نتایج جستجو برای: keywords network security

تعداد نتایج: 2667445  

Journal: :CoRR 2015
Manish Kumar Shubham Kaul Vibhutesh Kumar Singh Vivek Ashok Bohara

In this work, we design and develop a smart intruder detection and alert system which aims to elevate the security as well as the likelihood of true positive identification of trespassers and intruders as compared to other commonly deployed electronic security systems. Using multiple sensors, this system can gauge the extent of danger exhibited by a person or animal in or around the home premis...

2017
Louise Axon Jason R. C. Nurse Michael Goldsmith Sadie Creese

Sonification systems, in which data are represented through sound, have the potential to be useful in a number of network-security monitoring applications in Security Operations Centres (SOCs). Security analysts working in SOCs generally monitor networks using a combination of anomaly-detection techniques, Intrusion Detection Systems and data presented in visual and text-based forms. In the las...

2012
J. Dubois P. Jreije

Internet security attack could endanger the privacy of World Wide Web users and the integrity of their data. The attack can be carried out on today's most secure systems’ browsers, including Netscape Navigator and Microsoft Internet Explorer. There are too many types, methods and mechanisms of attack where new attack techniques and exploits are constantly being developed and discovered. In this...

2006
RENYI XIAO

In this paper, a novel mutual authentication and key exchange protocol based on self-certified mechanism is proposed for roaming services in the global mobility network (GLOMONET). The main new features of the proposed protocol include identity anonymity, one-time session key renewal, and distributed security management scheme. Identity anonymity protects location privacy of mobile users in the...

2016
Virendra Patil Rajendra Patil

Wireless ad-hoc networks has now become one of the most vibrant and active field of communication and networks. Due to lack of a defined central authority, MANETs are more vulnerable to security attacks and thus security is essential requirement in MANET as compared to the wired network. The nature and structure of MANET makes it attractive to various types of attackers. In this paper the princ...

2013
Ajit Singh Swati Malik

Securing data is a challenging issue in today’s era. Most of the data travel over the internet and it becomes difficult to make data secure. So Cryptography was introduced for making data secure. But alone cryptography cannot provide a better security approach because the scrambled message is still available to the eavesdropper. There arises a need of data hiding. So here we are using a combina...

2016
Mohammad Reza Rostami Norbik Bashah Idris Zuraini Ismail

Fast growth of Internet has brought some security concerns. One of these security concerns is Botnet. Bot and Botnets are new sophisticated kind of malware that is equipped with advanced features and have variety of applications. This paper reviews the current botnet detection frameworks and their advantages and drawbacks. To address the drawbacks we propose a conceptual holistic Botnet Detecti...

2016
Peter Schneider

In this paper we introduce a new, flexible radio access stratum security architecture for 5G mobile networks that supports a dynamic, flexible radio access network with multiple different security termination points for the control and user plane communication between a mobile device and the network. We describe key refreshing methods that allow to refresh user plane keys for individual radio l...

2005
M. Tarafdar Haque

The electric power industry is currently undergoing an unprecedented reform. One of the most exciting and potentially profitable recent developments is increasing usage of artificial intelligence techniques. The intention of this paper is to give an overview of using neural network (NN) techniques in power systems. According to the growth rate of NNs application in some power system subjects, t...

2015
Gurpreet Kaur

Wireless Sensor Network (WSN) are the network of sensor nodes which communicate with each other and with the base station using wireless channel. Due to extensive use of wireless sensor networks it is necessary to improve its security. WSN nodes are prone to physical attacks. Wireless sensor networks (WSN) face security threats so traditional key management schemes are no longer accurate for WS...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید