نتایج جستجو برای: network security

تعداد نتایج: 818903  

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

Journal: :International Journal of Security and Its Applications 2016

Journal: :مدیریت شهری 0
قنبر امیر نژاد توفیق فهیمی زاده

the present study aimed to explain the factors affecting the usage of electronic insurance in iran insurance company and its operating strategies in khuzestan province. the research method is descriptive-survey method, and data collecting instrument is questionnaire. the study population is consisted of 480 people of all staff and experts the sales network in iran insurance company in khuzestan...

Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...

Journal: :International Journal of Research in Engineering and Technology 2014

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

Journal: :International Journal of Security and Its Applications 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید