نتایج جستجو برای: unauthorized access

تعداد نتایج: 329692  

2002
Shigeyuki Matsuda Tatsuya Baba Akihiro Hayakawa Taichi Nakamura

We had proposed a hop-by-hop IP traceback method that can reliably trace a source of an attack. In this paper, we describe the development and the evaluation of our prototype system. The main features of our proposed method are the packet feature, which is composed of specific packet information contained in a packet for identification of an unauthorized packet, and the algorithm using datalink...

2012
Kuljeet Kaur

Inbuilt physical security in wireless networks is not obtainable and unfortunately these are more prone to attacks from intruders. Resources are easily accessible, once an unauthorized access is gained. Paper elucidates numerous attacks which an intruder could use to detect and connect to the wireless network. Focus of the paper is on two technologies Wired Equivalent Privacy (WEP) and IEEE 802...

2011
Kevin Curran Jonathan Doherty Ayleen McCann KEVIN CURRAN JONATHAN DOHERTY AYLEEN MCCANN GARY TURKINGTON

The creation of strong, secure passwords is vital in our life todaydue to the implications of compromised access to our data. Passwords are commonly used to prevent unauthorized access to important information, to guarantee security of personal information, and to prevent unauthorized access to various services. It seems that people tend to veer toward adopting the simplest characters in formin...

2007
Unnati Thakore Lorie M. Liebrock

The grid security architecture today does not prevent certain unauthorized access to the files associated with a job executing on a remote machine. Programs and data are transferred to a remote machine for completing staging jobs. Footprints may remain on the machine after the programs and data are deleted from the remote machine. Anyone with super user privileges can access these footprints. I...

2004
Hyuncheol Kim Sunghae Kim Seong-Jin Ahn Jin-Wook Chung

Currently, the major focus on the network security is securing individual components as well as preventing unauthorized access to network services. Ironically, Address Resolution Protocol (ARP) poisoning and spoofing techniques can be used to prohibit unauthorized network access and resource modifications. The protecting ARP which relies on hosts caching reply messages can be the primary method...

Journal: :Information 2022

In the last two decades there has been obtained tremendous improvements in field of artificial intelligence (AI) especially sector face/facial recognition (FR). Over years, world remarkable progress technology that enhanced face detection techniques use on common PCs and smartphones. Moreover, steadily programming languages, libraries, frameworks, tools combined with great passion developers re...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید