network security 2019




Network security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network.



Application Analysis of Neural Network in Computer Network Security Evaluation
free download

Aiming at the problem of low accuracy of traditional computer network security evaluation model, this paper studies the application of neural network in computer network security evaluation, and designs a security evaluation model. Based on the established computer

A hybrid cryptography technique for improving network security
free download

The security of network and the network data is primary aspect of the network providers and service providers. Therefore during the data exchange the cryptographic techniques are utilized for securing the data during various communications. On the other hand the

Network Security Mechanisms and Cryptography
free download

As Information Technology becomes ever more prevalent in nearly every aspect of our lives especially with the emergence of ecommerce applications and social networks, the amount of data generated and stored continues to grow at an astounding rate which necessitates the

System Architecture and Key Technologies of Network Security Situation Awareness System YHSAS
free download

Network Security Situation Awareness System YHSAS acquires, understands and displays the security factors which cause changes of network situation, and predicts the future development trend of these security factors. YHSAS is developed for national backbone

Simplifying urban network security games with cut-based graph contraction
free download

The scalability of the algorithm for solving urban network security games, which is an important challenge concerning security game problems, was improved. State-of-the-art solvers have been scaled up to handle real-world networks with tens of thousands of edges;

Analysis of Network Security Issue and Its Attack and Defence
free download

Network Security has become very important in todays world, as a result of which various methods are adopted to bypass it. Network administrators need to keep up with the recent advancements in both the hardware and software fields to prevent their as well as the users

Network Security Situation Awareness Based on the Optimized Dynamic Wavelet Neural Network .
free download

In order to analyze the evolvement trend of the network threat and to explore the self- perception and control problem of the security situation, the dynamic wavelet neural network model is integrated into the model design, and a kind of network security situation

Ontologies for network security and future challenges
free download

Efforts have been recently made to construct ontologies for network security . The proposed ontologies are related to specific aspects of network security . Therefore, it is necessary to identify the specific aspects covered by existing ontologies for network security . A review

Application of OSPF Routing Protocol in Network Security
free download

This paper combines the specific needs of the domestic hotel industry, puts forward the requirements and feasibility of network planning and design, designs a specific network implementation plan, and uses technologies such as VLAN, OSPF, redundant gateways

Wireless Body Area Network Security and Privacy Issue in E-Healthcare
free download

Wireless Body Area Network (WBAN) is a collection of wireless sensor nodes which can be placed within the body or outside the body of a human or a living person which in result observes or monitors the functionality and adjoining situations of the body. Utilizing a

Overview of Wireless Sensor Network Security Technology
free download

With the continuous improvement of science and technology and peoples living standards, wireless sensor network technology has gradually been widely used, and provides great convenience for peoples living, but with the continuous improvement of the degree of

Network Security Policy: The Challenges and Solutions in an Organization
free download

People nowadays are exposed to the use of technology in order to perform their daily activities and tasks. The technology can be embedded in other areas such as banking, business, communication, entertainment and education which can be applied anywhere and

I2NSF Network Security Functions Facing Interface YANG Data Model
free download

Page 1. I2NSF Network Security Functions-Facing Interface YANG Data Model (draft-kim-i2nsf- nsf-facing-interface-data-model-02) Jinyoung Tim Kim, Jaehoon Paul Jeong, Jung-Soo Park, Susan Hares, Liang Xia IETF 9 Prague, Czech July 1 2017 Page 2. Introduction This draft is an

Research on Vehicle Network Security Technology
free download

Y Ji, H Zhao, Z Wu, C Yu- Academic Journal of Computing 2019 160.153.132.164 The security risks of the Internet of Vehicles have become increasingly prominent. Information tampering and virus intrusion have been used by hackers in cyber attacks on smart cars. The car network attack incident is mainly concentrated on the TSP server attack

New SDN-oriented distributed network security system
free download

Software-Defined Network (SDN) is a network technology aimed to open new possibilities in network management and orchestration. This is important in future (especially mobile) networks, where virtualization of resources and network functions is the basic paradigm

