نتایج جستجو برای: security threats
تعداد نتایج: 201039 فیلتر نتایج به سال:
Because of prevalent threats to SoHo based ADSL Routers, many more devices are compromised. Whilst an end-user may be at fault for not applying the appropriate security mechanisms to counter these threats, vendors should equally share the blame. This paper reveals that the lack of security related content and poor overall design could impact on end-users’ interpretation and willingness to imple...
The advent of M2M communication brings with it numerous challenges, including those in security, that traditional communication models have not yet addressed. Particularly, due to their inherent un-guarded, low cost and mass-deployed nature, M2M devices, and wireless communication architectures and solutions for such devices, would invite new threats in security. These threats may not be fully ...
peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...
With the development of VoIP (Voice over IP) service, new security threats are expected to be appeared. However, existing IP network security solutions can not detect new VoIP specified network threats because they can not reflect characteristics of VoIP. In this paper, we propose a novel system that can monitor VoIP service and detect VoIP network threats practically. The proposed system colle...
the security is a divine grace with which a person can live commonly and peacefully, by enjoying a secure situation. the right for enjoying this situation is called, the right of security. considering the implication between supporting the of security and taking the individual right, the most important benefit which a person gets in this situation, is his ability to perfome and to take his own ...
Introduction..................................................................... Security Strata................................................................. Low-Level Security Needs.......................................... Mid-Level Security Needs .......................................... High-Level Security Needs......................................... A Security Platform................
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید