A Review on Network Security

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

Impact of Cash Transfer on Food Security: A Review

Cash transfer (CTs) is an increasingly popular social protection mechanism used by many developing countries to improve the food security and nutritional status of lower socio-economic groups. This paper is a review of the literature regarding the impact of CT programs on the food security of recipient households in the developing countries, including Iran. We looked for all original studies...

متن کامل

A Review on the Security Issues of Telemedicine Network

Telemedicine is currently a promising area of research as day by day the need of better medical support is increasing. There had been numerous researches done in this particular field with many aspects. In our paper we mainly focused on the review of the system and few common security threats which have a huge influence on the quality of the service. In our paper we also reviewed literatures wh...

متن کامل

Network Security Based on Rough Set: A Review

As the conventional network security evaluation methods have prejudiced aspects when the weights of an evaluation indexes are recognized, it is not easy to make precise and objective evaluation. However, the Rough set theory has the benefits of not needing apriority information when dealing with tentative problems. Therefore, the appliance of the Rough set theory in the network security evaluat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Research in Computer Science and Software Engineering

سال: 2018

ISSN: 2277-128X,2277-6451

DOI: 10.23956/ijarcsse.v8i5.687