network security 2021




Research on Network Security Risk Assessment Method Based on Improved Analytic Hierarchy Process
free download

Risk assessment can help understand network security . This paper mainly analyzed the analytic hierarchy process (AHP) method, improved the AHP method with the fuzzy operator, applied the improved AHP method to risk assessment, and took a local network as an

Research on Network Security Intrusion Detection System Based on Machine Learning
free download

This paper mainly analyzed the application of the machine learning method in the intrusion detection system (IDS). The support vector machine (SVM) algorithm parameters were improved by the adaptive particle swarm optimization (APSO) algorithm and the APSO-SVMNetwork security is a concept of securing data through wireless transmission with the help of cryptography. The Network administrator performs the task of securing data while transmission, avoid unauthorized access of data, avert data misuse and modification ofWe are pleased to present the proceedings of the 19th International Conference on Applied Cryptography and Network Security (ACNS 2021). ACNSwas planned to be held in Kamakura, Japan. Due to the ongoing COVID-19 crisis, we decided to have a virtual

Construction of Network Security Law Enforcement Virtual Simulation Experiment and Teaching Platform
free download

In view of the problems in virtual simulation experiment teaching of network security law enforcement, this paper analyzes the necessity of construction of the virtual simulation experiment teaching platform, which expounds the construction content of virtual simulation

Medical System Network Security
free download

Hospitals in the United States and other comparable countries are lacking the modern security many people assume they have, in reality many of these institutions lack the necessary cyber security personal to defend their networks, and do not invest enough into

Network security issues and effective protection against network attacks
free download

The article gives a general overview of the network, the role of the global network today, a brief overview of the various attacks on the network. It also discusses the problems that can arise as a result of various attacks on the network and ways to overcome them. In additionAs the security threats of industrial control networks such as smart grids continue to escalate, smart substations, as the core facilities of smart grids, are becoming an important target of malicious attacks. It is very necessary to strengthen the security audit of intelligent substation The network security situation assessment of power information system is popular in the field of network security research. However, the current neural network-based security situation assessment method is inefficient and easy to fall into local optimum, which results in low

Prediction of Network Security Situation Awareness based on an Improved Model Combined with Neural Network
free download

People always pay attention to the security of the network. This paper mainly analyzed the problem 10 of network security situation prediction (NSSP). The Radial Basis Function (RBF) neural network 11 was improved by the particle swarm optimization (PSO) algorithm, and a

A REVIEW ON DIFFERENT ATTACKS AND WAYS TO MITIGATE THEM IN ORDER TO ENHANCE NETWORK SECURITY
free download

Network Security is becoming very important in todays world, as a result of which different methods are used to exploit it. Network engineers need to keep up with recent advances in both hardware and software fields to prevent them from being used, along with user data

Enhancing Network Security through Software Defined Networking (SDN)
free download

The IoT connects many of the home appliances in the world, from intelligent thermostats to intelligent vehicles. By the end of 201 we had 9 billion connected stuff. The Gartner forecast shows that the number of devices in the network will exceed 50 billion by

A Dashboard for Cyber Situational Awareness and Decision Support in Network Security Management
free download

This demo paper presents a dashboard for network security management, a web application that visualizes data gathered by various sensors in the network and allows the user to achieve cyber situational awareness and provides decision support in the incident handling

Computer Network Security Maintenance and Management in the Era of Big Data
free download

With the development of information technology, the big data network has been initially formed. However, the network security problem is becoming more and more serious in this environment. China has put the network security in an important position of national security

BLUETOOTH NETWORK SECURITY
free download

Bluetooth technology has become an essential part of this modern world where it provides a short distance wireless communication between devices and other networks with low cost and low power making it convenient for the users. Bluetooth is primarily used for

EXPERIMENTAL ASSESSMENT OF PRE-SHARED KEY AND WPA_RADIUS SERVER IN WIRELESS NETWORK SECURITY
free download

Wireless network security is very important in security, privacy and confidentiality of our data and resources. It requires the use of network resources through encryption keys of packets to achieve authentication or authorization of users. It is therefore very paramount to

Survey on Vulnerability of 4G/LTE Network Security and Improvements
free download

Network security is considered a significant issue in our daily life due to its entering into many peoples activities such as social activity, marketing and business. However, the need for a secure and powerful network has increased. The needs for a secure network have

FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications
free download

An emerging trend in network security consists in the adoption of programmable switches for performing various security tasks in large-scale, high-speed networks. However, since existing solutions are tailored to specific tasks, they cannot accommodate a growing variety

A Complete Bibliography of Publications in Network Security
free download

Nelson HF Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA E-mail: beebe@math.utah.edu,Related papers ENHANCEMENT IN NETWORK SECURITY WITH SECURITY PROTOCOLS eSAT Journals Abstract Network security is a wider term used to represent security measures applied to the network, which acts as a broadcasting Environment

Network Security and Its Impact on Business Strategy: A Case Study on E-Commerce Site Daraz. Com
free download

With the growth of e-commerce and its acceptance, it is quite certain that it will be the future of shopping. However, there are a lot of security issue that has to be considered during online shopping and its procedures which can impact in such a way that both customers as

Modeling and Analysis of Network Direct Reporting Security of Infectious Diseases based on Wireless Communication Technology
free download

On this basis, the security risk level of wireless communication network is divided. This paper analyzes the negative factors that affect network security from hacker attack, high risk vulnerability of software and user information tampering

Computer security and new ways of improving it
free download

In fact, there is a whole raft of different types of computer security. The most typical areas are information security, application security, network security and cybersecurity. Its obvious that everyone wants to keep computers and personal

CAMPUS NETWORK ARCHITECTURE USING CISCO PACKET TRACER
free download

College of Engineering and Technology, Kamothe, Maharashtra, India – Abstract A Campus network is an important part of campus life and network security is essential for

Survey on Multilevel Security Using Honeypot
free download

king protea could be a great way to enhance the information of network security directors and learn the way to use rhetorical tools to urge info from the victims system. Honeypots also are terribly helpful for future threats that track attacks from new technologies

On Security of Privacy-Preserving Remote User Authentication with k-Times Untraceability
free download

As an important access control technique, k-times anonymous authentication (k-TAA) plays a vital role in ecoupon and e-bill. It allows a user to anonymously authenticate himself to a remote server a bounded number of times. However, most of the existing k-TAA schemes

The Future Network is the System Innovation that Builds on the Future
free download

The next 15 years, it is a new period of inspiration to unswervingly build a network power, digital China, and comprehensively strengthening the network security and security system and capabilities; it is a period of tenacious struggle to build and develop a network power

Multilevel Security Using Honeypot
free download

Each company runs on the Internet. Attackers will constantly develop new and innovative techniques. Take advantage of network security It is useful for a network security administrators to create increasingly secure systems and recognize threads

Enterprise Cyber Security Challenges to Medium and Large Firms: An Analysis
free download

Keywords: Exploits; Malware; Network Security ; Vulnerabilities 1 Introduction A survey questionnaire was developed and distributed to technology professionals and researchers in the field of cyber-security at a Network Security conference in Washington, DC

Security in Software Defined Networks (SDN): Challenges and Research Opportunities
free download

Keywords: SDN; OpenFlow; Mobile Networks; Network Security ; IoT; Big Data However, Medhi et.al. , claim that SDN provides a unique opportunity for effectively detecting and containing network security problems in home and office networks

A Review on Information Security in Cloud Based System during Covid-19 Pandemic
free download

While using this cloud computing environment, users are using their own private network to accomplish the work and hence the security and privacy factor is major challenges to its user as this paradigm shift is involved with data protection, network security virtualization security

Fast IPv6 Network Periphery Discovery and Security Implications
free download

Abstract Numerous measurement researches have been perf- ormed to discover the IPv4 network security issues by leveraging the fast Internet-wide scanning techniques It becomes the main obstacle to study the IPv6 network security

AI and 6G security: Opportunities and challenges
free download

is far from practical. A hierarchical security mechanism that distinguishes the sub-network level communication security and sub-network to wide area network security would be a better approach in 6G. The RAN-Core convergence

AIS Contribution to Ubiquitous Systems and Pervasive Networks Security-Reinforcement Learning vs Recurrent Networks.
free download

In this paper, a systematic review of this research was performed in regard to various attacks and an analysis of the trends and future fields of interest for the RL and recurrent network-based research in network security was complete

Security Issues in Internet of Things
free download

This is not only a result of a large number of devices that are complex, heterogeneous, and interoperate but also due to the mobility and distribution of these devices . In addition, IoT devices are resource constrained making it difficult to implement traditional network security

International Journal of Multidisciplinary Research and Growth Evaluation
free download

The development of information systems today is followed by an increase in attacks on information systems. This is due to the growing number of information systems that store sensitive data for users such as telephone numbers, population identification numbers, birth

Artificial Neural Network Model for Decreased Rank Attack Detection in RPL Based on IoT Networks
free download

Abstract Internet of Things (IoT) cyber-attacks are growing day by day because of the constrained nature of the IoT devices and the lack of effective security countermeasures. These attacks have small variants in their behavior and properties, implying that the Int. J. Adv. Sci. Technol. 29(11s), 1464 1469 (2020) 5. William, S.: Network security essentials: Applications and Standards, 4th edn. Prentice Hall, Upper Saddle River (2011) 6. Bejtlich, R.: The Tao of Network Security Monitoring: Beyond Intrusion Detection

Deep Neural Network With the Hmm To Judge the Observation Probabilities
free download

Study on Relocating the Learning Knowledge , International Journal Of Multidisciplinary Research In Science, Engineering and Technology (IJMRSET), Volume Issue July 3. Anitha Eemani, Future Trends, Current Developments in Network Security and Need for Key

Cyber Security Methodologies and Attacks
free download

1 no. pp. 166-17 3 20 doi: 10.1049/iet-ifs.2019.0294. F. Yan, Y. Jian-Wen and C. Lin, Computer Network Security and Technology Research Seventh International Conference on Measuring Technology and Mechatronics Automation, Nanchang, 201 pp