• No results found

[PDF] Top 20 Communication Technology and Network Security

Has 10000 "Communication Technology and Network Security" found on our website. Below are the top 20 most common "Communication Technology and Network Security".

Communication Technology and Network Security

Communication Technology and Network Security

... An Intrusion Detection System (IDS) is an additional protection measure to firewalls, virus scanners, and encryption that helps ward off computer intrusions. IDS systems can be software and hardware devices used to ... See full document

7

Research on the Integrated Security Supervision Technology of Cyber Physical System in Substations

Research on the Integrated Security Supervision Technology of Cyber Physical System in Substations

... uninterrupted security event relation analysis of all normalized log streams through a predefined rule database and relation analysis ...For network traffic data, the device establishes periodic baseline ... See full document

7

A Study & Brief Description on Communication Systems, Wireless Network and Network Security

A Study & Brief Description on Communication Systems, Wireless Network and Network Security

... by communication systems, some of which might be private, such as within a company, and others which might be open to public ...a network system that is open to public access is the Internet, but many ... See full document

8

Encryption Based Security for Position Based VANET Routing Protocol

Encryption Based Security for Position Based VANET Routing Protocol

... Hoc Network) enables vehicles which act as a node in network to communicate with other vehicles and with road- side ...a technology that enables nodes to create mobile ...a network with a wide ... See full document

5

Modern Communication Technology and National Security In the Middle East

Modern Communication Technology and National Security In the Middle East

... tried to increase the number of its viewers by presenting opposing ideologies against govern- ments in the Persian Gulf region, like Arabia, Bahrain, Qatar and also by making relations with Syria, Lebanon and the ... See full document

12

Computer Network Security pdf

Computer Network Security pdf

... 1.4 Data Communication Media Technology The performance of a network type depends greatly on the transmission technology and media used in the network.. Let us look at these two..[r] ... See full document

544

Network Security Systems Using UTM Technology

Network Security Systems Using UTM Technology

... e. Attack vectors are Spear phishing exploiting individuals‘ trust, Community-forming malware- bot, and new hybrid combinations - spy phishing Insiders acting as initiators themselves or as conduits for other attacks. ... See full document

6

Network Security Issues and Solutions on Vehicular Communication Systems

Network Security Issues and Solutions on Vehicular Communication Systems

... the communication of the vehicles with each other and the road infrastructures has brought the security problems encountered in the computer infrastructure to this ...The network vulnerabilities in ... See full document

12

A Survey Paper on Security Protocols of Wireless Detector Networks

A Survey Paper on Security Protocols of Wireless Detector Networks

... element Network stands jointly of the foremost rising technologies combining along sensing, procedure capability and communication into minute devices continuing towards whole new world of ...element ... See full document

6

3D Face Recognition Technology in Network Security Applications

3D Face Recognition Technology in Network Security Applications

... With the internet, comes interconnection and sharing, thus network information security has become essential in past years especially in the field of computer and communication networks. The ... See full document

6

Network Security Using Encryption Techniques

Network Security Using Encryption Techniques

... In our modern age of telecommunications and the Internet, information has become a precious commodity. Sometimes it must therefore be kept safe from stealing - in this case, loss of private information to an ... See full document

5

Network Security in Virtual Scenario

Network Security in Virtual Scenario

... Marcos Laureano, Carlos Maziero, Edgard Jamhour, 2004 [1] this work presents a proposal to increase the trustworthiness of computing systems using virtual machine technology. It proposes the application of ... See full document

5

An Approach to Improve QoS Parameter using VoIP

An Approach to Improve QoS Parameter using VoIP

... and Communication technology plays vital role to communicate over the ...Telephone Network) is used for communication but PSTN is not well suited for real time multimedia ...communications ... See full document

6

Library management and the adoption of information and communication technology in university libraries in akwa ibom and cross river state, Nigeria

Library management and the adoption of information and communication technology in university libraries in akwa ibom and cross river state, Nigeria

... Management as a process, involves the methods or techniques ordinated to achieve results. (2007), the four named basic ingredients in the management process are, decision on course of action, obtaining the necessary ... See full document

5

Information and communication technology and the performance of selected small and medium enterprises in Onitsha Metropolis

Information and communication technology and the performance of selected small and medium enterprises in Onitsha Metropolis

... any technology that enables communication and electronic capturing process and transmission of information, technology include product and service such as desktop, computers, laptop, hand held ... See full document

5

Wiley Personal Networks Wireless Networking for Personal Devices 2010 RETAiL EBook pdf

Wiley Personal Networks Wireless Networking for Personal Devices 2010 RETAiL EBook pdf

... WPAN communication takes place between a person’s mobile devices, such as a camera requesting time and location information from a Global Positioning System (GPS) receiver to tag a picture or a mobile phone ... See full document

230

Research on neural network chaotic encryption algorithm in wireless network security communication

Research on neural network chaotic encryption algorithm in wireless network security communication

... Qun Zhang (M ’ 02 – SM ’ 07) received the M.S. degree in Mathematics from Shaanxi Normal University, Xi ’ an, China, in 1988, and the Ph.D. degree in Electrical Engineering from Xidian University, Xi ’ an, in 2001. He ... See full document

10

A Review on Security in Mobile Communication Technology

A Review on Security in Mobile Communication Technology

... of security for the ...optimize network performance by overcoming interference problems in busy areas, to increase call quality and ...system security, provide protection of the subscribers ... See full document

6

An Emerging Technology with Iot Network Communication

An Emerging Technology with Iot Network Communication

... IOT based microcontrollers are used for making the world smarter and making things easy to be used by everyone. It helps to connect all technology available into a data transferring devices. The Microcontrollers ... See full document

6

Simulation of 4G Mobile Communication Process Based on MATLAB

Simulation of 4G Mobile Communication Process Based on MATLAB

... 4G communication system with intelligent technology is a highly autonomous, adaptive ...processing technology for different channel conditions in complex environment for normal sending and receiving, ... See full document

5

Show all 10000 documents...