ENGINEERING RESEARCH PAPERS

NETWORK SECURITY IEEE PAPER 2018




XYO Network : Security Risks and Mitigations
free download

The XYO Network is a trustless and decentralized cryptographic location network that utilizes zero-knowledge proofs to establish a high degree of certainty regarding location verification. A primary concern for the XYO Network like with all decentralized and trustless

A Framework for Managing User-defined Security Policies to Support Network Security Functions
free download

ABSTRACT Network Functions Virtualization (NFV) and Software Defined Networking (SDN) make it easier for security administrators to manage security policies on a network system. However, it is still challenging to map high-level security policies defined by users into low

A New Approach to Quantify Network Security by Ranking of Security Metrics and Considering Their Relationships
free download

ABSTRACT There are several characteristics in computer networks, which play important roles in determining the level of network security . These characteristics known as security metrics can be applied for security quantification in computer networks. Most of the researches on The recent emergence and advancement of various information and cyber-physical networks have brought unprecedented convenience to our daily lives. To ensure effective and continuous operations of these modern networks, it is of crucial importance to deploy

Defense Cooperation Agreements and the Emergence of a Global Security Network
free download

ABSTRACT This article examines the emergence and diffusion of bilateral defense cooperation agreements, or DCAs, an increasingly common form of cooperation. These agreements establish broad legal frameworks for bilateral defense relations, facilitating cooperation in

On using deep Convolutional Neural Network architectures for automated object detection and classification within X-ray baggage security imagery.
free download

ABSTRACT We consider the use of deep Convolutional Neural Networks (CNN) with transfer learning for the image classification and detection problems posed within the context of X- ray baggage security imagery. The use of the CNN approach requires large amounts of data

On the impact of security vulnerabilities in the npm package dependency network
free download

ABSTRACT Security vulnerabilities are among the most pressing problems in open source software package libraries. It may take a long time to discover and fix vulnerabilities in packages. In addition, vulnerabilities may propagate to dependent packages, making them

Enhancing Security and Network Lifetime of Wireless Sensor Networks
free download

ABSTRACT Securing the information exchange in wireless sensor networks (WSNs) and their variants such as wireless sensor and actor networks (WSANs) is a major concern as for each sensed event the actions taken depend on the collected data. Thus, security is a major

Security Issues in Heterogeneous Network : A review
free download

ABSTRACT Wireless sensor networks (WSN) are wireless networks that has some peculiar characteristics because of the lack of infrastructure or executive support. WSN can normally deploy in some of the unattended environments. Recent research topics like IoT model

Security Attacks and Challenges of Wireless Sensor Network
free download

ABSTRACT Wireless sensor networks is an emerging field to research and development, due to a large number of application avail benefits from such systems and has lead to the development of tiny, cheap, disposable and self contained battery powered computers

DATA SECURITY IN NETWORK FLOW USING OBFUSCATION TECHNIQUE
free download

ABSTRACT -An application encompasses network modeling and simulation, recognition of privacy assaults, and formalization of research results. Indeed, existing techniques for network flow sanitization are vulnerable to different kinds of attacks, and solutions proposed

Strengthening Network Security : An SDN (Software Defined Networking) Approach
free download

ABSTRACT : Todays IT infrastructure, featuring a mobile workforce, IoT applications, digital transformations of the business, and the cloud, is evolving at a pace thats exceeding the capabilities of legacy security approaches. Network security has proven to be insufficient

Hiding Computer Network Proactive Security Tools Unmasking Features
free download

ABSTRACT Passive and proactive network security tools, based on cyber deception technologies, become more and more popular among classic tools. Using such tools gives an opportunity to prevent network attacks on the very beginning at intelligence gathering

AN UPDATED NEW SECURITY ARCHITECTURE FOR IOT NETWORK BASED ON SOFTWARE-DEFINED NETWORKING (SDN)
free download

ABSTRACT In this paper, we explain the most important phase of security architecture for Internet of Things (IoT) based on software-defined networking (SDN). In this context, the SDN-based architecture is executed with or without the infrastructure; this is also called as

Analytical Study on Encryption Techniques and Challenges in Network Security
free download

ABSTRACT Importance of data security and network security is increasing day by day for various hardware and software applications in human life. Now many of the human activities are automated and in future more areas will come as part of network system. So most of the

Implementation of FirewallIntrusion Detection System Using pfSense To Enhance Network Security
free download

