To see the other types of publications on this topic, follow the link: Computer networks – Security measures – Zimbabwe.

Journal articles on the topic 'Computer networks – Security measures – Zimbabwe'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer networks – Security measures – Zimbabwe.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

NIKLEKAJ, Malvina. "Security in Computer Networks: Threats, Challenges, and Protection." Ingenious 3, no. 1 (2023): 51–60. http://dx.doi.org/10.58944/mcne2043.

Full text
Abstract:
This scientific article aims to examine the issue of security in computer networks, highlighting the threats, challenges, and methods of protection. With the development of technology and the increased use of the internet, security in computer networks has become a critical issue for individuals, organizations, and society as a whole. In this article, we will discuss how attackers can infiltrate communication systems and compromise the integrity, confidentiality, and availability of data. The techniques used by attackers to achieve their malicious goals will also be described. Furthermore, the
APA, Harvard, Vancouver, ISO, and other styles
2

Mtengwa, Bonnie Batsirai, Agripah Kandiero, and Stanislas Bigirimana. "Drivers of Mobile Money Services Development in Zimbabwe." International Journal of E-Business Research 17, no. 1 (2021): 42–64. http://dx.doi.org/10.4018/ijebr.2021010104.

Full text
Abstract:
This study sought to identify the drivers of mobile money services development in Zimbabwe using Ecocash as a case study. Through purposive sampling, respondents were selected from financial institutions, regulatory bodies, customers, and agents. The research showed that in Zimbabwe the development of mobile money services is influenced by several factors such as a high mobile telephone penetration rate, a high number of unbanked people owing to poor access to traditional banking services, a lower level of internet penetration levels, customer awareness of the service because of aggressive bra
APA, Harvard, Vancouver, ISO, and other styles
3

Klevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.

Full text
Abstract:
The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs). The authors specified the main areas of assessing the computer security of NPP I&C systems, especially the assessment of cyber threats, vulnerabilities of I&C computer security, sufficiency of applied measures for ensuring I&C systems computer security, risks of I&C system computer security as well as periodic reassessment of I&C computer security. The paper considers the assessment of I&C computer security vulnerabi
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Full text
Abstract:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are looph
APA, Harvard, Vancouver, ISO, and other styles
5

Savytska, Liudmyla, Tetiana Korobeinikova, Oleh Kostiuk, Iryna Kolesnyk, and Oleksandr Dudnyk. "INTERNET OF THINGS PROTECTION MEANS IN THE CORPORATE COMPUTER NETWORK." Information technology and computer engineering 59, no. 1 (2024): 83–93. http://dx.doi.org/10.31649/1999-9941-2024-59-1-83-93.

Full text
Abstract:
This work pertains to the analysis and enhancement of security measures for the Internet of Things (IoT) in corporate computer networks. The Internet of Things encompasses a wide range of data, including personal information, making the issue of security during their transmission highly relevant. The primary goal of the research is the development of an advanced technological design for the IoT system to ensure a high level of security and confidentiality of information. The modern world of the Internet of Things demands an analysis and improvement of IoT security in corporate computer network
APA, Harvard, Vancouver, ISO, and other styles
6

Guo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.

Full text
Abstract:
with the rapid development and wide application of wireless networking technology, Information security issues are increasingly prominent manifested by more and more attention. The article describes the schema of the data monitoring platform separate from the data layer, network layer and presentation layer three levels,focuses on platform of intelligent back-end database structure, and proposed specific measures to ensure platform security,to ensure the information security of computer networks, so as to give full play role of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
7

Littlewood, Bev, Sarah Brocklehurst, Norman Fenton, et al. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mo, Xin Ju. "Study on Information Security of Network-Based Manufacturing Environment." Applied Mechanics and Materials 484-485 (January 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.

Full text
Abstract:
with the rapid development and wide application of networking technology, information security increasingly prominent problems are evident, more and more attention. The article introduced the current situation of network information security, explored the meaning of network information security, major threat analysis network information security, and finally gives the implementation technology of network information security and preventive measures, to ensure the information security of computer networks, so as to give full play to role of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
9

Nwabueze, C. A., and R. E. Usiade. "Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks." International Journal of Trend in Scientific Research and Development 4, no. 2 (2020): 721–26. https://doi.org/10.5281/zenodo.3843000.

Full text
Abstract:
The rising concern for beneficial, easy design and deployable, flexible, reliable, cost effective and scalable wireless network has led to the evolution of mobile Ad hoc networks MANETs . This type of network in its own peculiarity is a wireless, mobile, infrastructure less network technology. It has been found to be very useful in military, commercial, personal, emergency related applications but not without some security challenges. The security of MANET is an important challenge to network engineers due to its unmonitored deployment nature and inherent resource limitation. This paper presen
APA, Harvard, Vancouver, ISO, and other styles
10

Courtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Fang, Du, Zhang Kaiyuan, and Qian Jin. "Research on Information Security of Computer Networks in Universities based on Artificial Intelligence." Journal of Big Data and Computing 2, no. 3 (2024): 189–93. https://doi.org/10.62517/jbdc.202401329.

Full text
Abstract:
Based on artificial intelligence technology, this paper analyzes the problem of computer network information security in colleges and universities. Combined with the characteristics and advantages of artificial intelligence technology, it puts forward measures such as establishing a perfect security awareness education system, strengthening the security protection ability of network equipment and systems, and strengthening the monitoring and early warning of network attacks, in order to improve the level of information security of computer networks in colleges and universities, and it is hoped
APA, Harvard, Vancouver, ISO, and other styles
12

Lalit, Jain. "Computer Network: An Implementation of Important Security Awareness Public Wi-Fi." International Journal of Innovative Science and Research Technology 8, no. 5 (2023): 2400–2403. https://doi.org/10.5281/zenodo.8015814.

Full text
Abstract:
Public Wi-Fi networks have become ubiquitous in today's digital age, providing convenient internet access to users in public spaces. However, the open and shared nature of these networks raises significant security concerns. This paper focuses on the implementation of important security awareness measures in public Wi-Fi networks to mitigate the risks associated with unauthorized access and data breaches. The implementation begins with the deployment of robust encryption and authentication protocols to ensure secure communication between users and the network. By leveraging protocols like
APA, Harvard, Vancouver, ISO, and other styles
13

Zhang, Kai, Liang Zhao, and Hai Qing Cao. "Research on the Computer Network Crime and Information Security." Applied Mechanics and Materials 687-691 (November 2014): 1806–9. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1806.

Full text
Abstract:
Network not only brings people convenience, but also becomes a hotbed for breeding crime. And it not only brings people efficiency, but also opens a new criminal platform for the computer network criminals. This paper analyzes the performance form and main features of computer networks crime and proposes several control measures based on their form and features.
APA, Harvard, Vancouver, ISO, and other styles
14

Kuprashvili, Henri. "Cyberspace and Terms: “kiberushishroeba” (Cyber Security) and “kiberusaprtkhoeba” (Computer Security)." Works of Georgian Technical University, no. 2(524) (June 6, 2022): 167–77. http://dx.doi.org/10.36073/1512-0996-2022-2-167-177.

Full text
Abstract:
The terms “kiberushishroeba” (cyber security) and “kiberusaprtkhoeba” (computer security) are often used in inappropriate contexts. The term “kiberushishroeba” is used when the avoidance of an imminent threat requires the formulation and implementation of socio-political measures (development and adoption of doctrines, laws, legal acts, improvement of the “kiberushishroeba” and “kiberusaprtkhoeba” assurance management process), because the state of protection of national interests in cyberspace is achieved through the establishment of an effective Computer Security system, cyberspace sustainab
APA, Harvard, Vancouver, ISO, and other styles
15

Savytska, Liudmyla, Tetiana Korobeinikova, Ihor Leontiev, and Serhii Bohomolov. "METHODS AND MEANS OF PROTECTING RESOURCES IN COMPUTER SDN NETWORK." Information technology and computer engineering 58, no. 3 (2023): 41–52. http://dx.doi.org/10.31649/1999-9941-2023-58-3-41-52.

