نتایج جستجو برای: security model
تعداد نتایج: 2246841 فیلتر نتایج به سال:
Paradigm shift towards cloud computing offers plethora of advantages both for users and Cloud Service Provider (CSP). For users, it saving cost, scaling resources, pay per use, elastic on-demand services. On the other hand, centralized resource management provisioning operations, safety security CSP. By holding multiple virtual IT resources (CPUs, storage servers, network components software) o...
Social Media platforms have become a significant part of our daily lives and modern way to connect friends family, document lives, share other great personal information about lives. These activities leave us vulnerable privacy security breach due lapse controls necessary protect users' sensitive data on these platforms. We conducted exploratory analysis paramount social media such as Facebook ...
W ireless network security based on the IEEE 802.11 standard has received a lot of negative attention over the past few years. The attention was warranted, but 802.11 certainly wasn’t the only product to suffer from poor security. For example, operating systems and browsers have also posed significant security problems. Why then did Wi-Fi–based networks become such a lightning rod for criticism...
Security Information and Event Management (SIEM) systems work on SCADA systems by observing and reacting to the dynamic security-related events of the target automation system. These events are created by collecting/filtering raw logs maintained by its subcomponents. Preferably, logging items are attached with synchronized timestamps. Specific data of security-related event can be correlated an...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید