GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks
A negligibility-based framework to model network-centric security problems in mobile ad hoc networks. Modeling network-centric security in a negligibility-based framework with network scale as the input parameter and anti-disruption secure routing.
Подобные документы
?atch generation of web pages, local interaction. Non-linear structure: blocks of text, links between pages create a mesh or network, users follow their own path through information. Delivery technology: on the computer, on the web, on the move.
???????????, добавлен 28.12.2013The Internet - a global association of computer networks. E-mail - system for sending messages between users. Guaranteeing the flow of information between customers, establishment of a virtual connection - the tasks of Transmission Control Protocol.
??????????? ??????, добавлен 20.05.2016To develop an extension to a traditional RDF model of describing knowledge graph in accordance with the standards of the Semantic Web. The concept of Executable Knowledge for Protege based on traditional types of properties within the RDF model.
??????, добавлен 29.01.2016Communicating over long distances. The Telegraph and commercial Growth of the Telephone. The Emergence of Broadcasting. International Telecommunications Networks. Hand-Held Radio Transceivers. History and development of communications satellites.
???????, добавлен 24.12.2013The article deals with problems of a different nature that arise in any type of business activity with insufficient attention to the removal or concealment of the information contained in the metadata of various documents. Various types of documents.
??????, добавлен 16.01.2024Characteristics of the segment of cloud technologies in Russia, an analysis of their advantages and disadvantages. The main types of cloud services models, the problems of their use (confidentiality, security). Preferences of using clouds in Russia.
??????, добавлен 06.05.2018Micali-Reyzin computational model. Target circuit and block cipher. Analysis of single point leakages. Towards the analysis of real constructions. Definition of security against side-channel attacks. The initialize a PRNG securely with a public seed.
??????, добавлен 15.09.2012Proposing of the risk management models for IT projects based on Markov chains. Analysis of tools of the buffer management concept, principles of agile methodologies, and knowledge management to address the issues connected with use of Morkovian model.
??????, добавлен 30.07.2017The complex of program models of technical system of ecological monitoring, its structure and components. Models based on the results of the studied biophysical effects of the influence of certain technical pollutants on the cells of living organisms.
??????, добавлен 22.12.2016The methods of image segmentation, a process of division of an image into different segments which contain pixels of similar color, are considered. Graph-based segmentation algorithm, which is based on Kruskal’s algorithm is implemented in C++ language.
??????, добавлен 23.02.2016Three types of Italian social networkers through the analysis of latent class conglomerates are shown in this study, based mainly on the level of use of the tools, as well as different covariates which determine the personal profile of social networkers.
??????, добавлен 28.09.2016?????? ?????????? ?????????? ??????????? ???????? ????????? ????? ?? ?????????????? ?????????? Cartoon Network. ?????????? ? ????????????? ????????? ?????????? ???????? ???????? ????????? Adult Swim. ?????????????? ??????? ????????????? ?????????????.
??????, добавлен 21.04.2020To fulfill the need for such resources, farms must increase production rate. One of the aspects of farming that needs development is cattle identification. Current technology is applied by using tags, tattoos on cows to distinguish them from one another.
??????, добавлен 14.02.2025A new approach to computer security. Building a unified binary analysis platform and using it to provide novel solutions. Providing an extensible architecture. Combining static and dynamic analysis in program. Properties from binary programs BitBlaze.
??????, добавлен 15.04.2014?????? ? ?????????????????? ????, ??????????? ?????????? ??????? ????????. ??????? ???????????????? ??????????? ??? SNMP-?????? (Simple Network Management Protocol). ????????? ????????? ????????? ????????. ???????? ?????? ? ?????????????? ?? ???????????.
??????, добавлен 17.04.2015Consideration of various information security standards in the Russian commercial organizations. Methods of data protection. Potential application of international standards in information security activities of the Russian commercial organization.
??????, добавлен 13.02.2016?????????????? ?????????? ? ???????? ??????????? ???????????, ?????????????? ? ???????????? ????? ???????? ?????? ? ??????????? ???????? ?????????? ?????? ???????????. ???????? Controller Area Network (ISO/DIS 11898) – ??????????? ????, ??????? ??????.
????????? ??????, добавлен 27.10.2010?????????????? ???????????? ?????? NIDPS (Network-based Intrusion Detection and Prevention System) ??? ??????????? ? ?????????????? ????????? ? ???????????????????? ???????? ? ?????. ????? Wireshark ??? ?????????? ???????? ??????? ? ?????????? ???????.
??????, добавлен 23.02.2016- 119. Methods of traffic regulation and user reputation handling in the bittorrent peer-to-peer networks
Examining various methods of traffic throttling and user reputation handling in the context of Bittorrent networks. An overview of the main methods for calculating user reputation and ways to differentiate the quality of services based on them.
??????, добавлен 27.05.2021 The invention of the computer. Babbage's demonstration model mechanical calculator. Sequence of operations for column. The logical structure of the Analytical Engine. The programming language. Mechanical calculation device based on the design in 1853.
???????, добавлен 17.12.2015The main stages and features of the access procedure (identification, authentication and authorization) in Microsoft Windows operating systems. Contribute to evil, circumvention and protection of access. Headways of destruction of cyber security.
??????, добавлен 28.05.2023??????? ???????? ??????????, ?????????????? ?? ??????? ?????. ??????????? ??????????? ? ????????? ????????. ??????? ???????? ????????? Neural Network Wizard. ???????? ????????? ?????? ???????????? ????????? ???????????????. ???? ?????????? ?? ????????.
???????, добавлен 14.10.2013- 123. National cyber security system of Ukraine: perspectives of policy development and capacity building
The main need is to build a national cybersecurity system that will allow Ukraine to counter current cyber threats to its security, stability and prosperity. Characteristics of identifying the main problems that hinder the further development of NCSS.
??????, добавлен 03.12.2020 The performance of transmission Multi Input Multi Output beamforming for the multi subscriber in large cell with effective channel throughput has been investigated. Singular value decomposition (SVD) using Single User in 3GPP Long Term Evolution (LTE).
??????, добавлен 23.02.2016?????????? ?? ?????? ?????????? Neural Network ??????????? ?????????? ??? ??????????????? ????????? ???????, ?????????????? ????????? ?????? ? ??????????? ??????????. ??????? ???????? ??????? ??? ?????????? ??????????????? ? ??????????? ???????????.
??????, добавлен 05.04.2020
