The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work the convergence of ICT security and physical security is addressed. Starting by analyzing the impact of technology penetration on the global market and subsequently on security. Security spending in the Global IT market is analyzed, focusing on the development of the split out, which revealed the fact that spending is not always in the right sector. ICT Security and its classification...
Ad hoc networks are formed with the help of their constituent wireless mobile nodes which are expected to forward packets for other nodes in a cooperative manner. Ad hoc On-demand Distance Vector routing; AODV is one of such protocols that helps to create and maintain routes in spite of the dynamic network topology. This protocol is vulnerable to a number of security threats that come from internal...
Wireless networks play critical roles in present work, home, and public places, so the needs of protecting of such networks are increased. Encryption algorithms play vital roles in information systems security. Those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. CPU and memory usability are increasing with a suitable rates, but battery...
A new Virtual Base Station (VBS) election technique is proposed by this paper to help in QoS provisioning in the infrastructure-less Mobile Ad-hoc Networks referred to as MANET. This VBS election technique is based on the mobile node's Signal-to-Noise Ratio (SNR) and has been applied on the MANET's hybrid routing protocol: The Zone-based Routing Protocol. The developed routing protocol will be referred...
Mobile agents' paradigm and technology is emerging as a powerful tool for engineering highly dynamic, reconfigurable distributed systems and applications in heterogeneous environments. This paper proposes a statecharts-based development process for implementing atomic read/write shared memory in mobile ad hoc networks(geoqurums approach), which allows for a seamless transition from the specification...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.