Full text
Abstract:
The work is dedicated to the analysis and improvement of methods and tools for building the architecture of software-defined networks (SDNs). A crucial aspect involves comparing the differences between network management using traditional methods and utilizing an SDN controller. Primary attention is given to the development of security models based on software-defined networks.The research is grounded in the analysis of specific cases involving the use of such networks, including gathering opinions and expert assessments from professionals in the field. It leverages publicly available informat
APA, Harvard, Vancouver, ISO, and other styles
16

Hewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.

Full text
Abstract:
Organizations expect their employees to connect securely to the organization's computer systems. Often these employees use their personal computers to access the organization's networks. This research explores whether these same employees apply protective security measures to their personal computers. Perhaps these employees behave riskily based on their optimistic bias. Results indicate that while cyber optimistic bias and perceived vulnerability influence individuals to apply more protective security measures, the users still experienced security incidents. Thus, organization are vulnerable
APA, Harvard, Vancouver, ISO, and other styles
17

Smith, Martin. "Part 2 Personnel security measures within a computer installation." Computer Law & Security Review 6, no. 2 (1990): 23–26. http://dx.doi.org/10.1016/0267-3649(90)90109-o.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Aghaei, John, and Morgan Beren. "An In-Depth Study on Privacy Law, Computer Viruses and Their Prevention." Mathematical Modeling and Algorithm Application 2, no. 1 (2024): 20–22. http://dx.doi.org/10.54097/dva59m48.

Full text
Abstract:
With the wide application of computer networks, global informatization is accelerating, computer networks as a platform for information technology and applications have touched all corners of social life, but network viruses have become an important problem plaguing the security of computer systems. This paper initially analyzes the characteristics and hazards of computer network viruses, and puts forward some effective preventive measures, in order to minimize the harm caused by computer viruses.
APA, Harvard, Vancouver, ISO, and other styles
19

Heinrich, Markus, Tsvetoslava Vateva-Gurova, Tolga Arul, et al. "Security Requirements Engineering in Safety-Critical Railway Signalling Networks." Security and Communication Networks 2019 (July 14, 2019): 1–14. http://dx.doi.org/10.1155/2019/8348925.

Full text
Abstract:
Securing a safety-critical system is a challenging task, because safety requirements have to be considered alongside security controls. We report on our experience to develop a security architecture for railway signalling systems starting from the bare safety-critical system that requires protection. We use a threat-based approach to determine security risk acceptance criteria and derive security requirements. We discuss the executed process and make suggestions for improvements. Based on the security requirements, we develop a security architecture. The architecture is based on a hardware pla
APA, Harvard, Vancouver, ISO, and other styles
20

Xing, Kongduo. "A Practical Study of Big Data Technology in Computer Network Information Security Processing." Journal of Electronic Research and Application 7, no. 6 (2023): 36–41. http://dx.doi.org/10.26689/jera.v7i6.5667.

Full text
Abstract:
In recent years, China has witnessed continuous development and progress in its scientific and technological landscape, with widespread utilization of computer networks. Concurrently, issues related to computer network information security, such as information leakage and virus invasions, have become increasingly prominent. Consequently, there is a pressing need for the implementation of effective network security measures. This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing. It delves into the core
APA, Harvard, Vancouver, ISO, and other styles
21

Gwaka, Leon Tinashe. "Computer Supported Livestock Systems: The Potential of Digital Platforms to Revitalize a Livestock System in Rural Zimbabwe." Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022): 1–28. http://dx.doi.org/10.1145/3555085.

