Filters








449,173 Hits in 4.7 sec

Adu, K.K. and Adjei, E. (2018). The phenomenon of data loss and cyber security issues in Ghana. Foresight, 20(2), 150–61. Ahmed, M.T.U., Bhuiya, N.I. and Rahman, M.M. (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017. Alanazi, S.T., Anbar, M., Ebad, S.A., Karuppayah, S. and Al-Ani, H.A. (2020). Theory-based model and prediction analy ...

Emad Al Khoufi
2021 Basic and Applied Sciences - Scientific Journal of King Faisal University  
This finding helps to guide the treatment strategy for both genders.  ...  Materials and Methods Study Design: This is an observational cross-sectional study based on a random collection of data from the electronic files of patients visiting the emergency department at the  ...  Numerical data were tested for distribution normality. Proportions, ratio and frequency of expression were used for categorical data, and Chi square and t-test were used for comparison.  ... 
doi:10.37575/b/med/0038 fatcat:5h5phkn4jjfvfceg4xasfjxsmy

A Novel Security Approach for Access Model

Teena Jaiswal, Umesh Kumar, Shabana Sheikh
2016 International Journal of Computer Applications  
In vision of the importance of researcher's sharing the same theory of network security, this paper suggests a novel security approach for network security in which network security issues can be treated  ...  The act of the network itself in computer network security has been minimum , as systems certainly preserve their own security.  ...  NETWORK SECURITY MODELS 4.1 Model Design Characteristics Straight models Computer networks- In most computer network models; the network itself provides denial security within the computer network-only  ... 
doi:10.5120/ijca2016908953 fatcat:qwvskf5eqjay3g3ppshibh3ef4

CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)

PETER
2020 Zenodo  
in Wireless Networks Security and Privacy issues in Ad Hoc and Sensor Networks Reliability, Resiliency and [...]  ...  Topics of interest include but are not limited to, the following Wireless mesh networks and cognitive networks Vehicular Networks and Protocols Mobile Ad Hoc Networks Sensor Networks MAC layer design for  ...  and Theories in Cloud Computing  The Open Cloud: Cloud Computing and Open Source  HPC on Cloud  Map Reduce Techniques & Application SecuritySecurity Techniques for the Cloud  Trust, Security, Privacy  ... 
doi:10.5281/zenodo.4022109 fatcat:ym3oqv3p4rhnhdqorzharw24l4

A Study on Security and Privacy Issues of Cloud Eco-System

Manu A.R, V. K Agrawal, K N Bala Subramanya Murthy
2013 International Journal of Applied Information Systems  
In this paper we present a framework for unified security design which may help to resolve privacy, trust and security challenges that are faced in cloud-based networks.  ...  Cloud computing is an Internet-based model for enabling appropriate on -demand network gateway to the pooled setup of computing resources and related infrastructure on sharing basis.  ...  computer network Domain related issues.  ... 
doi:10.5120/ijais13-450931 fatcat:bpvtdekqvnak3ha7az4kh74ufy

A Review Study on Cloud Computing Issues

Qusay Kanaan Kadhim, Robiah Yusof, Hamid Sadeq Mahdi, Sayed Samer Ali Al-shami, Siti Rahayu Selamat
2018 Journal of Physics, Conference Series  
Nevertheless, cloud computing is still in its premature stage and experiences lack of standardization. The security issues are the main challenges to cloud computing adoption.  ...  This study aims to review and classify the issues that surround the implementation of cloud computing which a hot area that needs to be addressed by future research.  ...  Acknowledgements The authors would like to thank INSFORNET Research Group of Universiti Teknikal Malaysia Melaka for supporting this research  ... 
doi:10.1088/1742-6596/1018/1/012006 fatcat:nataqduwmrdq5j2fycgrx6gqzi

A Survey on Use Cases and Security Issues in Fog Computing

Vaijayanti H. Panse
2018 Helix  
security issues as well as time constraints.  ...  The cloud faces many issues like high latency, network failure, low storage capacity, extra computational capability and high computational power due to centralized server approach.  ...  In this paper, we surveyed some of the related works for securing fog computing in IOT applications. M. Mukherjee, et al. (2017) identified different issues in security and privacy of fog networks.  ... 
doi:10.29042/2018-4413-4417 fatcat:5tjpvrghtvfhtj4gdd3yucfg2y

Guest Editorial: Advances in Secure Distributed and Network-Based Computing

Igor V. Kotenko
2016 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
The issue focuses on problems related to authentication, privacy, vulnerability analysis and design of secure embedded devices for parallel, distributed and network-based systems.  ...  This special issue includes four papers that outline different aspects of security in parallel, distributed and network-based computing. These papers are selected from pa-  ...  Ilsun You, Editor in Chief of the JoWUA for his invaluable support throughout this special issue preparation. Igor Kotenko Guest Editor June 2016  ... 
doi:10.22667/jowua.2016.06.31.001 dblp:journals/jowua/Kotenko16 fatcat:t4xx7zm5lndpdbpgem7pc5tsja

A Review of Protocols Design in Secure and Efficient Authentication in Wireless Sensor Networks

