نتایج جستجو برای: keywords network security
تعداد نتایج: 2667445 فیلتر نتایج به سال:
The energy need is growing rapidly due to the population growth and the large new usage of power. Several works put considerable efforts to make the electricity grid more intelligent to reduce essentially energy consumption and provide efficiency and reliability of power systems. The Smart Grid is a complex architecture that covers critical devices and systems vulnerable to significant attacks....
The survey and classification of the different security attacks in structured peer-to-peer (P2P) overlay networks can be useful to computer system designers, programmers, administrators, and users. In this paper, we attempt to provide a taxonomy of structured P2P overlay networks security attacks. We have specially focused on the way these attacks can arise at each level of the network. Moreove...
A Wireless Network is a wireless communication system that allows computers and workstations to communicate and exchange data with each other using electromagnetic waves as the transmission medium. WLAN is commonly referred to as “Wi-Fi” (wireless fidelity). Wireless local area networks give freedom to one move their wireless devices from one place to other within their offices and organization...
To speed up the forwarding characteristics of routers Internet engineering task force (IETF) developed Multiprotocol Label Switching or MPLS technology .This technology is very much efficient than usual IP routing as it uses a label switching technique. For security purpose there are various encryption algorithms like symmetric (AES, DES, Triple DES , blowfish, CAST,RC5 ) or asymmetric( DiffieH...
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly con gured nodes can severely a ect the network as all nodes participate in the routing task. For these reasons, it is important to check the validity of ad hoc protocols, to verify whether the running implementation is conf...
Wireless Multimedia Sensor Network (WMSN) is a collection of multimedia sensors embedded with CMOS cameras and Microphones which are wirelessly interconnected devices that are able to retrieve multimedia content such as video and audio streams, still images and scalar sensor data from the environment. To capture the image, video Wireless Multimedia Sensor nodes (WMSn) are to be deployed. Routin...
In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is t...
Although system administrators are frequently urged to protect the machines in their network, the fact remains that the decision to protect is far from universal. To better understand this decision, we formulate a decision-theoretic model of a system administrator responsible for a network of size n against an attacker attempting to penetrate the network and infect the machines with a virus or ...
Mobile Ad-Hoc Networks (MANETs) are becoming increasingly popular as more and more mobile devices find their way to the public, besides ―traditional‖ uses such as military battlefields and disaster situations. They are being used step by step in every-day stages. With this increased usage of MANETs comes the need for making the networks secure as well as efficient, something that is not readily...
This paper proposes a VPN Accelerator Board (VPN-AB), a virtual private network (VPN) protocol designed for trust channel security system (TCSS). TCSS supports safety communication channel between security nodes in internet. It furnishes authentication, confidentiality, integrity, and access control to security node to transmit data packets with IPsec protocol. TCSS consists of internet key exc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید