Evaluation & Trends of Surveillance System Network in Ubiquitous Computing Environment
نویسنده
چکیده
Sunil Kr Singh CSE Department, Bharati Vidyapeeth College of Engineering Affiliated to GGSIP University, New Delhi, India E-mail:[email protected] Anuj Aggarwal ECE Department, Bharati Vidyapeeth College of Engineering Affiliated to GGSIP University, New Delhi, India E-mail:[email protected] Kavneet Kaur CSE Department, Bharati Vidyapeeth College of Engineering Affiliated to GGSIP University, New Delhi, India E-mail: [email protected]
منابع مشابه
Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملLetter to Editor: Mortality Trends of Pilgrims in Hajj: An Implication for Establishment of Surveillance System
Hajj is one of the most important religious ceremonies of Muslims that is held in Saudi Arabia every year. However, trauma is the most important factor of mortality in this ceremony.
متن کاملEmerging Trends of Ubiquitous Computing
Ubiquitous computing is a method of enhancing computer use by making many computers available throughout the physical environment, but making them effectively invisible to the user. Background network to support ubiquitous computing is ubiquitous network by which users can enjoy network services whenever and wherever they want (home, office, outdoors). In this paper Issues related to ubiquitous...
متن کاملEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملDevelopment of a Model for Predicting Heart Attack Based on Fog Computing
Introduction: Various studies have demonstrated the benefits of using distributed fog computing for the Internet of Things (IoT). Fog computing has brought cloud computing capabilities such as computing, storage, and processing closer to IoT nodes. The new model of fog and edge computing, compared to cloud computing, provides less latency for data processing by bringing resources closer to user...
متن کامل