نتایج جستجو برای: keywords network security
تعداد نتایج: 2667445 فیلتر نتایج به سال:
Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level...
In the current internet world where peoples are connected through communication channel and most of their data is hosted on the internet connected resources. Therefore the security is the major concern of this internet community to protect the resources and to protect the data hosted on these networks. In current trends, most of the end user are relying on the end security products such as Anti...
A wireless Sensor network(WSN) is a group of sensor nodes cooperating to form a network over a wireless link based on zero fixed network infrastructure. The main idea is to make sensor node cheap and easily deployed every where to create a omnipresent network with smart geographical distribution.WSN become demanding because of its service towards wide range of applications. But constraints are ...
Cloud computing enables the sharing of resources such as storage, network, applications and software through internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they use. However, despite all cloud benefits there are many security concerns related to hardware, virtualization, network, data and service providers that act as a signific...
Cooperative communications can significantly enhance transmission reliability and bandwidth efficiency in wireless networks. However, the impact of cooperative communications on network-level upper layer issues, such as topology control, routing and network capacity, is largely ignored. At the same time, security is an important issue in MANETs and existing security schemes have significant imp...
Several wireless networks security standards have been proposed and widely implemented in both business and home environments in order to protect the network from unauthorized access. However, the implementation of such standards is usually achieved by network administrators without even knowing the standards’ weaknesses and strengths. The intention of this paper is to evaluate and analyze the ...
The paper surveyed and compared various secure routing protocols for the mobile ad hoc networks (MANETs). MANETs are vulnerable to various security threats because of its dynamic topology and selfconfigurable nature. Security attacks on ad hoc network routing protocols disrupt network performance and reliability. The paper significantly based on base routing protocol AODV and Secure protocol ba...
Data security and energy aware communication are key aspects in design of modern ad hoc networks. In this paper we investigate issues associated with the development of secure IEEE 802.15.4 based wireless sensor networks (WSNs) – a special type of ad hoc networks. We focus on energy aware security architectures and protocols for use in WSNs. To give the motivation behind energy efficient secure...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید