Results 11 to 20 of about 58,524 (307)

WIRELESS SENSOR NETWORK: TOWARDS AN IMPROVEMENT OF SECURITY POLICY [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2021
The ad hoc network (or MANET, for Mobile Ad hoc NETwork) is a system containing a set of devices that organize themselves, thus forming an autonomous and dynamic network, communicating via radio interface.
L. Moulad, R. Chaabita, K. Balar
doaj   +1 more source

A Model for the Analysis of Security Policies in Industrial Networks [PDF]

open access: yesElectronic Workshops in Computing, 2013
The analysis of security policies designed for ICS and SCADA can benefit significantly from the adoption of automatic/semi-automatic software tools that are able to work at a global (system) level. This implies the availability of a suitable model of the system, which is able to combine the abstractions used in the definition of policies with the ...
I Cibrario Bertolotti   +3 more
openaire   +5 more sources

Security policy enforcement for networked smart objects [PDF]

open access: yesComputer Networks, 2016
In the Internet of Things (IoT) heterogeneous technologies concur to the provisioning of customized services able to bridge the gap between the physical and digital realms. Security, privacy and data quality are acknowledged to represent key issues to be tackled in order to foster the large-scale adoption of IoT systems and technologies.
SICARI, SABRINA SOPHY   +4 more
openaire   +2 more sources

A Novel Administration Model for Managing and Organising the Heterogeneous Information Security Policy Field

open access: yesApplied Sciences, 2023
Information security policy (ISP) plays a crucial role in maintaining the availability, confidentiality, and integrity of sensitive data. However, it is of high complexity and heterogeneity due to the variety and redundancy of security policy practices ...
Fahad Mazaed Alotaibi   +3 more
doaj   +1 more source

Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks [PDF]

open access: yesSensors, 2015
Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different ...
Mónica Pinto   +5 more
openaire   +6 more sources

Network Policies in Kubernetes: Performance Evaluation and Security Analysis [PDF]

open access: yes2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), 2021
5G applications with ultra-high reliability and low latency requirements necessitate the adoption of edge computing solutions in mobile networks. Container orchestration frameworks like Kubernetes (K8s) have further emerged as the preferred standard to dynamically deploy edge applications on demand of end-users and third-party companies. Unfortunately,
Budigiri, Gerald   +4 more
openaire   +2 more sources

5G Network Slice Isolation

open access: yesNetwork, 2022
This article reveals an adequate comprehension of basic defense, security challenges, and attack vectors in deploying multi-network slicing. Network slicing is a revolutionary concept of providing mobile network on-demand and expanding mobile networking ...
Stan Wong, Bin Han, Hans D. Schotten
doaj   +1 more source

Tunneling Activities Detection Using Machine Learning Techniques

open access: yesJournal of Telecommunications and Information Technology, 2023
Tunnel establishment, like HTTPS tunnel or related ones, between a computer protected by a security gateway and a remote server located outside the protected network is the most effective way to bypass the network security policy.
Fabien Allard   +3 more
doaj   +1 more source

An Effective Algorithm for Collision Resolution in Security Policy Rules

open access: yesМоделирование и анализ информационных систем, 2019
A firewall is the main classic tool for monitoring and managing the network traffic on a local network. Its task is to compare the network traffic passing through it with the established security rules.
Sergey V. Morzhov, Valeriy A. Sokolov
doaj   +1 more source

Chemical Enterprise Network Construction and Network Security Solution

open access: yesChemical Engineering Transactions, 2018
With the informatization process of the chemical industry deepening and the scale of chemical enterprise network gradually expanding, it has brought about the problems of network and information security in chemical enterprises.
Hong Zhang, Pei Li, Jie Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy