نتایج جستجو برای: keywords network security
تعداد نتایج: 2667445 فیلتر نتایج به سال:
Wireless sensor network is formed with the combination of sensor nodes and sink nodes. Recently Wireless sensor network has attracted attention of the research community. The main application of wireless sensor network is security from different attacks both for mass public and military. However securing these networks, by itself is a critical issue due to many constraints like limited energy, ...
With the vast introduction of the wireless world, the exchanged information now is more prone to security attacks than ever. Barcodes are the information careers in the form of an image. Their various applications have been discussed in brief and also the structure, symbology and properties of barcodes. This paper aims to provide an approach which can share high security information over the ne...
Recently, information security has become a key issue in information technology as the number of computer security breaches are exposed to an increasing number of security threats. A variety of intrusion detection systems (IDS) have been employed for protecting computers and networks from malicious network-based or host-based attacks by using traditional statistical methods to new data mining a...
In this paper we present an environment for evaluating self-healing mechanisms in survivable networks. The work is based on the thesis that system level requirements of integrity and availability can be inherently conflicting, and that the type and level of defence in each particular network should be determined in relation to the particular network’s characteristics. The study shows that defin...
The ongoing progress in networking security, together with the growing range of robot applications in many fields of everyday life, makes robotics tangible reality in our near future. Accordingly, new advanced services, depends on the interplay between the robotics and cyber security, are being an important role in robotics world. This paper addresses technological implications of security enha...
Vehicular Ad-hoc Networks (VANETs) are the most prominent enabling network technology for Intelligent Transportation Systems(ITS).VANETs provides many new exciting applications and opportunities albeit transportation safety and facilitation applications are their core drivers. Security of vehicular networks remains the most significant concern in VANETs deployment – because it is mandatory to a...
Network reconfiguration is an operation to modify the network topology. The implementation of network reconfiguration has many advantages such as loss minimization, increasing system security and others. In this paper, two topics about the network reconfiguration in distribution system are briefly described. The first topic summarizes its impacts while the second explains some heuristic optimiz...
Internet provides huge information and value to the users but at the same time access to the internet is prone to increasing number of attacks. Due to vulnerabilities in the network system, protecting network from malicious activities is prime concern today. It is important to analyse vulnerabilities and record them so that future attacks can be predicted. In this paper vulnerabilities which ex...
Emergency management is increasingly dependent on networks for information gathering, coordination and physical system control, and consequently is increasingly vulnerable to network failures. A cyber attack could cause such network failures intentionally, so as to impede the work of first responders and maximise the impact of a physical emergency. We propose a taxonomy of existing and potentia...
There are large varieties of applications of wireless sensor networks. The two major applications of the wireless sensor network are tracking based and second is monitoring based. There are sensors which communicate with each other to form a network. In the wireless sensor network there are number of issues which affects the performance and efficiency of the wireless sensor network. This paper ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید