[PDF][PDF] International journal of advanced research in computer science and software engineering

S Roy, S Nag, IK Maitra, SK Bandyopadhyay - International Journal, 2013 - academia.edu
Tumor segmentation from magnetic resonance imaging (MRI) data is an important but time
consuming manual task performed by medical experts. Automating this process is a …

Analisa Delay Yang Terjadi Pada Penerapan Demilitarized Zone (DMZ) Terhadap Server Universitas Andalas

S Ikhwan, I Elfitri - Jurnal Nasional Teknik Elektro, 2014 - jnte.ft.unand.ac.id
Network security is vital to a computer network. Weaknesses in computer networks if not
maintained and protected will cause harm in the form of data loss, damage of system server …

Selecting one of a plurality of scanner nodes to perform scan operations for an interface node receiving a file request

BL Andrews, DA Brettell, AJ Ciaravella… - US Patent …, 2013 - Google Patents
Provided are a computer program product, System, and method for selecting one of a
plurality of Scanner nodes to perform scan operations for an interface node receiving a file …

[PDF][PDF] Analysis of Network Security Issue and Its Attack and Defence

U Kumar, SK Mishra, A Chhibba, G Tyagi… - International Journal of …, 2016 - researchgate.net
Network Security has become very important in today's world, as a result of which various
methods are adopted to bypass it. Network administrators need to keep up with the recent …

ANALISA PENERAPAN LAYER 7 FILTERING PADA AKSES PEER-TO-PEER

RA Halimatussa'diyah, MI Herdiansyah, YN Kunang - eprints.binadarma.ac.id
Layer 7 filtering adalah proses penyaringan yang dilakukan di layer 7 yaitu layer aplikasi
dan merupakan suatu metode yang bisa dilakukan dalam membatasi akses-akses yang …

[PDF][PDF] EXPLORATION OF NETWORK SECURITY ISSUE AND ITS ATTACK

K Usharani, AZ Ahmed - researchscript.in
Network Security has become very important in today's world, as a result of which various
methods are adopted to bypass it. Network administrators need to keep up with the recent …

[PDF][PDF] Accomplishment of Security Techniques In Network System: A Study

MRR Kapre - ijeebs.com
Network security involves of the necessities and policies clinch by a network administrator.
Misuse, modification, unauthorized access, refutation of a network of computer and network …

[PDF][PDF] A Survey on Computer and Network Security Attacks

EAJ Alzaid - academia.edu
Computer networks and information systems are used in almost all modern organizations,
and the assurance of their safety and security is critical to the organization business …

[PDF][PDF] Analysis of Network Security Issue and Its Attack and Defense

GM Dahane - ijorst.com
Network Security has become very important in today's world, as a result of which various
methods are adopted to bypass it. Network administrators need to keep up with the recent …

[PDF][PDF] Different Attacks in the Network: A Review

M Angurala, G Kaur - … Journal of Advanced Engineering, Management and … - academia.edu
Network security is protection of the files which can be stored information in network against
hacking, misuse. Network security involves the authorization or access to data which is …