguishes it from the objective assessment of security threats. Proposes mechanisms of encryption, protection, authentication, and verification as antecedents of perceived information security. These m...

2004
Mohammad Mannan P. C. van Oorschot

We provide a survey on security features and threats to existing Instant Messaging (IM) networks and discuss how currently available systems fail to provide adequate security in light of existing threats. Our discussion and analysis provide a starting point from which to advance academic research in the area of secure IM systems, enabling security improvement in the longer term.

2004
Mohammad Mannan Paul C. van Oorschot

We provide a survey on security features and threats to existing Instant Messaging (IM) networks and discuss how currently available systems fail to provide adequate security in light of existing threats. Our discussion and analysis provide a starting point from which to advance academic research in the area of secure IM systems, enabling security improvement in the longer term.

2015
Fatemeh Soleimani Roozbahani

----------------------------------------------------------------------ABSTRACT----------------------------------------------------------The spread of information networks in communities and organizations have led to a daily huge volume of information exchange between different networks which, of course, has resulted in new threats to the national organizations. It can be said that information s...

2008
J. G. Alfaro M. Barbeau E. Kranakis

Detecting and responding to security and privacy threats to Electronic Product Code (EPC) and Radio Frequency IDentification (RFID) technologies are becoming major concerns of information security researchers. However, and before going further in these activities, an evaluation of the threats in terms of importance must be done. We present such an evaluation. Our analysis of the threats is base...

2010
Zoran Kekovic Slobodan Markovic

Security and protection demands in tourism industry are very high due to the vulnerability of its infrastructure in light of security challenges and threats. Actual threats appear in the form of endangering the values that compose a train of products and services in tourism – from the moment of buying/selling a package tour, transfer of passengers and luggage to their destination, to stay in ho...

Journal: :CoRR 2018
Wei Zhou Yuqing Zhang Peng Liu

The future of Internet of Things (IoT) is already upon us. IoT applications have been widely used in many field of social production and social living such as healthcare, energy and industrial automation. While enjoying the convenience and efficiency that IoT brings to us, new threats from IoT also have emerged. There are increasing research works to ease these threats, but many problems remain...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید