نتایج جستجو برای: network security
تعداد نتایج: 818903 فیلتر نتایج به سال:
sybil attacks pose a serious threat for wireless sensor networks (wsn) security. they can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. in a sybil attack,the attacker masquerades as multiple sensor identities, that are actually controlled by one or a few existing attacker nodes. sybil identities are fabricated out of stolen keys, obt...
VANET (Vehicular Ad-hoc Network) which is a hy- brid network (combination of infrastructure and infra- structure-less networks) is an emergent technology with promising future as well as great challenges especially in security. By the other hand this type of network is very sensible to safety problem. This paper focuses on a new mechanism for DoS (denial of service) attacks on the physical and ...
In this paper, we address how honeynets, networks of computers intended to be compromised, can be used to increase network security in a large organizational environment. We outline the current threats Internet security is facing at present and show how honeynets can be used to learn about those threats for the future. We investigate issues researchers have to take into account before deploying...
Increasingly widespread application of mobile agent, mobile agent system’s security is a prominent problem to be solved, mobile agent’s security question is critical. In this paper, based on cryptography, computer network security, mobile agent security architecture at the same time gives the practical methods and suggested ways can be used in other new security measures. The core problem is ho...
high processing loads, need for complicated and frequent updating, and high false alarm are some of the challenges in designing anomaly detection and misuse detection systems. we propose a new network-based intrusion detection system (ids) that resolves such shortcomings. our scheme fuses anomaly detection and misuse detection systems, which has not been utilized so far in existing systems. in ...
We study users’ incentives to become cybercriminals when network security is interdependent. We present a game-theoretic model in which each player (i.e., network user) decides his type, honest or malicious. Honest users represent law-abiding network users, while malicious users represent cybercriminals. After deciding on their types, the users make their security choices. We will follow [29], ...
• .................................................................... Top 4 Network Security Challenges › Addressing Security Challenges with Network Access Control › An Evolving Network Environment. • .................................... Securing and Provisioning Medical Devices › Securing Network Access for Guests and Visitors › Securing Access to Patient Information › Achieving Complia...
This paper proposes a novel approach for generation scheduling using sensitivitycharacteristic of a Security Analyzer Neural Network (SANN) for improving static securityof power system. In this paper, the potential overloading at the post contingency steadystateassociated with each line outage is proposed as a security index which is used forevaluation and enhancement of system static security....
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید