Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
In this paper we propose techniques for securing big data environments such as public cloud with tenants using their virtual machines for different services such as utility and healthcare. Our model makes use of state based monitoring of... more
    • by 
    •   6  
      Computer ScienceInformation SecurityComputer NetworksComputer Security
Secure software development has received lots of attention in recent years due to the rise of security breaches attributed to software problems. There have been several studies that address software security from different perspectives:... more
    • by 
    •   7  
      Computer ScienceInformation TechnologySoftware SecurityLanguage-Level Support for Security
In current era, the proliferation of IoT devices has transformed our daily life to a new level and made our life easier. IoT devices have interconnected with each other for communing and sharing information to gateways or Access Points... more
    • by  and +1
    •   5  
      Information SecurityMachine LearningComputer SecurityIntrusion Detection System
Voice over IP (VoIP) is the technology allowing voice and multimedia transmissions as data packets over a private or a public IP network. Thanks to the benefits that it may provide, the VoIP technology is increasingly attracting attention... more
    • by 
    •   3  
      VoipVulnerabilitiesSecurity Attacks
A Mobile ad-hoc network (MANET) is a latest and emerging Research topic among researchers. The reason behind the popularity of MANET is flexibility and independence of network infrastructure. MANET has some unique characteristic like... more
    • by 
    •   4  
      Mobile Ad Hoc NetworksChallengesSecurity AttacksBlackhole Attacks
E-commerce Security is a part of the Information Security framework and is specifically applied to the components that affect e-commerce that include Computer Security, Data security and other wider realms of the Information Security... more
    • by 
    • Security Attacks
    • by 
    •   9  
      Information SystemsComputer ScienceInformation SecurityComputer Networks
    • by 
    •   16  
      Computer ScienceInformation TechnologyEducationInformation Security
With the widespread use of mobile technologies, the importance of cybersecurity is increasing in our country as well as all over the world. Android operating system-based smartphones and tablets used in mobile technologies are frequently... more
    • by  and +1
    •   3  
      AndroidDatabases; Security; Mobile ApplicationsSecurity Attacks
The recent explosive growth of mobile data traffic, the continuously growing demand for higher data rates, and the steadily increasing pressure for higher mobility have led to the fifth-generation mobile networks. To this end,... more
    • by 
    •   5  
      Network SecurityNetwork codingSmall Cells5G Mobile Communications
Mobile Ad Hoc networks are networks in which users, regardless of geographical locations, can have access to its information and services. These networks are divided into 2 categories: network with structure and network without structure... more
    • by  and +1
    •   8  
      Mobile Ad Hoc NetworksSecurityWireless networksRouting protocols
    • by 
    •   5  
      Computer ScienceOPERATING SYSTEMAndroidAndroid Operating System
Mobile Ad Hoc networks are networks in which users, regardless of geographical locations, can have access to its information and services. These networks are divided into 2 categories: network with structure and network without structure... more
    • by 
    •   8  
      Mobile Ad Hoc NetworksSecurityWireless networksRouting protocols
    • by 
    •   4  
      Information SecurityComputer SecurityManetSecurity Attacks
Wireless sensor networks (WSNs) have been the subject of intensive research in the past few years and the backbone of most maximum present information technology. WSNs have been employed in various applications such as track monitoring... more
    • by 
    •   5  
      CryptographyNational SecurityWsnKey Management
    • by 
    •   6  
      Computer NetworksPower Management in Mobile Ad Hoc Wireless NetworkChallengesDefensive mechanisms
This Electronic commerce or e-commerce is currently one of the most significant aspects of the Internet to emerge. It covers a range of different types of businesses, Smart cards today perceive epidemic growth as a secure and favourable... more
    • by 
    •   2  
      Security AttacksEmail Security, Defend Against Data Loss, Defend Against Malware, And Defend Against Targeted Attacks
In today's world, social networks are very common. Various types of social networks are used by millions of users and they enable people to communicate with friends and relatives while still allowing them to exchange private details.... more
    • by 
    •   4  
      Security and PrivacySocial Networking ServicesSecurity MeasuresSecurity Attacks
Importance of security in ad-hoc networks is increasing due to a tremendous boon in mobile equipment usage. Due to the characteristic of ad hoc network being decentralized, wireless and infrastructure-less makes it vulnerable to various... more
    • by 
    •   4  
      Information SecurityComputer SecurityManetSecurity Attacks
    • by 
    •   4  
      Information SecurityComputer SecurityManetSecurity Attacks