نتایج جستجو برای: security level

تعداد نتایج: 1235388  

2013
Panduranga H T Naveen Kumar S K

Information security is very important task in the field of information and communication technology. Encryption is one way to secure information. In this paper we present combined concept of pixel and position manipulation technique for image encryption. The proposed technique involves three stages. In first stage pixel position manipulation is done by using pixel shuffling block where index v...

2013
Nayer A. Hamidi G. K. Mahdi Rahimi Alireza Nafarieh Ali Hamidi Bill Robertson

Personalized security in E-banking is an important issue for many individuals and companies that are looking for achieving the proper level of security. The cloud environment is a suitable infrastructure to implement personalized security mechanisms for many big companies such as banks. Employing mandatory access controls boosts the security of E-banking to a high level. Flask architecture is t...

Journal: :انسان پژوهی دینی 0
حمید حبیبی دانشجوی دکتری امنیت ملی دانشگاه عالی دفاع ملی و مربی گروه علوم سیاسی مجتمع آموزش عالی شهید محلاتی

regarding extensive domain of islamic teachings including all aspects of human life following as individual, social, spiritual, physical and material issues and noting close relations of the humanities with this dimensions, a deep bond between islam and the humanities including management and education is revealed. to attain an islamic understanding of relationship between the dimensions of the...

Assessing an individual's ability to perform effectively, efficiently performing social skills, and social roles in order to enhance the feeling of security as a matter of empowering quality of life can lead to the necessary correlation between social health and a feeling of Security. The purpose of this study is to investigate the significant structural relationship of variables at the level o...

2015
Deepika Sharma

In this paper we specify a set of security services and architecture of agent which is based upon mobile system. The security services are mainly divide into three main classes which is named as security services for protection of execution platform, protecting agent using security services ,communication for security services. We also describe functionality of security and where functionality ...

2005
Jingguo Wang Abhijit Chaudhury H. Raghav Rao

Information technology security investment is receiving increasing attention in recent years. Various methods have been proposed to determine the effective level of security investment. In this paper, we introduce an extreme value approach to address the issues of effective budgeting and investing in IT security. In our model, the security status of a system depends on two factors: system secur...

Journal: :Fuzzy Sets and Systems 2006
Jing Nie Jiangchua Wen Ji Luo Xin He Zheng Zhou

In ad hoc networks, designing a secure routing protocol is critical. The FLSL (FuzzyLogicBased Security-Level Routing Protocol) routing protocol is proposed in this paper. The basic idea of FLSL is to utilize the “local multicast” mechanism and the Security-Level to select the highest Security-Level route. The proposed algorithm of Security-Level is an adaptive fuzzy logic based algorithm that ...

Journal: :JNW 2009
Reijo Savola Habtamu Abie

We propose an integrated security measurement architecture and framework for a dynamic self-organizing monitoring system based on mobile ad hoc networks (MANETs), structured according to currently known security challenges. The aim is to predict, as well as to monitor, the security performance, concentrating on the principal effects contributing to it. We introduce an on-thefly security level e...

Journal: :CoRR 2018
Endang Kurniawan Imam Riadi

this research was conducted to find out the level of information security in organization to give recommendations improvements in information security management at the organization. This research uses the ISO 27002 by involving the entire clause that exists in ISO 27002 check-lists. Based on the analysis results, 13 objective controls and 43 security controls were scattered in 3 clauses of ISO...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید