سبد خرید

نمایش یک نتیجه

A Survey of Security and Privacy in Big Data

0 از 5
0امتیاز
تومان

A Survey of Security and Privacy in Big Data

0 از 5
0امتیاز
تومان
Big data has been arising a growing interest in both scientific and industrial fields for its potential value.  However, before employing big data technology into massive applications, a basic but also principle topic should be investigated: security and privacy. In...

Basic Concepts and Taxonomy of Dependable and Secure Computing

0 از 5
0امتیاز
تومان
This paper gives the main definitions relating to dependability, a generic concept including as special case  such attributes as reliability, availability, safety, integrity, maintainability, etc. Security brings in concerns for confidentiality, in addition to availability and integrity. Basic definitions are...

Basic Concepts and Taxonomy of Dependable and Secure Computing

0 از 5
0امتیاز
تومان
This paper gives the main definitions relating to dependability, a generic concept including as special case  such attributes as reliability, availability, safety, integrity, maintainability, etc. Security brings in concerns for confidentiality, in addition to availability and integrity. Basic definitions are...

Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks

0 از 5
0امتیاز
تومان
Due to the inherent characteristics of resource-constrained sensors, communication overhead is always a major concern in wireless sensor networks (WSNs). Data aggregation is an essential technique to reduce the communication overhead and prolong network lifetime. Since data aggregation results are...

Enhancing DNS Security using Dynamic Firewalling with Network Agents

0 از 5
0امتیاز
تومان
In this paper we propose a solution to strengthen the security of Domain Name System (DNS) servers associated with one or more Top Level Domains (TLD). In this way we intend to be able to reduce the  security risk when...

Trust based approaches for secure routing in VANET: A Survey

0 از 5
0امتیاز
تومان
Vehicular Ad-hoc networks (VANETs) require trusted vehicles to vehicles communication. VANET is  multidimensional network in which the vehicles continuously change their locations. Secure routing is  imperative during the routing process to incorporate mutual trust between these nodes. Sometimes, the  malicious...

VLKM: Virtual Location -Based Key Management Scheme For Wireless Sensor Networks

0 از 5
0امتیاز
تومان
Designing an energy efficient key management scheme to secure Wireless Sensor Networks is a challenging task because sensor nodes in the network are resource constrained. If an initial key is used in the network lifetime, a key stolen by an...
درحال بارگذاری ...

کانال تلگرام تعلیم

دانلود کتاب و مقالعه

ورود به کانال TELEGRAM
CLOSE