A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Adu, K.K. and Adjei, E. (2018). The phenomenon of data loss and cyber security issues in Ghana. Foresight, 20(2), 150–61. Ahmed, M.T.U., Bhuiya, N.I. and Rahman, M.M. (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017. Alanazi, S.T., Anbar, M., Ebad, S.A., Karuppayah, S. and Al-Ani, H.A. (2020). Theory-based model and prediction analy
...
2021
Basic and Applied Sciences - Scientific Journal of King Faisal University
This finding helps to guide the treatment strategy for both genders. ...
Materials and Methods
Study Design: This is an observational cross-sectional study based on a random collection of data from the electronic files of patients visiting the emergency department at the ...
Numerical data were tested for distribution normality. Proportions, ratio and frequency of expression were used for categorical data, and Chi square and t-test were used for comparison. ...
doi:10.37575/b/med/0038
fatcat:5h5phkn4jjfvfceg4xasfjxsmy
A Novel Security Approach for Access Model
2016
International Journal of Computer Applications
In vision of the importance of researcher's sharing the same theory of network security, this paper suggests a novel security approach for network security in which network security issues can be treated ...
The act of the network itself in computer network security has been minimum , as systems certainly preserve their own security. ...
NETWORK SECURITY MODELS 4.1 Model Design Characteristics
Straight models Computer networks- In most computer network models; the network itself provides denial security within the computer network-only ...
doi:10.5120/ijca2016908953
fatcat:qwvskf5eqjay3g3ppshibh3ef4
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
2020
Zenodo
in Wireless Networks Security and Privacy issues in Ad Hoc and Sensor Networks Reliability, Resiliency and [...] ...
Topics of interest include but are not limited to, the following Wireless mesh networks and cognitive networks Vehicular Networks and Protocols Mobile Ad Hoc Networks Sensor Networks MAC layer design for ...
and Theories in Cloud Computing The Open Cloud: Cloud Computing and Open Source HPC on Cloud Map Reduce Techniques & Application Security Security Techniques for the Cloud Trust, Security, Privacy ...
doi:10.5281/zenodo.4022109
fatcat:ym3oqv3p4rhnhdqorzharw24l4
A Study on Security and Privacy Issues of Cloud Eco-System
2013
International Journal of Applied Information Systems
In this paper we present a framework for unified security design which may help to resolve privacy, trust and security challenges that are faced in cloud-based networks. ...
Cloud computing is an Internet-based model for enabling appropriate on -demand network gateway to the pooled setup of computing resources and related infrastructure on sharing basis. ...
computer network Domain related issues. ...
doi:10.5120/ijais13-450931
fatcat:bpvtdekqvnak3ha7az4kh74ufy
A Review Study on Cloud Computing Issues
2018
Journal of Physics, Conference Series
Nevertheless, cloud computing is still in its premature stage and experiences lack of standardization. The security issues are the main challenges to cloud computing adoption. ...
This study aims to review and classify the issues that surround the implementation of cloud computing which a hot area that needs to be addressed by future research. ...
Acknowledgements The authors would like to thank INSFORNET Research Group of Universiti Teknikal Malaysia Melaka for supporting this research ...
doi:10.1088/1742-6596/1018/1/012006
fatcat:nataqduwmrdq5j2fycgrx6gqzi
A Survey on Use Cases and Security Issues in Fog Computing
2018
Helix
security issues as well as time constraints. ...
The cloud faces many issues like high latency, network failure, low storage capacity, extra computational capability and high computational power due to centralized server approach. ...
In this paper, we surveyed some of the related works for securing fog computing in IOT applications. M. Mukherjee, et al. (2017) identified different issues in security and privacy of fog networks. ...
doi:10.29042/2018-4413-4417
fatcat:5tjpvrghtvfhtj4gdd3yucfg2y
Guest Editorial: Advances in Secure Distributed and Network-Based Computing
2016
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
The issue focuses on problems related to authentication, privacy, vulnerability analysis and design of secure embedded devices for parallel, distributed and network-based systems. ...
This special issue includes four papers that outline different aspects of security in parallel, distributed and network-based computing. These papers are selected from pa- ...
Ilsun You, Editor in Chief of the JoWUA for his invaluable support throughout this special issue preparation.
Igor Kotenko Guest Editor June 2016 ...
doi:10.22667/jowua.2016.06.31.001
dblp:journals/jowua/Kotenko16
fatcat:t4xx7zm5lndpdbpgem7pc5tsja
A Review of Protocols Design in Secure and Efficient Authentication in Wireless Sensor Networks
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
It is observed that the need for a secure and efficient authentication protocol is still in demand, owing to the real issues like identity overheads, information retrieval and location mining. ...
Majority of the applications demand confidentiality and integrity of the shared information using Wireless Sensor Networks (WSNs). ...
Thus, a secured mutual authentication protocol was designed for improving the privacy of the industrial sensor networks. ...
doi:10.35940/ijitee.i7205.079920
fatcat:ze7gjtaj4jgs5blai3zyozidqe
A Review of Network Security
2007
IEEE Distributed Systems Online
Contemporary classic books on computer networks generally dedicate at least one chapter to security issues. ...
Krawetz uses his expertise in computer forensics, cryptography, and software solutions to provide useful concepts and techniques for designing, developing, and maintaining secure networks-but in a nutshell ...
doi:10.1109/mdso.2007.40
fatcat:f427zedhtnfd5a2sv4l2pbjdr4
Experiences and lessons learned in the design and implementation of an Information Assurance curriculum
2007
2007 IEEE SMC Information Assurance and Security Workshop
In 2004, Dakota State University proposed a model for information assurance and computer security program development. ...
The paper details modifications to both the undergraduate and graduate information assurance programs as a result of specific issues and challenges. ...
While software security was infused in many of these network security courses, the program lacked focus on the issues and solutions surrounding designing, building and testing software. 2. ...
doi:10.1109/iaw.2007.381909
fatcat:g7wdtdq3njcznnxph6zouljpoa
A Review on Data protection and privacy in Fog Computing Network
2021
International Research Journal on Advanced Science Hub
These works studies the existing solutions for information protection in and secure information processing as well as load balancing at network edges of Fog computing network. ...
The advantages come with a risk in terms of data security and information leakage. With computing at network edge, the breach on privacy of data generator is also a severe risk. ...
It is designed for highly secure transmission of data in IOT networks. The model is very secure and more suitable for IOT due to short public parameters. ...
doi:10.47392/irjash.2021.101
fatcat:tcot7a5or5harnmsm3nf2snfjy
Cloud Computing in VANETs: Architecture, Taxonomy, and Challenges
2017
IETE Technical Review
The taxonomy of CC-V is presented considering four major issues including design of architecture, data dissemination, security and application development. ...
A taxonomy for CC-V is presented considering major themes of research in the area including design of architecture, data dissemination, security, and applications. ...
CC-V has four major issues, namely, design of architecture, data dissemination, security, and applications. ...
doi:10.1080/02564602.2017.1342572
fatcat:ooyjke73gzedvi7wugizvim4km
Information Assurance and IT Management: The Key Issues, Solutions in Indian Scenario based on International Trends
2019
Zenodo
The wider applications of IT subfields for different purposes lead the concern of security and that includes in its all the sub fields. ...
Initially, IT treated as a small domain but gradually different areas have been added into it and this includesweb technology, network technology, database technology, etc. ...
areas and these are including as follows-
Network Security: Issues and Concern Network Security is an important concern within IT Security andwidely become known and responsible for the handling different ...
doi:10.5281/zenodo.3594253
fatcat:euhez34xmfb3xbkjdfh6ez6bdu
Cyber Security to Information Assurance: The Changing World of Cyber Sciences
2019
Zenodo
When crime involves with computer and network, it is called as cyber-crime. This kind of offence mainly undertake by an individual or group to an individual or group. ...
Such as Cyber crime, Cybernetics, Cyber space, Cyber hygiene, Cyber warfare, Cyber organism, Cyber law, Cyber attack, Cyber culture, Cyber age, Cyber café, Cyber security, Cyber forensic. ...
The usefulness of the computer networks comes with a drawback and issue i.e. security and privacy and here the concept of network security changed the entire shift of computation and Network Informatics ...
doi:10.5281/zenodo.3354153
fatcat:hlcgb5po45f53e7gitssqgzr4u
Mobile Computing Broadband Networks
2017
International Journal for Research in Applied Science and Engineering Technology
The many issues to be dealt with stem from three essential properties of mobile computing: communication, mobility and portability. ...
As more and more people enjoy the various brought by mobile computing, it is becoming a global trend in today's world. at the same time, securing mobile computing has been paid increasing attention. ...
TCP works is unsuitable for wireless network as it interprets errors as packet loss.
V. SECURITY ISSUES Many authors have presented classifications of security issues in communication networks. ...
doi:10.22214/ijraset.2017.2045
fatcat:ch2emctqi5grvospmpf42xpexi
« Previous
Showing results 1 — 15 out of 449,173 results