Suchergebnisse
Filter
Format
Medientyp
Sprache
Weitere Sprachen
Jahre
6321720 Ergebnisse
Sortierung:
Software-Defined Networking for Unmanned Aerial Vehicular Networking and Security: A Survey
Despite the immense benefits offered by the utilization of unmanned aerial vehicles (UAVs) in civilian and military applications, significant work needs to be done to ensure that these systems are able to securely communicate and resiliently operate to accomplish the mission. As the UAVs grow with their popularity and usability for different applications, there is a dire need to ensure that UAVs and their networks are capable of mitigating cyber-attacks on the fly. One approach that has gained considerable popularity is Software-Defined Networking (SDN) based solutions. SDN is a networking paradigm that has gained attention due to its dynamic flexibility to program networks and increase network visibility, and its potential to assist in the mitigating security vulnerabilities in the network including the network of UAVs. This article provides an overview of recent advances, and current state of art related to security vulnerabilities and SDN enabled countermeasures. This paper also presents a comparison of different approaches in a tabular form and a discussion of challenges and future research directions with respect to UAV security.
BASE
Automating the Assessment of Networking and Security in Higher Education
In: Annals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516-029X, pp. 1-13, Vol. 4, No. 2, 1st April 2020, Published by International Association of Educators and Researchers (IAER), DOI: 10.33166/AETiC.2020.02.001
SSRN
Networking security in Asia
In: The Washington quarterly, Band 40, Heft 3, S. 45-62
ISSN: 0163-660X, 0147-1465
World Affairs Online
Networking Security in Asia
In: The Washington quarterly, Band 40, Heft 3, S. 45-62
ISSN: 1530-9177
Big Data Security Issues in Networking
In: JETIR- International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 4, page no. pp244-249, April-2019
SSRN
Εnhancing social networking in smart cities: Privacy and security borderlines
The proliferation of social platforms and the enhanced connectivity have led people of different age groups, ethnicity, social or economic status to reveal a great deal about themselves online. Data collected from online social networks (OSN) provides social, economic, and cultural information which can be utilized by governments, policy makers, authorities and even commercial industries to better understand market trends and behavioral patterns, that can influence the individual dynamics through open data sources. OSN constitute a breeding ground for the spread of several risks and threats to privacy and security that affect participation and quality of life in smart cities. Although the aspects of privacy and security, and individuals' behavior in social networking are important for the successful development of smart cities, they have not been adequately discussed. To this end, this study aims to address this issue by revealing the risks, threats and individuals' behavior on OSN as an attempt to enhance privacy and security, and boost community's engagement in smart cities. Furthermore, a novel model which outlines the relationships between privacy and security threats, along with some effective countermeasures for the protection of OSN users in smart cities are proposed. https://doi.org/10.1016/j.techfore.2018.10.026
BASE
Security and Privacy in Molecular Communication and Networking: Opportunities and Challenges
International audience ; Molecular Communication (MC) is an emerging andpromising communication paradigm for several multi-disciplinarydomains like bio-medical, industry and military. Differently to thetraditional communication paradigm, the information is encodedon the molecules, that are then used as carriers of information.Novel approaches related to this new communication paradigmhave been proposed, mainly focusing on architectural aspects andcategorization of potential applications. So far, security and privacyaspects related to the molecular communication systems havenot been investigated at all and represent an open question thatneed to be addressed. The main motivation of this paper lies onproviding some first insights about security and privacy aspects ofMC systems, by highlighting the open issues and challenges andabove all by outlining some specific directions of potential solutions.Existing cryptographicmethods and security approaches arenot suitable for MC systems since do not consider the pecific issuesand challenges, that need ad-hoc solutions.We will discuss directionsin terms of potential solutions by trying to highlight themain advantages and potential drawbacks for each direction considered.We will try to answer to the main questions: 1) why thissolution can be exploited in the MC field to safeguard the systemand its reliability? 2) which are the main issues related to the specificapproach?
BASE
Trinity of Sustainability: Water Security and Networking in Myanmar and Cambodia
SSRN
Working paper
From Security to Community Detection in Social Networking Platforms
In: Lecture Notes in Social Networks Ser.
