[go: up one dir, main page]

Shadmanov et al., 2016 - Google Patents

Summarization of various security aspects and attacks in distributed systems: A review

Shadmanov et al., 2016

View PDF
Document ID
146025968425129131
Author
Shadmanov I
Shadmanova K
Publication year
Publication venue
Advances in Computer Science: an International Journal

External Links

Snippet

The modern world is filled with a huge data. As data is distributed across different networks by the distributed systems so security becomes the most important issues in these systems. Data is distributed via public networks so the data and other resources can be attacked by …
Continue reading at www.academia.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Arogundade Network security concepts, dangers, and defense best practical
Mubeen et al. Strategies to Avoid Illegal Data Access
Khan et al. NETWORK THREATS, ATTACKS AND SECURITY MEASURES: A REVIEW.
Singh et al. Information security: Components and techniques
Chuka-Maduji et al. Cloud computing security challenges and related defensive measures: A survey and taxonomy
Jenani Network security, a challenge
Firmansyah Cybersecurity Fundamentals
Veríssimo et al. Fundamental security concepts
Shadmanov et al. Summarization of various security aspects and attacks in distributed systems: A review
Rohilla et al. Comparison of Cloud Computing Security Threats and Their Counter Measures
Shukla et al. Cyber security techniques management
Obodoeze et al. A holistic mobile security framework for Nigeria
SOX This White Paper
Kılıç et al. Security Issues of Remote Work Environments and Alternative Solution Approaches
Sharma et al. Network Security: A Major Challenge in India
Pathak The Review of Terms and Concepts used to Understand Cybercrime to Safeguard Ourselves from Cybercriminals.
Kolawole et al. Practical Approaches to Securing an IT Environment
Soriano Information and network security
Rani et al. 3 Cyber Security Techniques
Bhosle et al. Technical Review on Network Security
Suhag Paradigmatic Approaches for Network Security and Preventing Intrusions: A Secure Computer Shield
Harrison et al. A protocol layer survey of network security
Qureshi Analysis of Network Security Through VAPT and Network Monitoring
Nair et al. Cyber Attacks and its Prevention Techniques
Garg et al. Security of Modern Networks and Its Challenges