نتایج جستجو برای: heterogeneous security complex
تعداد نتایج: 1059368 فیلتر نتایج به سال:
The security mechanisms employed in today’s networked environments are increasingly complex and their configuration management has an important role for the protection of these environments. Especially in large scale networks, security administrators are faced with the challenge of designing, deploying, maintaining, and monitoring a huge number of mechanisms, most of which have complicated and ...
security as one of the basic human needs has a special place in relaxation, comfort and spiritual needs provision. for this reason, security is always of managers, planners, architects and urban designers' interest. solutions and strategies of security provision have been fundamentally changed following prevailing change of housing architecture patterns from homes to residential complexes ...
Most organisations today need to maintain and periodically migrate a heterogeneous distributed IT infrastructure to more modern platforms. This is typically a time-consuming, expensive, and error-prone process. The same problem also applies to IT security – security technologies and policy management consoles are changed periodically. We use software modelling concepts to ease the maintenance a...
Security is a critical concern for any information system. Security properties such as confidentiality, integrity and availability need to be enforced in order to make systems safe. In complex environments, where information systems are composed of a number of heterogeneous subsystems, each must participate in their achievement. Therefore, security integration mechanisms are needed in order to ...
On a large-scale application subject to dynamic interactions, the description and enforcement of security rules are complex tasks to handle, as they involve heterogeneous entities that do not have the same capabilities. In the context of SCM-application for example, we have different goods that are being transported across different systems. At one point, items and systems communicate together ...
In this paper, authors propose a complex of correlation-based methods for security incidents detection and investigation in large-scale networks of heterogeneous devices such as Internet of Things. Proposed methods aim to detect both known and unknown attacks in the Internet of Things.
Wireless Sensor Networks (WSNs) are prone to security attacks. To protect the network from potential adversaries, it is necessary to secure communications between sensor nodes. If we consider a network of heterogeneous objects including WSNs, security requirements may be far more complex. A single application may deal with different traffic flows, each one of which may have different security r...
This paper extends the CARDINAL architecture by Kim et al. (2005) to CARDINAL-E. CARDINAL-E keeps the innate immune system behaviour at every computer on the network and relocates the adaptive immune system behaviour to higher performance computers. Two paradigmatic shifts are achieved by this modification. First is the shift from standalone to supportive, otherwise considered as architecturall...
this work is presented in five parts. in the first part preparation of the starting complex [pt(c^n)cl(dmso)], 1, in which c^n = n(1),c(2?)-chelated, deprotonated 2-phenylpyridine, and dmso = dimethylsulfoxide, and its reaction with 1 equiv of the biphosphine ligands bis(diphenylphosphino)amine, dppa, or bis(diphenylphosphino)methane, dppm, to give the complex [pt(c^n)cl(dppa)], 2, or [pt(c^n)c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید