Results 271 to 280 of about 186,948 (311)
Some of the next articles are maybe not open access.
NetSecu: A Collaborative Network Security Platform for In-network Security
2011 Third International Conference on Communications and Mobile Computing, 2011Malicious attacks are frequently launched to make specified network service unavailable, compromising end hosts for political or business purpose. Though network security appliances are widely deployed to resist these attacks, there is a lack of dynamic and collaborative platform to flexibly configure and manage all the security elements. In this paper,
Zhen Chen, Xinming Chen, Beipeng Mu
openaire +2 more sources
Security in the age of networks
Policing and Society, 2004Using the literature on the networked society as a starting point, this article argues that security can also be conceptualized as being produced by various networks of actors—public and private. This approach eschews the usual debate between those who defend the pre‐eminence of the state (general interest) and those in favour of a plural mode of ...
openaire +2 more sources
2009
In recent years, cellular networks have become open public networks to which end subscribers have direct access. This has greatly increased the number of threats to cellular networks. Though cellular networks have vastly advanced in their performance abilities, the security of these networks still remains highly outdated.
Peng Liu+2 more
openaire +4 more sources
In recent years, cellular networks have become open public networks to which end subscribers have direct access. This has greatly increased the number of threats to cellular networks. Though cellular networks have vastly advanced in their performance abilities, the security of these networks still remains highly outdated.
Peng Liu+2 more
openaire +4 more sources
2013
This chapter talks about the network design and firewall configuration which will provide the readers a database with the most secure configuration.
openaire +2 more sources
This chapter talks about the network design and firewall configuration which will provide the readers a database with the most secure configuration.
openaire +2 more sources
2013
Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless technologies cover a broad range of differing capabilities oriented toward different uses and needs. This chapter classifies wireless network security threats into one of nine categories:
Gansen Zhao+4 more
openaire +3 more sources
Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless technologies cover a broad range of differing capabilities oriented toward different uses and needs. This chapter classifies wireless network security threats into one of nine categories:
Gansen Zhao+4 more
openaire +3 more sources
On a Network Security Model for the Secure Information Flow on Multilevel Secure Network
2001We propose a new network security model for secure information flow on multilevel secure network by defining simple security flow concepts. The proposed network security model enables the network to withstand the cascade vulnerability. Therefore, the proposed security model is secure against the potential cascade vulnerability problems.
Hong Ki-Yoong, null P.E., Chul Kim
openaire +2 more sources
1977
The need for security in computer networks is underlined by the continuing debate on individual privacy and the role of the computer. In the minds of those who fear the computer as a threat to privacy, the computer network is likely to appear a worse threat.
openaire +2 more sources
The need for security in computer networks is underlined by the continuing debate on individual privacy and the role of the computer. In the minds of those who fear the computer as a threat to privacy, the computer network is likely to appear a worse threat.
openaire +2 more sources
Genetic testing in prostate cancer management: Considerations informing primary care
Ca-A Cancer Journal for Clinicians, 2022Veda N Giri+2 more
exaly