Search Results - "network security"

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Computer Communication Networks Security Analysis by Gumel, Lawan Ahmed

    Published 1999
    “…Generic categories of threats and vulnerabilities to computer networks are outlined as well as network security objectives. The study culminates in the description of a recommended alternative approach for the development of Group Oriented Cryptosystems (GOC) which can be used to solve the problem of entity authentication and subsequent key distribution in order to enhance multiple-entity (group of entities) communications with confidentiality and integrity services.E-mail security is about protecting electronic mails from spies, interlopers, and spoofs. …”
    Get full text
    Get full text
  7. 7
  8. 8
  9. 9

    Vulnerability analysis on the network security by using Nessus by Hamid Ali, Firkhan Ali

    Published 2004
    “…Within this type of attention, network security has gone from the as an extra services to the main services in a relatively short period in FTMM. …”
    Get full text
    Get full text
  10. 10

    Enhancement of network security by use machine learning by Hasan, Ahmed Raheem

    Published 2019
    “…This research is about the design and simulation on enhancement network security using machine learning. The design use MATLAB coding to show the simulation. …”
    Get full text
    Get full text
    Get full text
    Get full text
  11. 11

    Immune Inspired Framework for Ad Hoc Network Security by Yasir Abdelgadir , Mohamed, Azween, Abdullah

    Published 2009
    “…Many immune-inspired techniques have been developed with the aim to tackle different computing problems. Network security represents one of the most significant fields that the immune-inspired techniques have been applied to. …”
    Get full text
    Get full text
  12. 12

    Immune Inspired Framework for Ad Hoc Network Security by Yasir Abdelgadir , Mohamed, Azween, Abdullah

    Published 2009
    “…Many immune-inspired techniques have been developed with the aim to tackle different computing problems. Network security represents one of the most significant fields that the immune-inspired techniques have been applied to. …”
    Get full text
    Get full text
  13. 13
  14. 14
  15. 15
  16. 16

    Network security situation awareness based on indicators extracted by Xie, Zeqiang

    Published 2016
    Subjects: “…Computer networks - Security measures…”
    Get full text
    Get full text
  17. 17
  18. 18

    Biological Inspired Approach in Parallel Immunology System for Network Security by muna, elsadig, Azween, Abdullah

    Published 2010
    “…inspired computer security has various techniques to solve the problems that facing computer networks security, such as immune system, diversity, danger theory, virus Epidemiology and non- representational approaches. …”
    Get full text
    Get full text
  19. 19

    Hybrid Biological Intrusion Prevention and Selfhealing System for Network Security by Muna, Elsadig, Azween, Abdullah

    Published 2010
    “…this paper describes a new approach for network security based on the combination of biological intrusion prevention and self-healing concepts. …”
    Get full text
    Get full text
  20. 20

    Biological Intrusion Prevention and Self-Healing Model for Network Security by Muna, Elsadig, Azween, Abdullah

    Published 2010
    “…This paper describes a new approach for network security based on the combination of biological intrusion prevention and self-healing concepts. …”
    Get full text
    Get full text