نتایج جستجو برای: data threats

تعداد نتایج: 2432735  

2013
Kashif Munir Sellapan Palaniappan

Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. The biggest challenge in cloud computing is the security and privacy problems caused by its multi-tenancy nature and the outsourcing of infrastructure, se...

Journal: :Advances in Science, Technology and Engineering Systems Journal 2022

Journal: :international journal of smart electrical engineering 2013
elham yazdankhah fardad farokhi reza sabbaghi-nadooshan

wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. routing attacks on the networks, where a malicious node from sending data to the base station is perceived. in this article, a method that can be used to transfer the data securely to prevent attacks...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد گرمسار - دانشکده زبانهای خارجی 1389

previous studies have aimed at testing a hypothesis but the present study is data-first research in which researcher tries to form a theory from data rather than the use of data to test a hypothesis. this study aims at exploring teachers perceptions of the strengths and weaknesses of the current syllabus for college preparatory course. eight experienced teachers were selected to collect data du...

Journal: :Int. Arab J. e-Technol. 2009
Salah Alabady

In this paper a design and implementation of a network security model was presented, using routers and firewall. Also this paper was conducted the network security weakness in router and firewall network devices, type of threats and responses to those threats, and the method to prevent the attacks and hackers to access the network. Also this paper provides a checklist to use in evaluating wheth...

Journal: :IJCNIS 2014
Tope Olufon Carlene E.-A. Campbell Stephen Hole Kapilan Radhakrishnan Arya Sedigh

As computer networks become more critical to enterprises, it is inevitable that efficient security policies are designed, case in point: wireless networks, in order to effectively ensure the confidentiality, availability, and integrity of the data traversing these networks. The primary objective of this paper is to appropriately simulate an enterprise network, and evaluate the threats, and poss...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید