Shadmanov et al., 2016 - Google Patents
Summarization of various security aspects and attacks in distributed systems: A reviewShadmanov et al., 2016
View PDF- Document ID
- 146025968425129131
- Author
- Shadmanov I
- Shadmanova K
- Publication year
- Publication venue
- Advances in Computer Science: an International Journal
External Links
Snippet
The modern world is filled with a huge data. As data is distributed across different networks by the distributed systems so security becomes the most important issues in these systems. Data is distributed via public networks so the data and other resources can be attacked by …
- 238000000034 method 0 description 6
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Arogundade | Network security concepts, dangers, and defense best practical | |
Mubeen et al. | Strategies to Avoid Illegal Data Access | |
Khan et al. | NETWORK THREATS, ATTACKS AND SECURITY MEASURES: A REVIEW. | |
Singh et al. | Information security: Components and techniques | |
Chuka-Maduji et al. | Cloud computing security challenges and related defensive measures: A survey and taxonomy | |
Jenani | Network security, a challenge | |
Firmansyah | Cybersecurity Fundamentals | |
Veríssimo et al. | Fundamental security concepts | |
Shadmanov et al. | Summarization of various security aspects and attacks in distributed systems: A review | |
Rohilla et al. | Comparison of Cloud Computing Security Threats and Their Counter Measures | |
Shukla et al. | Cyber security techniques management | |
Obodoeze et al. | A holistic mobile security framework for Nigeria | |
SOX | This White Paper | |
Kılıç et al. | Security Issues of Remote Work Environments and Alternative Solution Approaches | |
Sharma et al. | Network Security: A Major Challenge in India | |
Pathak | The Review of Terms and Concepts used to Understand Cybercrime to Safeguard Ourselves from Cybercriminals. | |
Kolawole et al. | Practical Approaches to Securing an IT Environment | |
Soriano | Information and network security | |
Rani et al. | 3 Cyber Security Techniques | |
Bhosle et al. | Technical Review on Network Security | |
Suhag | Paradigmatic Approaches for Network Security and Preventing Intrusions: A Secure Computer Shield | |
Harrison et al. | A protocol layer survey of network security | |
Qureshi | Analysis of Network Security Through VAPT and Network Monitoring | |
Nair et al. | Cyber Attacks and its Prevention Techniques | |
Garg et al. | Security of Modern Networks and Its Challenges |