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
It is observed that the need for a secure and efficient authentication protocol is still in demand, owing to the real issues like identity overheads, information retrieval and location mining.  ...  Majority of the applications demand confidentiality and integrity of the shared information using Wireless Sensor Networks (WSNs).  ...  Thus, a secured mutual authentication protocol was designed for improving the privacy of the industrial sensor networks.  ... 
doi:10.35940/ijitee.i7205.079920 fatcat:ze7gjtaj4jgs5blai3zyozidqe

A Review of Network Security

El-Sayed M. El-Alfy
2007 IEEE Distributed Systems Online  
Contemporary classic books on computer networks generally dedicate at least one chapter to security issues.  ...  Krawetz uses his expertise in computer forensics, cryptography, and software solutions to provide useful concepts and techniques for designing, developing, and maintaining secure networks-but in a nutshell  ... 
doi:10.1109/mdso.2007.40 fatcat:f427zedhtnfd5a2sv4l2pbjdr4

Experiences and lessons learned in the design and implementation of an Information Assurance curriculum

Sreekanth Malladi, Omar El-Gayar, Kevin Streff
2007 2007 IEEE SMC Information Assurance and Security Workshop  
In 2004, Dakota State University proposed a model for information assurance and computer security program development.  ...  The paper details modifications to both the undergraduate and graduate information assurance programs as a result of specific issues and challenges.  ...  While software security was infused in many of these network security courses, the program lacked focus on the issues and solutions surrounding designing, building and testing software. 2.  ... 
doi:10.1109/iaw.2007.381909 fatcat:g7wdtdq3njcznnxph6zouljpoa

A Review on Data protection and privacy in Fog Computing Network

Babitha M N, Siddappa M
2021 International Research Journal on Advanced Science Hub  
These works studies the existing solutions for information protection in and secure information processing as well as load balancing at network edges of Fog computing network.  ...  The advantages come with a risk in terms of data security and information leakage. With computing at network edge, the breach on privacy of data generator is also a severe risk.  ...  It is designed for highly secure transmission of data in IOT networks. The model is very secure and more suitable for IOT due to short public parameters.  ... 
doi:10.47392/irjash.2021.101 fatcat:tcot7a5or5harnmsm3nf2snfjy

Cloud Computing in VANETs: Architecture, Taxonomy, and Challenges

Ahmed Aliyu, Abdul Hanan Abdullah, Omprakash Kaiwartya, Yue Cao, Mohammed Joda Usman, Sushil Kumar, D. K. Lobiyal, Ram Shringar Raw
2017 IETE Technical Review  
The taxonomy of CC-V is presented considering four major issues including design of architecture, data dissemination, security and application development.  ...  A taxonomy for CC-V is presented considering major themes of research in the area including design of architecture, data dissemination, security, and applications.  ...  CC-V has four major issues, namely, design of architecture, data dissemination, security, and applications.  ... 
doi:10.1080/02564602.2017.1342572 fatcat:ooyjke73gzedvi7wugizvim4km

Information Assurance and IT Management: The Key Issues, Solutions in Indian Scenario based on International Trends

P. K. Paul, P Sreeramana Aithal
2019 Zenodo  
The wider applications of IT subfields for different purposes lead the concern of security and that includes in its all the sub fields.  ...  Initially, IT treated as a small domain but gradually different areas have been added into it and this includesweb technology, network technology, database technology, etc.  ...  areas and these are including as follows- Network Security: Issues and Concern Network Security is an important concern within IT Security andwidely become known and responsible for the handling different  ... 
doi:10.5281/zenodo.3594253 fatcat:euhez34xmfb3xbkjdfh6ez6bdu

Cyber Security to Information Assurance: The Changing World of Cyber Sciences

P. K. Paul, P. S. Aithal
2019 Zenodo  
When crime involves with computer and network, it is called as cyber-crime. This kind of offence mainly undertake by an individual or group to an individual or group.  ...  Such as Cyber crime, Cybernetics, Cyber space, Cyber hygiene, Cyber warfare, Cyber organism, Cyber law, Cyber attack, Cyber culture, Cyber age, Cyber café, Cyber security, Cyber forensic.  ...  The usefulness of the computer networks comes with a drawback and issue i.e. security and privacy and here the concept of network security changed the entire shift of computation and Network Informatics  ... 
doi:10.5281/zenodo.3354153 fatcat:hlcgb5po45f53e7gitssqgzr4u

Mobile Computing Broadband Networks

K. Ramya
2017 International Journal for Research in Applied Science and Engineering Technology  
The many issues to be dealt with stem from three essential properties of mobile computing: communication, mobility and portability.  ...  As more and more people enjoy the various brought by mobile computing, it is becoming a global trend in today's world. at the same time, securing mobile computing has been paid increasing attention.  ...  TCP works is unsuitable for wireless network as it interprets errors as packet loss. V. SECURITY ISSUES Many authors have presented classifications of security issues in communication networks.  ... 
doi:10.22214/ijraset.2017.2045 fatcat:ch2emctqi5grvospmpf42xpexi
« Previous Showing results 1 — 15 out of 449,173 results