Full text
Abstract:
Livestock contribute to household food security, financial security, and societal status. However, most rural livestock systems are fragile characterized by poor infrastructure, information asymmetry, and dysfunctional markets. Literature suggests that digital platforms show promise to contribute towards addressing these challenges and yet, contrary evidence cautions against growing concerns like platform providers' power accumulation which can further marginalize users. I use evidence from the MOSMAC intervention in Beitbridge (Zimbabwe) to explore the potential of digital platforms to revita
APA, Harvard, Vancouver, ISO, and other styles
22

Franchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information Attacks on Online Social Networks." Journal of Information Technology Research 7, no. 3 (2014): 54–71. http://dx.doi.org/10.4018/jitr.2014070104.

Full text
Abstract:
Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users' carefree attitude in sharing information, the often sub-par security measures from the part of the system operators and, eventually, the high value of the published information make online social networks an interesting target for crackers and scammers alike. The information contained can be u
APA, Harvard, Vancouver, ISO, and other styles
23

Yao, Benkun. "q-Rung Orthopair Fuzzy Approach for Multiple-Attribute Group Decision-Making and Application to Commercial Computer Network Security Evaluation." International Journal of Fuzzy System Applications 13, no. 1 (2024): 1–19. http://dx.doi.org/10.4018/ijfsa.356366.

Full text
Abstract:
Nowadays, with the increasing use of computer network technology in various fields, coupled with the openness of the Internet, computer networks are facing various information security issues, which will have a very important impact on their applications. Both enterprises and individuals may cause significant economic losses due to these problems, so certain measures need to be taken to protect the information security of computer networks. The commercial computer network security (CCNS) evaluation is MAGDM. In this research, based on projection measure (PROJM) and bidirectional projection mea
APA, Harvard, Vancouver, ISO, and other styles
24

Alfonsi, B. J. "Hacker study: aiding security measures development?" IEEE Security & Privacy 1, no. 6 (2003): 11. http://dx.doi.org/10.1109/msecp.2003.1253562.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Wang, Xi, and Lei Shi. "Design of computer network security storage system based on cloud computing technology." Journal of Physics: Conference Series 2083, no. 4 (2021): 042084. http://dx.doi.org/10.1088/1742-6596/2083/4/042084.

Full text
Abstract:
Abstract Nowadays, computer networks are widely used. Besides the convenience, people also feel the pressure of network viruses and hackers. At present, in the process of fighting against network security threats, traditional defense measures have been difficult to meet. Therefore, in order to meet the needs of computer network security under cloud computing technology, and for the future of cloud computing high-quality network storage system can be gradually optimized. In this paper, from the cloud computing and network security storage system two aspects of the computer network security stor
APA, Harvard, Vancouver, ISO, and other styles
26

Researcher. "PRIVACY AND SECURITY IN AUTONOMOUS VEHICLE NETWORKS." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 7–26. https://doi.org/10.5281/zenodo.13149456.

Full text
Abstract:
With the increasing number of laud self-driving cars on the roads, these cars are expected to be fitted with sensors and cameras, as well as communication interfaces to share information in order to better co-ordinate themselves, and avoid traffic accidents. However, integrating of self-driving cars in networks also entails great risks to privacy and security. The goal of this study would be to evaluate the privacy and cybersecurity concerns related to the connected car systems, and offer recommendations for ethical big data management, as well as technological and regulatory measures. Areas t
APA, Harvard, Vancouver, ISO, and other styles
27

Dr. Kashyap C. Patel, Dr. Sachin A. Goswami, Dr. Saurabh A. Dave, and Ajaykumar Patel. "Crippling Connectivity : Unveiling the Network Disruption Potential of Vehicular Rogue Access Points." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 3 (2024): 632–43. http://dx.doi.org/10.32628/cseit241036.

Full text
Abstract:
Vehicular Networks have transformed modern transportation by facilitating communication between vehicles (V2V) and between vehicles and infrastructure (V2I). Nevertheless, this technical progress brings forth new security risks, including Vehicular Rogue Access Points (VRAPs), which have the potential to disrupt network connectivity and jeopardize the integrity of vehicular networks. This research investigates the menace presented by VRAPs, analyzing their capacity to cause significant disruptions to computer networks. We conduct a thorough analysis to emphasize the methods by which VRAPs can
APA, Harvard, Vancouver, ISO, and other styles
28

Zhang, Ke. "A wormhole attack detection method for tactical wireless sensor networks." PeerJ Computer Science 9 (August 29, 2023): e1449. http://dx.doi.org/10.7717/peerj-cs.1449.

Full text
Abstract:
Wireless sensor networks (WSNs) are networks formed by organizing and combining tens of thousands of sensor nodes freely through wireless communication technology. WSNs are commonly affected by various attacks, such as identity theft, black holes, wormholes, protocol spoofing, etc. As one of the more severe threats, wormholes create passive attacks that are hard to detect and eliminate. Since WSN is often used in the tactical network field, a planned secure network is essential for military applications with high security. Guard nodes are traffic monitoring nodes used to supervise neighbors’ d
APA, Harvard, Vancouver, ISO, and other styles
29

A. D., Azernikov, Norkina A. N., Myseva E. R., and Chicherov K. A. "Innovative Technologies in Combating Cyber Crime." KnE Social Sciences 3, no. 2 (2018): 248. http://dx.doi.org/10.18502/kss.v3i2.1550.

Full text
Abstract:
So far, development and enhancement of global communication networks, distribution of software, and upgrading of computer systems are accompanied by the evolution of criminal environment, with the latter evolving not only within one particular nation but throughout the international community. New opportunities in cyber crime translate into new threats for global information networks and community as a whole, which in terms of preventing and combating cyber crime requires substantial strengthening of information security measures and an approach that is completely different from that applied t
APA, Harvard, Vancouver, ISO, and other styles
30

Ahmad, S. Mashhour, and Saleh Zakaria. "Wireless Networks Security in Jordan: A Field Study." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 43–52. https://doi.org/10.5281/zenodo.4435315.

Full text
Abstract:
The potential of wireless communications, has resulted in a wide expand of wireless networks. However, the vulnerabilities and threats that wireless networks are subjectedto resulted in higher risk for unauthorized users to access the computer networks.This research evaluates the deployed Wireless Network in Jordan as well as the use of the security setting of the systems and equipment used. Caution will be taken to avoid network access as only existence of the network is sought. Wardriving involve the use of freeware tools such as NetStumbler, or Kismet, which was originally developed to be u
APA, Harvard, Vancouver, ISO, and other styles
31

Zhou, Zhengchun, and Wenyao Shen. "HoneyPot : Enhancing Cybersecurity through a computer simulation technology." Highlights in Science, Engineering and Technology 105 (June 30, 2024): 97–101. http://dx.doi.org/10.54097/0q8h9k30.

Full text
Abstract:
Honeypot technology is essentially a technique of deceiving attackers by deploying hosts, network services, or information as bait to lure them into attacking. This allows for the capture and analysis of attack behavior, speculating on attack intentions and motivations, enabling the defense to have a clear understanding of the security threats they face, and enhancing the security protection capabilities of the actual system through technical and management measures. A honeypot is like an intelligence gathering system. It is also possible to eavesdrop on the connections between hackers, collec
APA, Harvard, Vancouver, ISO, and other styles
32

Zhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.

Full text
Abstract:
In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. Here we assume that there exists a threshold value which determines when countermeasures should be taken to level up the security of a fraction of computers with low security level. And in some specific realistic environments the propagation network can be regarded as fully interconnected. Inspired by these facts, this paper presents a novel computer virus dynamics model considering the impact brought by secu
APA, Harvard, Vancouver, ISO, and other styles
33

VASILENKO, Nikolai, Valeriia SLATVINSKA, and Valeriy RACHUK. "ANALYSIS OF UNAUTHORIZED ACCESS TO COMPUTER NETWORKS IN THE CONTEXT OF THEIR SECURITY MEASURES." Information Technology and Society, no. 2 (13) (2024): 12–16. http://dx.doi.org/10.32689/maup.it.2024.2.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Aye, Mya Sandar, Min Ya, and Myat Nwe Win Khin. "Fundamental Areas of Cyber Security on Latest Technology." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 981–83. https://doi.org/10.5281/zenodo.3589949.

Full text
Abstract:
Cyber Security has developed one of the biggest challenges of information technology in the present day. Cyber security consists of controlling physical access of the hardware, application, networks and protecting against harm that may come via networks. It is a mixture of processes, technologies and practices. The objective of cyber Security is to protect programs, application, networks, computers and data from attack. Moreover, various measures of cyber security is quite a very huge concern to many. This paper mainly focuses on challenges faced by cyber security on the latest technologies. I
APA, Harvard, Vancouver, ISO, and other styles
35

Fouzar, Youcef, Ahmed Lakhssassi, and Ramakrishna Mundugar. "Secure Video Communication Using Multi-Equation Multi-Key Hybrid Cryptography." Future Internet 15, no. 12 (2023): 387. http://dx.doi.org/10.3390/fi15120387.

Full text
Abstract:
The safeguarding of intellectual property and maintaining privacy for video content are closely linked to the effectiveness of security protocols employed in internet streaming platforms. The inadequate implementation of security measures by content providers has resulted in security breaches within entertainment applications, hence causing a reduction in the client base. This research aimed to enhance the security measures employed for video content by implementing a multi-key approach for encryption and decryption processes. The aforementioned objective was successfully accomplished through
APA, Harvard, Vancouver, ISO, and other styles
36

Vaishali, Tyagi, and Parul Tomar Dr. "Review on Various Security Attacks in Ad Hoc Networks." International Journal of Trend in Scientific Research and Development 2, no. 5 (2018): 270–74. https://doi.org/10.31142/ijtsrd15830.

Full text
Abstract:
Importance of security in ad hoc networks is increasing due to a tremendous boon in mobile equipment usage. Due to the characteristic of ad hoc network being decentralized, wireless and infrastructure less makes it vulnerable to various attacks that cause disruption in the network. In order to provide possible security measures to handle the malicious activity in the network, security services are made sure to be implied. This paper includes a study of the required security goals to be achieved by the network and possible attacks that might result in alteration of network functionality. Vaisha
APA, Harvard, Vancouver, ISO, and other styles
37

Ram, M. Sethu, and R. Anandan. "Adaptive Multi-Layer Security Framework (AMLSF) for real-time applications in smart city networks." Journal of Autonomous Intelligence 7, no. 5 (2024): 1370. http://dx.doi.org/10.32629/jai.v7i5.1370.

Full text
Abstract:
<p>This study introduces the Adaptive Multi-Layer Security Framework (AMLSF), a novel approach designed for real-time applications in smart city networks, addressing the current challenges in security systems. AMLSF innovatively incorporates machine learning algorithms for dynamic adjustment of security protocols based on real-time threat analysis and device behavior patterns. This approach marks a significant shift from static security measures, offering an adaptive encryption mechanism that scales according to application criticality and device mobility. Our methodology integrates hier
APA, Harvard, Vancouver, ISO, and other styles
38

Franchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information and Password Attacks on Social Networks." Journal of Information Technology Research 8, no. 1 (2015): 25–42. http://dx.doi.org/10.4018/jitr.2015010103.

Full text
Abstract:
Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users' carefree attitude in sharing information, the often sub-par security measures from the part of the system operators and, eventually, the high value of the published information make online social networks an interesting target for crackers and scammers alike. The information contained can be u
APA, Harvard, Vancouver, ISO, and other styles
39

Feng, Liping, Ruifeng Han, Hongbin Wang, Qingshan Zhao, Chengli Fu, and Qi Han. "A Virus Propagation Model and Optimal Control Strategy in the Point-to-Group Network to Information Security Investment." Complexity 2021 (June 3, 2021): 1–7. http://dx.doi.org/10.1155/2021/6612451.

