نتایج جستجو برای: unauthorized access

تعداد نتایج: 329692  

2003
Mohan K. Chirumamilla Byrav Ramamurthy

Wireless LAN technology, despite the numerous advantages it has over competing technologies, has not seen widespread deployment. A primary reason for markets not adopting this technology is its failure to provide adequate security. Data that is sent over wireless links can be compromised with utmost ease. In this project, we propose a distributed agent based intrusion detection and response sys...

Journal: :The Journal of Korean Institute of Communications and Information Sciences 2013

1991

A 'mole' at the Bristol Royal Infirmary tells me that at the last Hospital Committee Meeting it was explained to the assembled consultants that under the rules of the new Special Trust, when they have fulfilled the Provider contract for the number of patients to be seen in a particular week, they will not be allowed to see any more.

2016
Dave Tian Nolen Scaife Adam M. Bates Kevin R. B. Butler Patrick Traynor

USB provides ubiquitous plug-and-play connectivity for a wide range of devices. However, the complex nature of USB obscures the true functionality of devices from the user, and operating systems blindly trust any physically-attached device. This has led to a number of attacks, ranging from hidden keyboards to network adapters, that rely on the user being unable to identify all of the functions ...

Journal: :International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2019

2006

Authentication permits principals to use a service, and, at the same time, prevents unauthorized users from masquerading as legitimate users to steal resources. For example, unknown users can be denied access to payroll information. Similarly, unknown services can be prevented from using virtual machines to complete tasks. Authenticated users, however, can use their virtual machines and access ...

Journal: :APSIPA transactions on signal and information processing 2021

In this paper, we propose a novel method for protecting convolutional neural network models with secret key set so that unauthorized users without the correct cannot access trained models. The enables us to protect not only from copyright infringement but also functionality of model any noticeable overhead. We introduce three block-wise transformations generate learnable transformed images: pix...

2015
Ankita Sharma Sarika khandelwal

From Last few year, internet became the first priority of everyone. It is a very easy and fast way to transfer and access data and information throughout the world. This information basically in the form of digital data (text, images, audio, video). Everyone using internet for their personal or professional use. Due to this it is important to protect user data from unauthorized access. When we ...

2014
Chien-Hsing Liao Tai-Kuo Woo

Communication systems have to be made secure against unauthorized interception or against disruption or corruption in complicated electromagnetic environments. There are mainly three security categories used to delineate wireless communication systems generally, such as shown in Fig. 1, i.e., INFOSEC, COMSEC, and TRANSEC. We state about information security (INFOSEC) as that trying to against u...

Journal: :Biomedical Journal of Scientific and Technical Research 2023

Cyber security safeguards data, networks, programmes, and other information from unauthorized or unsupervised access, destruction, change. Because of various concerns cyber-attacks, cyber is crucial in today’s environment.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید