A Review on Network Security
نویسندگان
چکیده
منابع مشابه
A Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملImpact of Cash Transfer on Food Security: A Review
Cash transfer (CTs) is an increasingly popular social protection mechanism used by many developing countries to improve the food security and nutritional status of lower socio-economic groups. This paper is a review of the literature regarding the impact of CT programs on the food security of recipient households in the developing countries, including Iran. We looked for all original studies...
متن کاملA Review on the Security Issues of Telemedicine Network
Telemedicine is currently a promising area of research as day by day the need of better medical support is increasing. There had been numerous researches done in this particular field with many aspects. In our paper we mainly focused on the review of the system and few common security threats which have a huge influence on the quality of the service. In our paper we also reviewed literatures wh...
متن کاملNetwork Security Based on Rough Set: A Review
As the conventional network security evaluation methods have prejudiced aspects when the weights of an evaluation indexes are recognized, it is not easy to make precise and objective evaluation. However, the Rough set theory has the benefits of not needing apriority information when dealing with tentative problems. Therefore, the appliance of the Rough set theory in the network security evaluat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Research in Computer Science and Software Engineering
سال: 2018
ISSN: 2277-128X,2277-6451
DOI: 10.23956/ijarcsse.v8i5.687