Full text
Abstract:
Epidemiological dynamics is a vital method in studying the spread of computer network viruses. In this paper, an optimal control measure is proposed based on the SEIR virus propagation model in point-to-group information networks. First, considering the need for antivirus measures in reality, an optimal control problem is introduced, and then a controlled computer virus spread model in point-to-group information networks is established. Second, the optimal control measure is formulated by making a tradeoff between control cost and network loss caused by virus intrusion. Third, optimal control
APA, Harvard, Vancouver, ISO, and other styles
40

Kounavis, Michael, David Durham, Sergej Deutsch, and Ken Grewal. "Security definitions, entropy measures and constructions for implicitly detecting data corruption." Computer Communications 160 (July 2020): 815–46. http://dx.doi.org/10.1016/j.comcom.2020.05.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Monica Mehrotra, Md Shamsul Haque Ansari,. "Lightweight Cryptography based Communication Model for Device Identification, Mutual Authentication, and Encryption in a Smart City Environment." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 986–94. http://dx.doi.org/10.17762/ijritcc.v11i9.8989.

Full text
Abstract:
Providing security to smart city networks is one of the challenging and demanding tasks in the present days, due to its increased utilization in smart intelligent transportation systems. For this purpose, there are various security protocols and mechanisms that have been developed in the existing works, which targets to establish the reliable and secured communication in smart city networks. However, it limits the major issues of increased computational cost, communication cost, storage overhead, and reduced efficiency. In order to solve these problems, the proposed work intends to design an i
APA, Harvard, Vancouver, ISO, and other styles
42

Sheela, D., and G. Mahadevan. "Mobile Agent Based Enhanced Security for Wireless Sensor Networks." International Journal of Business Data Communications and Networking 10, no. 2 (2014): 15–29. http://dx.doi.org/10.4018/ijbdcn.2014040102.

Full text
Abstract:
Wireless sensor networks (WSNs) have attracted a lot of researchers due to their high potential in critical applications. WSNs are currently being employed in a variety of applications ranging from medical to military, and from home to industry. WSNs have unique constraints as compared to traditional networks making the implementation of existing security measures not practicable. These constraints are the result of limitations regarding the sensor nodes' memory, energy and transmission and processing power. So, traditional security mechanisms with large overhead of computation and communicati
APA, Harvard, Vancouver, ISO, and other styles
43

Кобцев, О. Е., А. И. Шеншин, В. М. Питолин, Л. В. Паринова, Ю. Г. Пастернак, and Ю. В. Макаров. "NETWORK ATTACKS BY COMPUTER VIRUSES: SPECIFIC INFORMATION SECURITY POLICY." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 27, no. 1(-) (2024): 67–80. http://dx.doi.org/10.36622/1682-7813.2024.27.1.004.

Full text
Abstract:
Данная научная статья посвящена исследованию сетевых атак, осуществляемых компьютерными вирусами на корпоративные сети, в частности – разработке комплекса мер по обеспечению информационной безопасности предприятия. В ходе исследования, на основе информации о сценариях (векторах) сетевых атак компьютерными вирусами, разработана частная политика и регламенты обеспечения информационной безопасности предприятия. Результаты исследования представляют собой значимый вклад в области обеспечения информационной безопасности предприятий, адаптированы для практического использования, а также могут служить
APA, Harvard, Vancouver, ISO, and other styles
44

Dolente, Filippo, Rosario Giuseppe Garroppo, and Michele Pagano. "A Vulnerability Assessment of Open-Source Implementations of Fifth-Generation Core Network Functions." Future Internet 16, no. 1 (2023): 1. http://dx.doi.org/10.3390/fi16010001.

Full text
Abstract:
The paper presents an experimental security assessment within two widely used open-source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination concentrates on two network functions (NFs) that are externally exposed within the core network architecture, i.e., the Access and Mobility Management Function (AMF) and the Network Repository Function/Network Exposure Function (NRF/NEF) of the Service-Based Architecture (SBA). Focusing on the Service-Based Interface (SBI) of these exposed NFs, the analysis not only identifies potential security gaps but also underscores the crucial
APA, Harvard, Vancouver, ISO, and other styles
45

Nazir, Sajid, Shushma Patel, and Dilip Patel. "Autonomic Computing Architecture for SCADA Cyber Security." International Journal of Cognitive Informatics and Natural Intelligence 11, no. 4 (2017): 66–79. http://dx.doi.org/10.4018/ijcini.2017100104.

