network security research paper-114

network security research paper-114







A Study of Security Problems Associated with the Telephone Network
FREE DOWNLOAD
ABSTRACT The tools available to the intruder for fraudulent use of the telephone network have evolved with the evolution of the network. DTMF tone generators were used earlier to circumvent the network s signaling mechanisms. The focus has now shifted to PBX

Security evolution of a network operating system
FREE DOWNLOAD
ABSTRACT In this paper, we study the security evolution of Novell NetWare from version 3.12 until the most recent version of today. A detailed description of both security features and flaws in Netware 3.12 is presented. The flaws were revealed during an intrusion

A Conceptual Model for a Network-Based Assessment Security System
FREE DOWNLOAD
The use of computer to assess learning is increasing at colleges and university as the use of technology on campuses increase. The challenge for the instructors at these institutions is to find a way to ensure the integrity of the assessments while still allow students to access

Security Analysis of a Computer Network
FREE DOWNLOAD
ABSTRACT In this thesis, methods for security analysis at the IP layer are presented and evaluated. The evaluation is mainly focused on deployment in real high speed networks. Next, a solution comprising selected method is proposed. The goal of this solution is to

A new approach for Evolution of end to end Security in Wireless Sensor Network
FREE DOWNLOAD
ABSTRACT A wireless sensor network (WSN) is a network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions such as temperature, sound, vibration, pressure, motion or pollutants, at

Digital Security Tokens in Network Commerce: Modeling and Derivative Application
FREE DOWNLOAD
ABSTRACT Digital objects in network commerce cause new credit risks (eg by an unpredictable compromise of a secret key and the resultant revocation of the corresponding public-key certificate). We recognize that we need to study a new financial risk management in this

EVOLUTION OF REN S SECURITY TELECOMMUNICATION NETWORK ACCORDING THE TECHNOLOGICAL EVOLUTION AND LIBERALIZATION OF
FREE DOWNLOAD
SUMMARY REN–Rede Elctrica Nacional, SA, is the Portuguese Transmission System Operator (TSO) which was set up as a company in August 1994, during the split-up of EDP– Electricidade de Portugal, SA, to which it already belonged as its Operational Department.

Security approaches for cluster interconnection in a wireless sensor network
FREE DOWNLOAD
A wireless sensor network is a collection of devices limited in low-powered batteries, processing, communication bandwidth capabilities and low memory availability. Due to these constraints, most of security approaches used in wired networks cannot be applied

A framework for proving the security of data transmission protocols in sensor network
FREE DOWNLOAD
This paper presents an framework to analyze the security of data transmission protocols in wireless sensor network (WSN). The proposed framework is based on the simulation paradigm and it defines three attack models in terms of the adversary s attacking ability.

Security Issues of Relay-Based IEEE 802.16 m Network
FREE DOWNLOAD
ABSTRACT A WiMAX network usually operates in a highly dynamic and open environment therefore it is known to be more vulnerable to security holes. In thisAbstract, we discussed some security issues and propose a new fully trustworthy authentication and key

An Analysis of Enhanced Wireless LAN for Robust Security Network
FREE DOWNLOAD
ABSTRACT As wireless communication proliferates, the number of users accessing the Internet via a mobile phone or a Personal Data Assistant (PDA) is rapidly increasing. Customers want to save the time and cost when they try to connect wired networks on providing high

Network-Centric Operations and Interdepartmental Marine Security
FREE DOWNLOAD
The US military was the first to understand that dramatic process changes such as this one should be examined to see if they had application to the art of war. The desire was to increase operational and combat effectiveness by using networking as a force multiplier.

Re-Configurable Programmable Security Processor for Network Applications
FREE DOWNLOAD
Z Ahmed, M Rahmatullah ,ISSA04 Enabling Tomorrow ,icsa.cs.up.ac.za ABSTRACT One of the fundamental challenges for the designers of the crypto processors is to provide the wirespeed security for network applications. In today s ultra-competitive marketplace, the low cost and flexibility for newer algorithms are the key requirements for

Security assessment for application network services using fault injection
FREE DOWNLOAD
Vulnerabilities in network protocol software have been problematic since Internet infrastructure was deployed. These vulnerabilities damage the reliability of network software and create security holes in computing environment. Many critical security vulnerabilities

A protection model for network communications based on security levels
FREE DOWNLOAD
ABSTRACT IPSec was specified to provide authentication, integrity and confidentiality to IP packets. However, the large variety of cryptographic and security options available may cause that the effective cost-protection relation does not correspond to the desired

Automated peer-to-peer security-update propagation network
FREE DOWNLOAD
ABSTRACT In this project we design and implement a security-update propagation network that employs peer-topeer model, where computers act as equals and all hosts participate in providing security update services. When a computer node joins the network to download

A Novel Security Framework for Protecting Network Layer Operations in MANETs
FREE DOWNLOAD
ABSTRACT The important security issue in mobile ad hoc networks is to protect the routing layer from malicious attacks. A unified security solution for such networks is applied to protect both routing and data forwarding operations in the routing layer. In this paper the

Application of rssi on indoor security wireless network
FREE DOWNLOAD
ABSTRACT A smart security system in indoor environment using the Received Signal Strength Index (RSSI) is proposed in this paper. RSSI shows irregular wave pattern with low variance in common closed field. If dramatic RSSI signals happen in a closed environment

Network Resilience and Transport Security: an Overview
FREE DOWNLOAD
ABSTRACT This paper proposes a general conceptual framework which aims to integrate the concept of network resilience within that of transport security. In particular, methodological reflections on the role of resilience vs fragility in connectivity network structures, such as

Combatting Security Risks on the Cable IP Network
FREE DOWNLOAD
ABSTRACT Cable IP networks are often mistakenly believed to be insecure. Theft of service is becoming more common on DOCSIS networks as the details of vulnerabilities are distributed by the press and on websites dedicated to helping subscribers understand

Study of neural network models for security assessment in power systems
FREE DOWNLOAD
ABSTRACT This paper presents the application of different Neural Network (NN) models for classifying the power system states as secure/insecure. Traditional method of security evaluation involves performing load flow and transient stability analysis for each

Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence
FREE DOWNLOAD
We propose a novel approach for statistical risk modeling of network attacks that lets an operator perform risk analysis using a data model and an impact model on top of an attack graph in combination with a statistical model of the attacker community exploitation skill.

Substantiating Security Threats Using Different Views of Wireless Network Traces
FREE DOWNLOAD
ABSTRACT. Huge amounts of network traces can be collected from today s busy computer networks for various analysis. These traces could be used to detect intruders and other unusual events. Real time detection of outliers from large data sets can lead to effective

Smart Synergistic Security Sensory Network for Harsh Environment: Net4S
FREE DOWNLOAD
I Peshko ,intechopen.com This chapter discusses the basic requirements for the design and algorithms of operation of a multi-parametric, synergistic sensory network–Smart Synergistic Security Sensory Network or Net4S–specially adapted for operation at nuclear power plants or other potentially

Location optimization in heterogeneous sensor network configuration for security monitoring
FREE DOWNLOAD
ABSTRACT In many security monitoring contexts, the performance or efficiency of surveillance sensors/networks based on a single sensor type may be limited by environmental conditions, like illumination change. It is well known that different modes of sensors can be

Configuration of a sparse network of LIDAR sensors to identify security-relevant behavior of people
FREE DOWNLOAD
ABSTRACT Surveillance is an important application of sensor networks. In this paper it is demonstrated how a sparse network of stationary infrared (IR) sensors with highly directional, stationary beam patterns based on the LIDAR principle can be used to reliably

Electricity security and contingency planning in hierarchy and network-examples from Sweden
FREE DOWNLOAD
ABSTRACT This article discusses the emergency management strategies of municipal authorities for securing the electricity supply, according to a networked, or governance , control and direction structure, and how this influences the relationship between electricity

Explaining the Advocacy Agenda: Insights From the Human Security Network
FREE DOWNLOAD
Why do transnational advocacy networks select particular issues for attention but not others? This is an important question because advocacy campaigns have been shown to matter significantly in developing new global norms and galvanizing political attention to global

Negotiation of network security policy by means of agents
FREE DOWNLOAD
Nowadays many intranets are deployed without enforcing any network security policy and just relying on security technologies such as firewalls or antivirus. In addition, the number and type of network entities are no longer fixed. Typically, laptops, PDAs or mobile phones

Related
k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities SOFTWARE
EMBEDDED
ELECTRONICS
VLSI
WIRELESS
CONTACT


k-Zero day safety: A network security metric for measuring the risk of unknown vulnerabilities ABSTRACT By enabling a direct comparison of different security solutions with respect to their relative effectiveness, a network security metric may provide quantifiable evidences to assist security practitioners in securing computer networks. However, research on security
network security research paper-113

network security research paper-100


- -

FREE IEEE PAPER