Intro -- Preface -- Introduction -- From Security to Community Detection in Social Networking Platforms -- Contents -- Real-World Application of Ego-Network Analysis to Evaluate Environmental Management Structures -- 1 Introduction -- 2 Methods -- 2.1 Study Areas -- 2.2 Research Design and Data Collection -- 3 Concepts and Methodology -- 4 Research Findings and Discussion -- 4.1 Structure of the Ego-Networks -- 4.2 Correlation Between the Indegree and Betweenness Values of the Networks -- 4.3 Consequences of Removing the Ego: Role of Simmelian Ties and Girvan-Newman Clustering -- 5 Conclusions and Future Work -- References -- An Evolutionary Approach for Detecting Communities in Social Networks -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 The Algorithm -- 3.2 Encoding and Initialization -- 3.3 Fitness Function -- 3.4 Crossover -- 3.5 Mutation -- 3.6 Selection -- 3.7 Preprocess -- 4 Experimental Results and Discussion -- 4.1 Datasets -- 4.2 Comparison Between Genetic Algorithms -- 4.3 Comparison with Different Community Detection Algorithms for Social Networks -- 4.4 Experiments with Using Preprocess Step -- 5 Conclusion -- References -- On Detecting Multidimensional Communities -- 1 Introduction -- 1.1 Related Approaches -- 1.2 Motivations and Contributions -- 2 The MCDA Approach -- 2.1 Problem Statement -- 2.2 Outlier Handling -- 2.2.1 Step 1: Estimating Outlier Scores -- 2.2.2 Step 2: Automatic Identification of Outliers -- 2.3 Summary of Outlier Handling Procedure -- 2.4 Mining Community Structures -- 2.4.1 Community Detection Approach -- 2.4.2 Selection of Relevant Dimensions of Communities -- 2.5 Summary of the MCDA Approach -- 3 Experimental Results -- 3.1 Experiments on Synthetic Networks -- 3.1.1 Synthetic Network Generation -- 3.1.2 Community Detection Accuracy -- 3.1.3 Outlier Immunity -- 3.1.4 Scalability Experiments.
Gendered Networking: Gender, Environment, and Managerial Networking
In: Public administration review: PAR, Band 78, Heft 3, S. 409-421
ISSN: 1540-6210
AbstractThis article examines how gender influences top managers' networking activities and what situational factors intensify or ameliorate such gender effects. Focusing on female top managers' efforts to engage in external networking activities, the authors conceptualize how and why female managers might develop different networking patterns and how such relationships could be redirected by several contingent factors specific to the context of U.S. local school districts. Using three sets of surveys on managerial behavior and management styles supplemented with six years of information related to organizational contexts, the authors find that, in general, gender differences lead to corresponding differences in the extent of involvement in managerial networking. Such effects are moderated by situational factors that impede or facilitate the number of available strategic managerial choices that allow managers to cope with them. The findings emphasize the need to consider the strengths and weaknesses of gender conjointly in assessing networking behaviors.
Social media security: leveraging social networking while mitigating risk
"Technology has become less about connecting computers, and more about connecting people. A major reason for this evolution is that the use of social media has exploded in the last few years, making it easier for individuals and businesses to contact others and get their messages across to large audiences. According to a July 2012 study by the McKinsey Global Institute, there are 1.5 billion people using social networking throughout the world, with 80% of them interacting regularly with other social media users. Its popularity and the drive to reach to customers has lead to 70% of companies using social media. Social technology has become a way of life in how we socialize and do business. However, while social media is a powerful tool for interacting with others, many people and organizations have jumped into using it without considering the risks. The threats you face can affect your safety, your job and your business. In this book, we'll show you how to deal with the potential dangers, but before that, let's start by understanding what social media is and how it's evolved"--
Counter hack reloaded: a step-by-step guide to computer attacks and effective defenses
In: The Radia Perlman series in computer networking and security
Aspects of Networking: Experience from Global Monitoring for Security and Stability
In: Verifying Treaty Compliance, S. 349-365
Networks and Networking
In: IASSIST quarterly: IQ, Band 2, Heft 3, S. 56
ISSN: 2331-4141
Networks and Networking