User-oriented Network Security Policy Specification.
free download

The configuration and management of security controls and applications is complex and not well understood by the majority of end-users (ie it typically requires specific skills). The security policy language simplifies this task and reduces the number of errors and

An Evolutionary Multi-objective Approach for Modelling Network Security .
free download

Security is the most important issue in a network system. Administrators can more easily understand threats to the network by using a model. In this paper, we present an approach for modelling a network that considers the benefits of the network as well as its limitations. In

Recent Research in Network Security
free download

Network security and Data analytics is an important to present society where information technology and services pass through each facet of our lives. However, it is demanding to achieve, as technology is changing at rapid speed and our systems turn into ever more

Cloud computing network security for various parameters, and its application
free download

Recent years have seen the massive migration of enterprise applications to the cloud. One of the challenges posed by cloud applications is Quality-of-Service (QoS) management, which is the problem of allocating resources to the application to guarantee a service level

IoT Network Security and Applications via Long Range Technology
free download

In this research project, we aim to build a long-range (LoRa)-based Internet of Things (IoT) secure localization system and application based on multisensor fusion calculation. The LoRa technology is used to design a network security system and immediately address the

The cram of Network Security with Its stabbing Attacks and likely Security Mechanisms
free download

Security is a fundamental component in the computing and networking technology. The first and foremost thing of every network designing, planning, building, and operating a network is the importance of a strong security policy. Network security has become more important to

Modelling and Analysis of Network Security Policies
free download

Nowadays, computers and network communications have a pervasive presence in all our daily activities. Their correct configuration in terms of security is becoming more and more complex due to the growing number and variety of services present in a network . Generally

A Literature Survey on the Network Security and Intrusion Detection System Using Data Mining Techniques
free download

Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology

A Zero Trust Approach to Network Security
free download

In the last years, we have seen an increase in the use of wireless networks due to new forms of communication. The online security has become a hotly debated topic in the community. People want to have access to all of your applications and resources anywhere, anytime

A Distributed Security Situation Evaluation Model for Global Network
free download

Global network security assessment under distributed environment is extremely urgent. We try to design a distributed security situation quantitative evaluation model, and simulate the distributed security evaluation of the service subnet by building the LAN experimental

THE MAJOR WIRELESS NETWORK SECURITY CHALLENGES-A REVIEW
free download

The paper categorizes wireless networks into two major classes namely wireless ad hoc networks and cellular networks. Authors argue that the main difference between these two is whether a fixed infrastructure is present. They indicate that while cellular networks require

A REVIEW OF MAJOR LOCAL AREA NETWORK SECURITY CHALLENGES
free download

Detection Systems (IDS) can be classified as Host Based IDS (HIDS) and Network Based IDS (NIDS). Network intrusion detection is a dynamic research area as intruders or attackers have increased attacks on all kinds of networking set-ups. Security policy is a main

Bitcoin as Decentralized Money: Prices, Mining, and Network Security
free download

We address the determination and evolution of bitcoin prices in a simple monetary economy that captures the salient features of a decentralized network . Network users forecast the transactional and resale value of bitcoin holdings and consider the risk of a network attack

BSec-NFVO: A Blockchain-based Security for Network Function Virtualization Orchestration
free download

Network Function Virtualization (NFV) and Service Function Chaining (SFC) offer flexible end-to-end services that deploy virtual network functions in clouds of competing providers. Orchestration of virtual network functions occurs in a distributed and trustless environment

Network Information Security Status Assessment Based on Big Data Analysis
free download

When formulating network attack strategy, there is an uncertainty in target network information, and the attacker lacks comprehensive, reliable and real-time attack basis, so it is difficult to achieve the attack effect. Therefore, a scientific and complex network attack

Darknet Security : A Categorization of Attacks to the Tor Network
free download

In the darknet security topic, it is important to analyze the threats that characterize the network . This paper deeply investigates the literature of attacks against the Tor network , presenting the most relevant threats in this context. In order to provide an important tool for





FREE IEEE PAPER