نتایج جستجو برای: telecommunication security

تعداد نتایج: 187202  

Journal: :Future Generation Comp. Syst. 2017
Rubén Trapero Jolanda Modic Miha Stopar Ahmed Taha Neeraj Suri

– Cloud computing is increasingly playing an important role in the service provisioning domain given the economic and technological benefits it offers. The popularity of cloud services is increasing but so are their customers’ concerns about security assurance and transparency of the Cloud Service Providers (CSPs). This is especially relevant in the case of critical services that are progressiv...

2015
Alexey Smirnov Mohamad Abou Taam Sergey Smirnov

I. DEFINITION OF PROBLEM In current conditions of dynamic development of various approaches of the analysis and synthesis of the telecommunication networks integrated into information and telecommunication technology [1-5] there are questions of elaboration and application of the general methods of ensuring service quality based on allocation of separate classes of quality and realization of ma...

Journal: :Journal of the American Medical Informatics Association : JAMIA 2004
Charles Sneiderman Michael J. Ackerman

Cellular radio telecommunication has increased exponentially with many applications to health care reported. The authors attempt to summarize published applications with demonstrated effect on health care, review briefly the rapid evolution of hardware and software standards, explain current limitations and future potential of data quality and security, and discuss issues of safety.

2011
Martin Möller Rainer Bye Karsten Bsufka Seyit Ahmet Çamtepe Sahin Albayrak

We present a virtual test bed for network security evaluation in mid-scale telecommunication networks. Migration from simulation scenarios towards the test bed is supported and enables researchers to evaluate experiments in a more realistic environment. We provide a comprehensive interface to manage, run and evaluate experiments. On basis of a concrete example we show how the proposed test bed ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده حقوق 1389

abstract the third millennium has started, but the world is facing with serious challenges in achieving international security and peace. various human rights violations have lead the states to find means to protect human rights. also article 55 of the united nations charter introduces the respect to human rights and fundamental freedom as the most suitable ways to realize peace and security. ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1391

this research is about the political economy of china in central asia. in this research the political & economic interactions affected on chinas political economy in central asia are examined. chinas goal of presence in central asia including political-security, economic and energy goals is described in one part. in another part, the trade relations between china and central asian countries ar...

2012

Air conditioners are commonly used to keep electronics cool in various areas, such as industrial automation, telecommunication equipment, security and defense systems as well as other indoor and outdoor electronics applications. The electronics may be housed in protective enclosures, where air conditioners deliver cooled air to keep the entire enclosure at desired temperatures for optimum elect...

2016
Linas Laibinis Elena Troubitsyna Inna Pereverzeva Ian Oliver Silke Holtmanns

The number of security attacks on the telecommunication networks is constantly increasing. To prevent them, the telecom sector is looking for new automated techniques facilitating a discovery of potential network vulnerabilities and rectification of them. In this paper, we propose an approach for identifying potential attack scenarios and defining recommendations for preventing them. The approa...

2010
Murtaza Naveed Akhtar Abid Ali Minhas Jehanzeb Ahmad

The user authentication process is an important task in mobile networks. With the development of new standard Universal Mobile Telecommunication System (UMTS), the security weaknesses of previous standards are removed. However one security weakness has been found by researchers in UMTS, which is the sending of user's International Mobile Subscriber Identity (IMSI) in plain text over the air int...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید