نتایج جستجو برای: network security

تعداد نتایج: 818903  

Background: Social network in older adults refers to the interpersonal relationships and the perception of these relationships. Given the importance of the social network, the current study was conducted to answer three pivotal questions. First, do personal and district factors affect the social network of the elderly? Second, how much share do the personal and district factors have in the soci...

The issue of unit commitment is one of the most important economic plans in power system. In modern and traditional power systems, in addition to being economical of the planning, the issue of security in unit operation is also of great importance. Hence power system operation confronts units’ participation and input considering network security constrains. The issue of units’ participation is ...

bag-mohammadi, Mozafar, Pishdar, Mohammad, Seifi, Younes,

RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...

2015
Ankit Naik

Several Network systems are suffering from various security threats including network worms, large scale network attacks, etc, and network security situation awareness is an effective way for solve these problems. The general process is to perceive the network security events happened in a certain time period and cyberspace environment, synthetically manipulate the security data, analyse the at...

Journal: :the modares journal of electrical engineering 2016
mustafa gholami gvrvg gharehpetian mohammad mohammadi

due to the high penetration of wind farms in the networks, they can have a significant role in the control of power systems. in this paper, wind farms (wfs) are used to improve the static security margins of the power system. generation rescheduling is one of the remedies to improve the static security margins of the power system. in this paper, the generation rescheduling is presented based on...

Journal: :IEICE Transactions 2008
Koji Nakao

1. Scope The major topics include, but are not limited to: ‐ Security Technologies on (Network, AdHoc Network, P2P, Sensor Network, RFID, Wireless Network, Mobile Network, Home Network, NGN, and Future Internet) ‐ Access Control, Content Security, DRM, CDN, Privacy Protection, E-Commerce, PKI, Security Architecture, Security Protocol, Security Implementation, Technologies, Secure OS, Security E...

Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید