نتایج جستجو برای: keywords network security

تعداد نتایج: 2667445  

2013
Sanjeev Shrivastava Reena Thakur

Mobile applications and mobile application environment of next generation networks require enhanced quality of service (QoS) to support user’s service level agreement (SLA). This paper presents an adaptation technique at transport layer to minimize the impact of varying and adverse network condition along with security and priority to satisfy the SLA. The paper extends the transport layer funct...

2011
A. A. Sattikar R. V. Kulkarni

Online Social Networks have become an important part of daily digital interactions for more than half a billion users around the world. The various personal information sharing practices that online social network providers promote have led to their success as innovative social interaction platforms. At the same time, these practices have raised much critique and concerns with respect to privac...

Journal: :مطالعات اوراسیای مرکزی 0
محمدحسن شیخ الاسلامی استادیار دانشکده روابط بین الملل وزارت امور خارجه مرتضی باقری دانشجوی دوره کارشناسی ارشد مطالعات منطقه ای وزارت امور خارجه

the chechen republic (commonly referred to as chechnya) is a part of vast territory of russian federation that has been a source of contention since collapse of the soviet :union:. identity elements and tattered cultural bonds have strained ties between two nations of chechnya and russia. various aspects of crisis in chechnya have been addressed by many theoretical approaches of international r...

2011
G. Murali

Network Security Scanner (NSS) is a tool that allows auditing and monitoring remote network computers for possible vulnerabilities, checks your network for all potential methods that a hacker might use to attack it. Network Security Scanner is a complete networking utilities package that includes a wide range of tools for network security auditing, vulnerability Auditing, scanning, monitoring a...

Journal: :Int. J. Web Service Res. 2017
Shashank Gupta Brij Bhooshan Gupta

ThisarticleintroducesadistributedintelligencenetworkofFogcomputingnodesandClouddata centresforsmartdevicesagainstXSSvulnerabilitiesinOnlineSocialNetwork(OSN).Thecloud datacentrescomputethefeaturesofJavaScript,injectsthemintheformofcommentsandsavedthem inthescriptnodesofDocumentObjectModel(DOM)tree.ThenetworkofFogdevicesre-executes the...

2010
DeShu Lin TingLei Huang

Increasingly widespread application of mobile agent, mobile agent system’s security is a prominent problem to be solved, mobile agent’s security question is critical. In this paper, based on cryptography, computer network security, mobile agent security architecture at the same time gives the practical methods and suggested ways can be used in other new security measures. The core problem is ho...

2014
Glory Rashmi

Detection of node replication attacks is a challenging task in mobile sensor networks. Most of the existing system used to detect node replication using witness finding strategy which cannot be applied to mobile networks, because in mobile sensor networks nodes frequently change its location within the network or move to other network. Velocity exceeding strategy used in existing system in mobi...

2014
Azra Shamim

Security methodologies are constantly changing and improving hence becoming a challenge for IT organization to keep their posture up-to-date and effective. It may be productive to examine different security postures to create and improve organization’s information security architecture. This paper discusses about defense in depth model and strategy to implement it effectively. Also fructificati...

2014
Wanqing You Kai Qian Xi He Ying Qian

In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits ...

Journal: :CoRR 2012
Heba Ezzat Ibrahim Sherif M. Badr Mohamed A. Shaheen

Security of computers and the networks that connect them is increasingly becoming of great significance. Intrusion detection system is one of the security defense tools for computer networks. This paper compares two different model Approaches for representing intrusion detection system by using decision tree techniques. These approaches are Phase-model approach and Level-model approach. Each mo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید