نتایج جستجو برای: telecommunication security
تعداد نتایج: 187202 فیلتر نتایج به سال:
– Cloud computing is increasingly playing an important role in the service provisioning domain given the economic and technological benefits it offers. The popularity of cloud services is increasing but so are their customers’ concerns about security assurance and transparency of the Cloud Service Providers (CSPs). This is especially relevant in the case of critical services that are progressiv...
I. DEFINITION OF PROBLEM In current conditions of dynamic development of various approaches of the analysis and synthesis of the telecommunication networks integrated into information and telecommunication technology [1-5] there are questions of elaboration and application of the general methods of ensuring service quality based on allocation of separate classes of quality and realization of ma...
Cellular radio telecommunication has increased exponentially with many applications to health care reported. The authors attempt to summarize published applications with demonstrated effect on health care, review briefly the rapid evolution of hardware and software standards, explain current limitations and future potential of data quality and security, and discuss issues of safety.
We present a virtual test bed for network security evaluation in mid-scale telecommunication networks. Migration from simulation scenarios towards the test bed is supported and enables researchers to evaluate experiments in a more realistic environment. We provide a comprehensive interface to manage, run and evaluate experiments. On basis of a concrete example we show how the proposed test bed ...
abstract the third millennium has started, but the world is facing with serious challenges in achieving international security and peace. various human rights violations have lead the states to find means to protect human rights. also article 55 of the united nations charter introduces the respect to human rights and fundamental freedom as the most suitable ways to realize peace and security. ...
this research is about the political economy of china in central asia. in this research the political & economic interactions affected on chinas political economy in central asia are examined. chinas goal of presence in central asia including political-security, economic and energy goals is described in one part. in another part, the trade relations between china and central asian countries ar...
Air conditioners are commonly used to keep electronics cool in various areas, such as industrial automation, telecommunication equipment, security and defense systems as well as other indoor and outdoor electronics applications. The electronics may be housed in protective enclosures, where air conditioners deliver cooled air to keep the entire enclosure at desired temperatures for optimum elect...
The number of security attacks on the telecommunication networks is constantly increasing. To prevent them, the telecom sector is looking for new automated techniques facilitating a discovery of potential network vulnerabilities and rectification of them. In this paper, we propose an approach for identifying potential attack scenarios and defining recommendations for preventing them. The approa...
The user authentication process is an important task in mobile networks. With the development of new standard Universal Mobile Telecommunication System (UMTS), the security weaknesses of previous standards are removed. However one security weakness has been found by researchers in UMTS, which is the sending of user's International Mobile Subscriber Identity (IMSI) in plain text over the air int...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید