نتایج جستجو برای: keywords network security

تعداد نتایج: 2667445  

2013
Manisha Gaurav Gupta

Wireless Sensor Network platforms are less expensive and more powerful having tiny electronic devices called Motes (sensor nodes). Wireless sensor networks enhance its popularity in military and health centric research areas; now it is also popular in industrial area. This paper describes the security requirements as WSNs are easily prone to more attacks than wired networks. This paper studies ...

2014
E. Sahaya Rose Vigita

Wireless sensor network is vulnerable to a wide range of attacks. Recover secrecy after compromise, to develop technique that can detect intrusions and able to resilient networks that isolates the point(s) of intrusion while maintaining network connectivity for other legitimate users. To define new security metrics to evaluate collaborative intrusion resilience protocol, by leveraging the senso...

2013
Garima Shrivastava Anurag Jain

In network security, Intrusion Detection System plays a reasonable supplementary role for the firewall. It improves the security and reliability of the computer and helps protect computers from network attacks. At present intrusion detection system analysis module uses the pattern matching technology. In this article, through analyzing the advantages and disadvantages of the main pattern matchi...

2014
S. S. Zalte Vijay R. Ghorpade

Routing of data in the Mobile Adhoc Network(MANET) is the most valuable task in today’s world, as it is used in day to day life from a single individual to large organizations. MANET is a favorite target for attackers because of its unique characteristics dynamic topologies, mobility, limited resources, infrastructure less, no centralized management etc. pose a number of non-trivial challenges ...

2012
Navita Sharma Gurpreet Singh

The immense advancement in attacks against network give rise to interest in more contentious forms of defense to supplement the existing security approaches. Honeypots are physical or virtual machines successfully used as Intrusion detection tool to detect threats. In this paper we proposed a shadow honeypot based intrusion detection system. Shadow honeypot is used to collect the intrusion from...

2015
S. Raja Ratna R. Ravi

Wireless networks are built upon the open shared medium which makes easy for attackers to conduct malicious activities. Jamming is one of the most serious security threats to information economy and it must be dealt efficiently. Jammer prevents legitimate data to reach the receiver side and also it seriously degrades the network performance. The objective of this paper is to provide a general o...

Journal: :the modares journal of electrical engineering 2011
mansour nejati jahromi alireza rezayi

in a mobile ad hoc network, there are some features such as the ability to exploit multipath effect for information exchange with high reliability and low error rate. dealing with the aggressors and discovering the path in data transmission are of importance. approaching these goals ends in network promotion and efficiency. in this paper, the designed protocol is able to discover multipath fo...

2011
Terrence P. Fries

The proliferation of computer networks has brought network security to the forefront. It has become imperative to devise new methods for network intrusion detection. Current methods are frequently unable to detect polymorphic or novel attack modes. In addition, the enormous volume of network traffic makes it difficult to monitor and evaluate all features of communication packets on the network....

Journal: :the international journal of humanities 2013
f. rezaeifar

importance of security and sense of peace is a one of the most important factors of urban environment. therefore, the necessity of security in urban spaces has caused the emergence of authentic theories like defensible spaces and crime prevention through environment design (cpted)*. in this paper, various literatures related to defensible space theories have been reviewed and the related keywor...

2012
Jens Rohrbeck Vlado Altmann Stefan Pfeiffer Peter Danielis Jan Skodzik Dirk Timmermann Matthias Ninnemann Maik Rönnau

Providing network security is one of the most important tasks in todays Internet. Unfortunately, many users are not able to protect themselves and their networks. Therefore, a novel security concept is presented to protect users by providing security measures at the Internet Service Provider level. Already now, Internet Service Providers are using different security measures, e.g., Virtual Loca...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید