Showing 1 - 20 results of 81 for search 'NETWORK SECURITY', query time: 0.96s Refine Results
  1. 1
    by Gudapati, Supriya
    Published 2015
    ... especially for MANETs. To ensure higher security and reduce the network overhead and delay, we use a...
    Get full text
  2. 2
    by Wood, Christopher A.
    Published 2018
    ...-to-end encryption. This reduces security to data transport instead of data itself. Content-Centric...
    Get full text
  3. 3
    by Neise, Patrick
    Published 2018
    ...<p> Organizations of all types and their computer networks are constantly under threat of attack...
    Get full text
  4. 4
    by Johnston, Reece G.
    Published 2016
    ...<p> In this paper, we describe a secure distributed storage model to be used especially...
    Get full text
  5. 5
    by Freet, David Nathan
    Published 2017
    ... and logged network data within the domains of network security, network and cloud forensics, attack...
    Get full text
  6. 6
    by Matta Veera Venkata, Sudheer
    Published 2015
    ... network, data confidentiality, efficiency and data security are the basic requirements. A protocol, which...
    Get full text
  7. 7
    .... The ability to connect multiple disparate processors, is possible due to the use of a secure minimalistic...
    Get full text
  8. 8
    by Rao, Ashish Rao Janardhan
    Published 2015
    ... Switching (MPLS) backbone cloud between two locations and to implement network security by applying enable...
    Get full text
  9. 9
  10. 10
    by Talhi, Chamseddine
    Published 2007
    ... to its security, portability, mobility and network support features. The platform of choice...
    Get full text
    Others
  11. 11
    by Li, Lifeng
    Published 2017
    ... backsides. This thesis proposes three new solutions to address security, computation and data issues...
    Get full text
  12. 12
    by Verma, Yukti
    Published 2016
    ... including sensors, edge routers, web interfaces, endpoints to the IoT network and access control. Several...
    Get full text
  13. 13
    by Ellithorpe, James O.
    Published 2016
    ...<p> Business organizations are faced with an enormous challenge to improve cyber security...
    Get full text
  14. 14
    by Corser, George P.
    Published 2016
    ... in vehicular network privacy has not thoroughly considered vehicular mobility patterns. Previous work...
    Get full text
  15. 15
    by Saed, Mustafa
    Published 2019
    ... grid networks will be performed. Finally, a technique for verifying the security of the three developed...
    Get full text
  16. 16
    by Wadhwa, Preeti H.
    Published 2015
    ... of various security attacks on the network. Broadcast communication has well known advantages in large scale...
    Get full text
  17. 17
    by Nur, Abdullah Yasin
    Published 2019
    ... operators to enhance the reliability and security of their networks; allows network engineers to improve...
    Get full text
  18. 18
    by Okoye, Stella Ifeyinwa
    Published 2017
    ... the effects of information security threats: network security, physical security, strong password policy...
    Get full text
  19. 19
    by Schmalen, Daniel
    Published 2018
    ... connection to a third-party company, to avoid security leaks in the owner&rsquo;s network. Furthermore...
    Get full text
  20. 20
    by Zonenberg, Andrew D.
    Published 2015
    ...<p> Security of monolithic kernels, and even microkernels, relies on a large and complex body...
    Get full text