نتایج جستجو برای: keywords network security

تعداد نتایج: 2667445  

In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...

2016
S. Preethi R. Senthil Kumaran

The Internet of things (IoT) has become a significant element of next generation. IoT is a proposed development of the internet in which the objects have network connectivity able to transmit and receive data. The IoT applications such as smart homes, smart cities and health care. WSN is an important technology of IoT. Typically sensor nodes are considered resource constrained device with limit...

2015
Rohini Rawat Deepti Sharma

Vehicular Ad-hoc Network (VANET) is taking more attention in automotive industry due to the safety concern of human lives on roads. Security is one of the safety aspects in VANET. To be secure, network availability must be obtained at all times since availability of the network is critically needed when a node sends any life critical information to other nodes. However, it can be expected that ...

2009
Souleymane Oumtanaga

The security of their network remains the priorities of almost all companies. Existing security systems have shown their limit; thus a new type of security systems was born: honeypots. Honeypots are defined as programs or intended servers which have to attract pirates to study theirs behaviours. It is in this context that the leurre.com project of gathering about twenty platforms was born. This...

2015
Sami Albouq Khalid Alghamdi Mohamed Zohdy

Connected vehicles form a self-organized network without a priori fixed infrastructure. However, due to the lack of centralization, they are vulnerable to security attacks, and in order provide security against malicious attacks, Intrusion Detection Systems (IDSs) are being developed for major protection. In this paper, we propose a new scheme for IDSs based on neural networks, which is the Sel...

2012
Muhammad R Ahmed Xu Huang

Developments in communication technologies especially in wireless have enabled the progress of low-cost and lowpower wireless sensor networks (WSNs). The features of such WSN are holding minimal energy, weak computational capabilities, wireless communication and an open-medium nature where sensors are deployed. WSN is underpinned by application driven such as military applications, the health s...

2010
NGUYEN Thi Hoang Lan NGUYEN Van Toan

— In a network, for remote accessing to a database server (DB Server) user usually has an account with a username and a password. But in fact, the password can be lost, cracked, stolen and the authentication process can be attacked (man-inthe-middle attack...). Current approach for BioPKI system based on physiological characteristics of persons, known as biometrics, provide solutions to securit...

Journal: :CoRR 2016
Mahmoud Samir Fayed Muhammad Khurram Khan

The Facebook Social network is very famous and widely used by millions of users all over the world. Facebook comes with high level of usability so users can easily find their friends and connect to them, but there are security issues related to this process where the attacker can make same-site or crosssite profile cloning attacks to get other users data. In this paper we will identify advanced...

2012
Zied Trifa

The survey and classification of the different security attacks in structured peer-to-peer (P2P) overlay networks can be useful to computer system designers, programmers, administrators, and users. In this paper, we attempt to provide a taxonomy of structured P2P overlay networks security attacks. We have specially focused on the way these attacks can arise at each level of the network. Moreove...

2011
Mohsen A. M. El-Bendary Atef Abou El-Azm Nawal El-Fishawy Farid Shawki Mostafa A. R. El-Tokhy Fathi E. Abd El-Samie H. B. Kazemian

The security is important issue in wireless networks. This paper discusses audio watermarking as a tool to improve the security of image communication over the IEEE 802.15.4 ZigBee network. The adopted watermarking method implements the Singular-Value Decomposition (SVD) mathematical technique. This method is based on embedding a chaotic encrypted image in the Singular Values (SVs) of the audio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید