Showing 1 - 10 of 16,448
Persistent link: https://www.econbiz.de/10014436485
Persistent link: https://www.econbiz.de/10011488360
Persistent link: https://www.econbiz.de/10014231483
Introduction -- Android operating system -- Iphone operating system (ios) -- Windows operating system -- Other operating systems -- Mobile application security -- The best security practices -- Conclusion.
Persistent link: https://www.econbiz.de/10014457432
Many hospitals have been built for people in silver age and these hospitals want to set various remote health care systems for the old people who are living in a place far from these hospitals. The systems processes are connected with each other and with networks as well. These systems handle...
Persistent link: https://www.econbiz.de/10012043391
The 2006 Megan Meier case, where a teenage girl who was bullied on the Internet through e-mail and Myspace which was …
Persistent link: https://www.econbiz.de/10012043568
Industrial control systems (ICS) or supervisory, control, and data acquisition (SCADA) systems drive many key components of the national infrastructure. It makes these control systems targets for cyber-attacks by terrorists and nation-states who wish to damage their target economically and...
Persistent link: https://www.econbiz.de/10012043869
The flexibility and openness of mobile ad hoc networks (MANETs) make them attractive for various types of applications such as military communication, emergency search and rescue operations, disaster recovery, battlefields, communication between moving vehicles (VANET etc. However, MANETs are...
Persistent link: https://www.econbiz.de/10012045152
In this paper, the authors will propose a meta-heuristic for intrusion detection system by scenario, inspired from the protection system of social bees to their hive. This approach is based on a specialized multi agent system where the authors will give a limited responsibility to each guard bee...
Persistent link: https://www.econbiz.de/10012045686
Day by day network security is becoming more challenging task. Intrusion detection systems (IDSs) are one of the methods used to monitor the network activities. Data mining algorithms play a major role in the field of IDS. NSL-KDD'99 dataset is used to study the network traffic pattern which...
Persistent link: https://www.econbiz.de/10012046727