Welcome![Sign In][Sign Up]
Location:
Search - Networks Security

Search list

[OtherNeural Network Learning

Description: This book is about the use of artificial neural networks for supervised learning problems. Many such problems occur in practical applications of artificial neural networks. For example, a neural network might be used as a component of a face recognition system for a security appli- cation. After seeing a number of images of legitimate users' faces, the network needs to determine accurately whether a new image corresponds to the face of a legitimate user or an imposter. In other applications, such as the prediction of future price of shares on the stock exchange, we may require a neural network to model the relationship between a pattern and a real-valued quantity.
Platform: | Size: 20091030 | Author: kj5566 | Hits:

[OtherGSM

Description: 本章主要介绍GSM 有关的基础知识,诸如:GSM 发展简史、数字移动通信 技术、GSM 系统结构及相关接口、TDMA 帧结构、GSM 的区域定义及GSM 识别号、无线接口的逻辑信道及系统消息、GSM 系统的移动性管理和安全性 管理以及GSM 移动网络结构和信令网等。-This chapter introduces the basic knowledge of GSM-related, such as: GSM development history, digital mobile communication technology, GSM system architecture and related interfaces, TDMA frame structure, GSM regional definition and GSM identification numbers, logical channel wireless interfaces and systems news GSM system mobility management and security management, and GSM mobile network architecture and signaling networks.
Platform: | Size: 644096 | Author: littleboy85 | Hits:

[JSP/JavaSECURITY

Description: 高等院校计算机应用技术硕士研究生课程,高级计算机网络程序设计实例子代码,SECURE部分.-Master of Computer Application Technology tertiary post-graduate courses, advanced computer networks, programming examples of sub-code, SECURE part.
Platform: | Size: 35840 | Author: 罗一 | Hits:

[OS programsee

Description: 基于TTL分析的计算机网络应用研究..本文在对国内外TTL应用情况进行分析的基础上,讨论并模拟实现了TTL在网络故障诊断和网络安全方面的应用。-TTL-based analysis of application of computer networks at home and abroad .. In this paper, the application of an analysis of TTL on the basis of the discussion and simulation of the realization of the TTL in the network fault diagnosis and network security applications.
Platform: | Size: 1485824 | Author: 042201111232 | Hits:

[Linux-Unixhipl.1.0.1

Description: Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the related architecture. HIP is a proposal to change the TCP/IP stack to securely support mobility and multi-homing. Additionally, it provides for enhanced security and privacy and advanced network concepts, such as moving networks and mobile ad hoc networks. HIP is "cool", which means that as a mobile VPN solution, when your network interfaces go up or down, there is no need to re-establish a secure tunnel.
Platform: | Size: 2965504 | Author: nihao | Hits:

[Other802.11i-2004

Description: IEEE 802.11i-2004 Amendment to IEEE Std 802.11, 1999 Edition (Reaff 2003). IEEE Standard for Information technology--Telecommunications and information exchange between system--Local and metropolitan area networks?Specific requirements--Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications--Amendment 6: Medium Access Control (MAC) Security Enhancements
Platform: | Size: 1651712 | Author: 周金喜 | Hits:

[VOIP programSIP10

Description: 分析了会话发起协议及其特点,指出了SIP网络面临的一些典型攻击和安全威胁,并针 对SIP网络面临的安全风险提出了基于PKI公钥基础设施的SIP协议安全的解决方案,完善 了SIP的安全机制,使SIP能进一步为用户提供更加多样、安全的服务。-Analysis of the Session Initiation Protocol and its characteristics, pointing out that the SIP network is facing some of the typical attacks and security threats, and SIP networks for security risks faced by PKI based on public key infrastructure of the SIP protocol security solutions, improved the SIP- security mechanism, so that SIP will further provide users with a more diverse, security services.
Platform: | Size: 203776 | Author: 王名 | Hits:

[Othercomputer--network

Description: 计算机网络课件(qos机制、网络安全、网络基础知识)-Courseware for computer networks (qos mechanisms, network security, network basic knowledge)
Platform: | Size: 2885632 | Author: 辛强 | Hits:

[OtherWireless.Security.GSM.UMTS.802.dot.11

Description: 关于无线安全的一本好书,包括了二代、三代移动通信网络和无线局域网里面的安全协议和算法。-Wireless Security is a vast topic and any attempt to address all issues in a single book is a daunting task. It is almost impossible to explain each and every security algorithm that is used in wireless security in detail in a single volume. In writing this book, I have tried to strike a balance between architectural overviews and minute details. The aim of this book has been to answer questions like: How is wireless security different from security of wireline networks? How has wireless security evolved with changes in wireless networking? What is the architectural philosophy behind the design of wireless security protocols? What are the loopholes in these protocols and how can they be rectified in future designs?
Platform: | Size: 4146176 | Author: 秦中元 | Hits:

[BooksWSNsleach

Description: 基于无线传感器网络的一种安全路由协议 针对无线传感器网络(WSN)中路由协议的安全隐患,提出了一种安全的路由协议.该路由协 议在传统的定向扩散协议基础上增加安全机制,把整个路由过程分为路由建立和路由更新2个阶段,并对其安 全性进行分析.通过在路由建立阶段使用小区密钥和通信密钥,能为网络选择安全的路由;路由更新能在出 现路由故障时重新建立路由,进一步提高了无线传感器网络的路由安全性能. -Wireless sensor networks based on a secure routing protocol for wireless sensor network (WSN) routing protocol in the security risk, a routing protocol security. The routing protocol in the traditional orientation to increase the proliferation of agreements based on the security mechanism, the entire routing process is divided into routing updates and routing to establish two stages, and its security analysis. Routing through the cell-key establishment phase and communication using the key security options for network routing routing update to routing in the event of failure to re-establish routing to further improve the routing of wireless sensor network security .
Platform: | Size: 522240 | Author: 池尚琨 | Hits:

[Internet-Networkjsjwllw

Description: 计算机网络安全分析与防范策略论文 本文,将综合概括一些过去、现有的网络和系统漏洞,就几种常见的和最新出现的漏洞及其特征进行详细的说明,并就此进一步展开对这些漏洞的防范措施的具体介绍,使大家认识并了解这些漏洞的危害,从而更好的保护自己的计算机。通过对计算机网络面临威胁的分析,该文提出了网络安全方面的一些具体防范措施,提高了计算机网络的安全性。-Computer network security analysis and prevention strategy papers in this article will summarize some of the past, the existing network and system vulnerabilities, and on the latest of several common loopholes and a detailed description of the characteristics and to further these loopholes specific preventive measures introduced, so that we can recognize and understand the dangers of these loopholes in order to better protect their computers. Through the computer network threat analysis, the paper presents aspects of network security to guard against a number of specific measures to improve the security of computer networks.
Platform: | Size: 26624 | Author: 余祖澔 | Hits:

[OtherSecurity.and.Quality.of.Service.in.Ad.Hoc.Wireles

Description: it is Security and Quality of Service in Ad Hoc Wireless Networks Mar 2008
Platform: | Size: 2507776 | Author: vamsikrishna | Hits:

[Industry researchadhoc_tutorial_PPT

Description: 详细介绍无线多跳adhoc网络的PPT.包括网络中的MAC层和路由层介绍、常用的协议算法,存在的问题,TCP与UDP协议性能比较,安全问题等,有助于了解Ad hoc网络的概况 -Details of the wireless multi-hop adhoc networks PPT. Including the network MAC layer and routing layer description of the protocol algorithm used, problems, TCP and UDP protocol performance comparison, the security problems, and so help to understand the profile of Ad hoc Networks
Platform: | Size: 4546560 | Author: lily | Hits:

[Program docOReilly.802.11.Wireless.Networks.The.Definitive.G

Description: As a network administrator, architect, or security professional, you need to understand the capabilities, limitations, and risks associated with integrating wireless LAN technology into your current infrastructure. This practical guide provides all the information necessary to analyze and deploy wireless networks with confidence. It?s the only source that offers a full spectrum view of 802.11, from the minute details of the specification, to deployment, monitoring, and troubleshooting.
Platform: | Size: 7806976 | Author: MEONGHUN LEE | Hits:

[Internet-NetworkSensor-Network-Security-A-Survey

Description: 本文是一篇关于传感器网络安全的综述,详细地从各个层介绍了它的研究情况。-Wireless sensor networks(WSNs) use small nodes with constrained capabilities to sense,collect,and disseminate information in many types of applications.As sensor networks become wide-spread,security issues become a central concern, especially in mission-criticaltasks.In this paper,we identify the threats and vulnerabilities to WSNs and summarize the defense methods based on the networking protocol layer analys is ?rst.Then we give a holistic overview of security issues.These issues are divided into seven categories:cryptography,keymanage- ment,attack detections and preventions,securer outing,secure location security,secure data fusion,and other security issues. Along the way we analyze thead vantages and disadvantages of current secure schemes in each category.Inaddition,we also summarize the techniques and methods used in these categories,and point out the open research issues and directions in each area.
Platform: | Size: 348160 | Author: 马宁 | Hits:

[Software EngineeringSecurity-Radio-Networks

Description: Security in Cognitive Radio Networks -Security in Cognitive Radio Networks
Platform: | Size: 283648 | Author: 张中 | Hits:

[Internet-Network1-Security-Issues-in-Wireless-Sensor-Networks---I

Description: Wireless sensor network in security
Platform: | Size: 78848 | Author: atul | Hits:

[Program docCooperative-Cellular-Wireless-Networks

Description: This are kind of the books that focus on wireless networking that include, Wireless Ad Hoc, Security in Wireless Ad Hoc and Sensor Networks, Cellular and Wireless networking Technology, that I intent to share for improve and development each other for the best new in the world. I hope for the next future will have something new more for the modern technology. Thank you-This are kind of the books that focus on wireless networking that include, Wireless Ad Hoc, Security in Wireless Ad Hoc and Sensor Networks, Cellular and Wireless networking Technology, that I intent to share for improve and development each other for the best new in the world. I hope for the next future will have something new more for the modern technology. Thank you!!!
Platform: | Size: 8784896 | Author: sokun | Hits:

[Program docChapter-Ross-Security

Description: computer networks security explained in pdf form
Platform: | Size: 596992 | Author: omar | Hits:

[Othersecurity

Description: Approach: NS-2 is an open source system that is developed using C++ and Tool Control Language TCL. Researchers can freely add new components to the system to server their own purposes. The latest version of NS-2 is version 2.28. Within this version, most of the standard protocols supported. You can find protocol from media access layer protocols such as CSMA/CD up to application protocols as FTP and HTTP. For routing protocols, there are unicast and multicast routing protocols for wire network and DSR, DSDV, AODV for wireless ad-hoc networks. Most of these protocols were developed by researchers and adopted into standard version of NS-2. In order to experiment security features for network, we need to add security functions into NS-2. Of course for specific experiments there are specific requirements. The purpose of this project is only to illustrate a way to add security functions into NS-2 Our approach is to build a new protocol at network layer
Platform: | Size: 2048 | Author: bvc | Hits:
« 12 3 4 5 6 7 8 9 10 »

CodeBus www.codebus.net