ABSTRACT : This paper analyses the network security issues and threats which are increasing every day. Data centre operators, network administrator, and other data centre professionals need to comprehend the basics of security in order to safely deploy and manage networks

An approach for internal network security metric based on attack probability
free download

ABSTRACT A network security metric may provide quantifiable evidence to assist security practitioners in securing computer networks. However, research on security metrics based on attack graph is not applicable to the characteristics of internal attack, therefore we

INTEGRATION OF ANTIVIRUS WITH VIRTUAL PRIVATE NETWORK FOR PERSONAL SYSTEMS SECURITY
free download

ABSTRACT Virtual private network was developed to help users protect and better control their internet connection. However, virtual private network cannot protect users from viruses, hacking attempt or generally anything bad. Many techniques are proposed such as antivirus

A SURVEY ON NETWORK SECURITY ATTACKSPREVENTIVE MEASURES
free download

ABSTRACT Computer security is one of the most expected factors in the currentfuture industry. Nowadays computers are available everywhere ranging from small shops to large organizations. Security threat is a major issue for all sectors. Systems connected to networks

Diverse Types Of Network Attacks and the Describing Security Mechanisms
free download

ABSTRACT : In The Current Scenario Networking Protocols Are Enormously Momentous To The Computer Users In Personal, Trade, Defence, Armed Forces Etc. By The Promising Of Internet, Security Of The Networks Became The Foremost Concern. Despite The Fact That ABSTRACT A picture is worth a thousand words. Everyone knows that images are used to efficiently communicate information. For instance in network monitoring, instead of handing someone a log file that records how an attack happened, one can use a picture, a visual

A SURVEY ON IMPROVING THE LIFETIME OF THE NETWORK TO PROVIDE SECURITY IN MANETs
free download

ABSTRACT Vitality sparing is the fundamental worry in MANETs to enhance lifetime of the network . Limits of MANETs hubs have been considered, to outline a secure geographic routing with Data Compression. AODV is the reason for Secured multi hop strong path

E-Mail Security Using Spam Mail Detection and Filtering Network System
free download

ABSTRACT : Electronic mail, also known as email or e-mail, is a method of exchanging digital messages from an author to one or more recipients. Email is the most efficient way to communicate or transfer our data from one to another. While transferring or communicating

Review on Security in Wireless Sensor Network
free download

ABSTRACT Wireless Sensor Networks (WSN) is a rising innovation and step by step it is pulling in the consideration of scientists with its testing qualities and differentiated application space. The more scientists attempt to grow encourage cost and vitality proficient

Security and Communication Networks Analysis on influential functions in the weighted software network
free download

ABSTRACT Identifying influential nodes is important for software in terms of understanding the design patterns, controlling the development and the maintenance process. However, there are no efficient methods to discover them so far. Based on the invoking dependency

A Review on Security Attacks in Vehicular Ad hoc Network
free download

ABSTRACT Whenever a communication takes place between two or more vehicles there has been a need for protection. The attacker can gain access to the network by compromising either the vehicle or road side unit or the communication medium that transfers the

SecurityAware Network Analysis for Network Controllability
free download

ABSTRACT Although people use critical, redundant and ordinary categories to concisely distinguish the importance of edges in maintaining the controllability of networks in linear timeinvariant (LTI) model, a specific network analysis is still uncertain to confirm edges of

The Role of Mobile NetworkApps Security Using Network Techniques
free download

ABSTRACT Now-a-days, Apps based on Mobile Network Technology that are known as Mobile network Apps are very popular among all kinds of users. But, sufficient knowledge of users about the Apps is questionable. Many users dont know which application is useful for their

Solutions for Network Traffic Security : VPN through IPsec and PKI
free download

ABSTRACT Internet traffic is susceptible to a series of treats and maybe the most important treats are the eavesdroppers. These types of attacks have known a huge increase in numbers but also a huge diversification in time. The scope of this article is to present a
BIG DATA
CLOUD COMPUTING
IOT-INTERNET OF THINGS
ROBOTICS
CONTACT US

NEW IEEE PROJECTS

IEEE PROJECT PAPERS FOR CSE
IEEE PROJECTS DOWNLOAD
IEEE PROJECTS FOR EEE
IEEE PROJECT PAPERS FOR ECE
IEEE PROJECTS FOR ECE 2016
IEEE PROJECTS FOR ECE 2017
IEEE PROJECTS 2017
IEEE MINI PROJECTS