Securing Robotic Communication using Multiple Security Techniques

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing BGP Using External Security Monitors

Security modifications to legacy network protocols are expensive and disruptive. This paper outlines an approach, based on external security monitors, for securing legacy protocols by deploying additional hosts that locally monitor the inputs and outputs of each host executing the protocol, check the behavior of the host against a safety specification, and communicate using an overlay to alert ...

متن کامل

Securing Wireless Sensor Network using Intelligent Techniques

In wireless sensor networks (WSNs), the sensor nodes transmit critical information over the network. Therefore security services such as authentication and pair wise key establishment between sensor nodes and mobile sinks are important. However, the problem of authentication and pair wise key establishment in sensor networks with mobile sinks is still a critical problem in the face of mobile si...

متن کامل

Securing Image Data’s Using Cellular Automata Techniques

One of the most efficient methods for breast cancer early detection is mammography. It’s a new attempt for Securing image data’s using cellular automata techniques is presented here. It is done by different stages: first, from the 322 dense mammographic images, originating from the MIAS database we applied these Soft computing techniques like noise removal, segmentation and pectoral muscle extr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2017

ISSN: 0975-8887

DOI: 10.5120/ijca2017915704