نتایج جستجو برای: keywords network security
تعداد نتایج: 2667445 فیلتر نتایج به سال:
This paper discusses in detail the theory of nonoptimum analysis on network systems. It points out that the main problem of exploring indefinite networks’ optimum lies in the lack of non-optimum analysis on the network system. The paper establishes the syndrome and empirical analysis based on the non-optimum category of the network security. At the same time, it also puts forward the non-optimu...
An ad hoc wireless network is a collection of wireless mobile nodes that self-configure to construct a network without the need for any established infrastructure or backbone. Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Due to the absence of any fixed infrastructure, it becomes difficult to make use of the existing routing techniques for network...
WirelessNetwork Environment poses its unique challenges to the existing Transaction models which are fail to solve. Wireless ad hoc networks (WANETs) experience serious security issues even when solutions employ preventive or reactive security mechanisms. In order to support both network operations and security requirements of critical applications, we present SANA, a Secure Ad hoc Network Arch...
Lately, Wireless Sensor Networks (WSNs) have become an emerging technology and can be utilized in some crucial circumstances like battlegrounds, commercial applications, habitat observing, buildings, smart homes, traffic surveillance and other different places. One of the foremost difficulties that WSN faces nowadays is protection from serious attacks. While organizing the sensor nodes in an ab...
Eliminate the eavesdropper collusion occurredby the two or more devices communicating via optimal relay with centralized router using IOT network. The overall delay is reduced with increase in throughput.This paper studies the important of Received signal strength of wireless communication under eavesdropper collusion where detecting the malicious node. To provide knowledge about the security i...
Network security is vital for securing all information that passed through network computer; hence network security is the most important element in information security. Security is one of the critical concern occurred in WSN due to limitations in computing and fixed resource. Wireless sensor network have a broad area of invaluable games, defence, civil, household, entertainment application. W...
Risk management is one of the most prominent concepts which has recently been brought into sharp focus regarding security issues in computer networks. Scientifically speaking, risk in the field of network security is a generalized matter leading the organization to the provision of resolutions which target resources and profits of the organization. This paper has discussed what methods are ...
In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy behavior. One of the main advantages of using Mobile Agent in a network is it reduces network traffic load. In an, ad hoc network Mobile Agent can be used to protect the network by using agent based IDS or IPS. Besides, to deploy dynamic software in the network or to retrieve information from net...
Communication is the important part in any type of network for making it possible to transfer data from one node to another. Communication needs quality and security for better performance and for acceptance of users and client companies. Quality is dependent on size and some other factors of network but security is very concern parameter in network as it is independent of network size and comp...
Ubiquitous computing allows to make data and services within the reach of users anytime and anywhere. This makes ubiquitous networks vulnerable to attacks coming from either inside or outside the network. To ensure and enhance networks security, several solutions have been implemented. These solutions are inefficient and/or incomplete. Solving these challenges in security with new requirement o...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید