نتایج جستجو برای: internal security

تعداد نتایج: 406278  

بهدادفر, مسعود, سپهوند, رضا, عارف نژاد, محسن,

One of the essential tools for achieving the expansion of e-commerce is e-banking system. One of the major risks identified in the field of electronic banking, is operational risks. Accurate understanding of banks about the concept of operational risk to monitor and manage this specific category of risk effectively is vital. This study aimed to identify and rank the six factors, outsourcing, an...

2006
Michael Jenkins Syed Masud Mahmud

The need for active safety, highway guidance, telematics, traffic management, cooperative driving, driver convenience and automatic toll payment will require future intelligent vehicles to communicate with other vehicles as well as with the road-side infrastructure. However, inter-vehicle and vehicle to roadside infrastructure communications will impose some security threats against vehicles’ s...

2012
Rafael Páez

Intrusion Detection Systems (IDS) are software or hardware products that automate the analysis process of traffic on a network or a host. and they are a complementary security tool in computer networks; it can be deployed at different points depending on the application, host or network segment to be monitored. Accordingly to its location, the IDS must be parameterized in a different way, for e...

Journal: :JCP 2011
Xiu-qing Yu

P-sets (packet sets) is a pair of sets composed of internal P-set and outer P-set, and it has dynamic characteristics. Based on internal P-set, several concepts such as F -internal contained information, F -internal contained dependence, and F -internal remainder information, are presented. In addition, existing theorem, single-dependence transmission theorem, and attribute dependence theorem a...

2014
Kuldeep Tomar

Past few years the use of Internet and its applications has increased to a great extent. There is also an enormous growth in the establishment of computer networks by large, medium and small organizations, for data transfer and information exchange. Due to this huge growth, incidents of cyber-attacks and security breaches have also increased. Data on a network is transferred using protocols suc...

2009
Gavin Hall

Modern companies increasingly rely on technology to manage every facet of their business, with a significant concern being the security of this technology. Nowhere is the issue of security more important than in the area of corporate systems networks. With the greater dependence on technology and network has come the greater need for competent security to safeguard the corporate network systems...

2008
Yolanta Beres Jonathan Griffin Simon Shiu

In this paper we present a novel approach of using mathematical models and stochastic simulations to guide and inform security investment and policy change decisions. In particular, we investigate vulnerability management policies, and explore how effective standard patch management and emergency escalation based policies are, and how they can be combined with earlier, pre-patch mitigation meas...

2012
Muhammad R Ahmed Xu Huang Hongyan Cui

An information procuring and processing emerging technology Wireless Sensor Network (WSN) consists of low-cost and multifunctional resources constrain autonomous nodes. It communicates short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from mil...

2009
Jian Guo Krystian Matusiewicz

In this paper, we investigate the security of SHA-3 candidate BLAKE. We analyse the propagation of differences that are rotation-invariant in the internal function G. We show that by using them, it is possible to obtain near-collisions for the compression function reduced to 4 rounds out of 10. We also discuss the security of some variants of BLAKE.

2012
Muhammad R Ahmed Xu Huang

Developments in communication technologies especially in wireless have enabled the progress of low-cost and lowpower wireless sensor networks (WSNs). The features of such WSN are holding minimal energy, weak computational capabilities, wireless communication and an open-medium nature where sensors are deployed. WSN is underpinned by application driven such as military applications, the health s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید