Securing Robotic Communication using Multiple Security Techniques
نویسندگان
چکیده
منابع مشابه
Securing BGP Using External Security Monitors
Security modifications to legacy network protocols are expensive and disruptive. This paper outlines an approach, based on external security monitors, for securing legacy protocols by deploying additional hosts that locally monitor the inputs and outputs of each host executing the protocol, check the behavior of the host against a safety specification, and communicate using an overlay to alert ...
متن کاملSecuring Wireless Sensor Network using Intelligent Techniques
In wireless sensor networks (WSNs), the sensor nodes transmit critical information over the network. Therefore security services such as authentication and pair wise key establishment between sensor nodes and mobile sinks are important. However, the problem of authentication and pair wise key establishment in sensor networks with mobile sinks is still a critical problem in the face of mobile si...
متن کاملSecuring Image Data’s Using Cellular Automata Techniques
One of the most efficient methods for breast cancer early detection is mammography. It’s a new attempt for Securing image data’s using cellular automata techniques is presented here. It is done by different stages: first, from the 322 dense mammographic images, originating from the MIAS database we applied these Soft computing techniques like noise removal, segmentation and pectoral muscle extr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2017
ISSN: 0975-8887
DOI: 10.5120/ijca2017915704