Survey on wireless network security

R Nazir, AA Laghari, K Kumar, S David… - Archives of Computational …, 2021 - Springer
A wireless network is used to connect various wired organizational structures and provide
connectivity within the organization for employees to move freely by avoiding the hurdle of a …

Bulut bilişimde güvenlik zafiyetleri, tehditleri ve bu tehditlere yönelik güvenlik önerileri

İK AKSAKALLI - Uluslararası Bilgi Güvenliği Mühendisliği Dergisi, 2019 - dergipark.org.tr
Bulut bilişim, yeni çağı simgeleyen paralel hesaplama, dağıtık hesaplama ve sanallaştırma
teknolojilerinin gelişimidir. Bu teknoloji, talep üzerine internet altyapısına inşa edilip bulut …

Bulut Bilişim Sistemleri Kapsamında Kişisel Verilerin Şifreleme Yöntemleri ile Korunması

C Paşaoğlu, E Cevheroğlu - Bilişim Teknolojileri Dergisi, 2020 - dergipark.org.tr
Bilgi toplumunun oluşum aşamalarından günümüze kadar veri, verilerin elektronik ortamlar
dahil işlenmesi, saklanması ve paylaşılması gibi birçok yeni gelişme yaşanmış ve …

[HTML][HTML] Ontology-based cyber security policy implementation in Saudi Arabia

AM Talib, FO Alomary, HF Alwadi… - Journal of Information …, 2018 - scirp.org
Cyber security is an important element of national security and the safekeeping of a nation's
constituency and assets. In Saudi Arabia, the point of interest on cyber security is particularly …

Security Challenges and Cyber-Attacks for Internet of Things

RM Abdul-Hussein, RS Mohammed… - 2021 1st Babylon …, 2021 - ieeexplore.ieee.org
The paradigm of the Internet of Things (IoT) came to allow intercommunication between
different objects via the Internet. We expected that IoT could be applied soon for an easy and …

A study on cloud security issues

DJ Prathyusha, S Naseera - Multiagent and Grid Systems, 2017 - content.iospress.com
Cloud computing provides excellent quality computing services with lower cost and better
performance. The cloud services which are provided by the trusted third party encourage the …

A REVIEW OF WIRELESS NETWORKS: WLAN SECURITY AND THREATS

AA Isah, A Adamu, A Awal, AA Babajo - Advance Journal of Science …, 2022 - aspjournals.org
Abstract Wireless Local Area Network (WLAN) is the fastest growing technology in the
telecommunications industry. The huge increase in the use of this technology has provided …

A novel VENOM attack identification mechanism in cloud virtualization environment

C Abdoul-Kader, SH Chang - Communications of the CCISA, 2018 - cccisa.ccisa.org.tw
This paper investigates the security issue of virtualization in the cloud computing. We focus
on how to identify the VENOM attack in the cloud-computing environment, and how to …

Unusual Behavior Analysis of Virtual Machine in Cloud Environment

S Nivetha, M Saravanan, V Lavanya - Artificial Intelligence Techniques for …, 2021 - Springer
Cloud computing is a model for enabling the resources to access over the internet, rather
than managing files on local storage. Virtual machine is the abstraction of hardware of a …