Full text
Abstract:
Autonomic computing paradigm is based on intelligent computing systems that can autonomously take actions under given conditions. These technologies have been successfully applied to many problem domains requiring autonomous operation. One such area of national interest is SCADA systems that monitor critical infrastructures such as transportation networks, large manufacturing, business and health facilities, power generation, and distribution networks. The SCADA systems have evolved into a complex, highly connected system requiring high availability. On the other hand, cyber threats to these i
APA, Harvard, Vancouver, ISO, and other styles
46

Slamet, Slamet. "Pelatihan jaringan komputer dan keamanannya bagi dosen dan mahasiswa Dili Institute of Technology (DIT) di Undika Surabaya." TEKMULOGI: Jurnal Pengabdian Masyarakat 3, no. 1 (2023): 59–66. http://dx.doi.org/10.17509/tmg.v3i1.58074.

Full text
Abstract:
The Dili Institute of Technology (DIT) is a non-profit, community-based educational organization that focuses on meeting the higher education and vocational training needs of young people, veterans of the resistance, and the children of veterans. It is dedicated to providing general education and training that will help the country become more technically and commercially skilled, creating a workforce that can satisfy the needs of the corporate, public, and community sectors in Timor Leste. Its mission is to provide high-quality education and training based on international standards at underg
APA, Harvard, Vancouver, ISO, and other styles
47

Liang, Jiaqi, Yibei Wu, Jun’e Li, Xiong Chen, Heqin Tong, and Ming Ni. "Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks." Complexity 2021 (February 19, 2021): 1–12. http://dx.doi.org/10.1155/2021/6659879.

Full text
Abstract:
With the development of distributed networks, the remote controllability of the distributed energy objects and the vulnerability of user-side information security protection measures make distributed energy objects extremely vulnerable to malicious control by attackers. Hence, the large-scale loads may produce abnormal operation performance, such as load casting/dropping synchronously or frequent and synchronous casting and dropping, and hence, it can threaten the security and stable operation of the distribution networks. First, we analyze the security threats faced by industrial controllable
APA, Harvard, Vancouver, ISO, and other styles
48

Raxmanova, Saodat Djurayevna. "IMPROVING THE POSSIBILITIES OF USING COMPUTER NETWORKS IN HIGH SCHOOLS." Multidisciplinary Journal of Science and Technology 5, no. 5 (2025): 1165–70. https://doi.org/10.5281/zenodo.15511917.

Full text
Abstract:
This article provides a comprehensive analysis of the current state of use of computer networks in high schools, their role in the educational process and the need to improve their capabilities. Computer networks are important as a means of increasing the interactivity of classes in educational institutions, directing students to independent knowledge, automating the activities of teachers and expanding the possibilities of using digital resources. The article also offers and recommendations on the technical components of computer networks, local and global network infrastructure, ways to incr
APA, Harvard, Vancouver, ISO, and other styles
49

Peng, Yu, Xinrong Liu, Ming Li, et al. "Sensing network security prevention measures of BIM smart operation and maintenance system." Computer Communications 161 (September 2020): 360–67. http://dx.doi.org/10.1016/j.comcom.2020.07.039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Ouyang, Chun-Juan, Ming Leng, Jie-Wu Xia, and Huan Liu. "Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/1790268.

Full text
Abstract:
Security measure is of great importance in both steganography and steganalysis. Considering that statistical feature perturbations caused by steganography in an image are always nondeterministic and that an image is considered nonstationary, in this paper, the steganography is regarded as a fuzzy process. Here a steganographic security measure is proposed. This security measure evaluates the similarity between two vague sets of cover images and stego images in terms of n-order Markov chain to capture the interpixel correlation. The new security measure has proven to have the properties of boun
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!