Skip to main content
Cloud Computing is a type of internet based computing which provides services via the internet and accesses the resources within the user enterprise either in a private-own-cloud or on a third-party server On Demand. The model is... more
    • by 
    •   7  
      Information SystemsComputer ScienceGrid ComputingData Protection
NoSQL databases outperform the traditional RDBMS due to their faster retrieval of large volumes of data, scalability, and high performance. The need for these databases has been increasing in recent years because data collection is... more
    • by 
    •   14  
      Graph DatabaseHadoopCassandraAmazon
The popularity of the Mobile Database is increasing day by day as people need information even on the move in the fast changing world. This database technology permits employees using mobile devices to connect to their corporate networks,... more
    • by 
    •   9  
      ArchitectureSynchronizationRecoverySecurity Issues
Ethics is a study of moral issues in the fields of individual and collective interaction. The term is also sometimes used more generally to describe issues in arts and sciences, religious beliefs and cultural priorities. The professional... more
    • by 
    •   4  
      EthicsNetwork SecurityIndian PoliticsSecurity Issues
    • by 
    •   38  
      Information SecurityDatabase SystemsPrivacyNetwork Security
Cloud computing is an architecture for providing computing service via the internet on demand and pay per use access to a pool of shared resources namely networks, storage, servers, services and applications, without physically acquiring... more
    • by 
    •   7  
      Information SystemsComputer ScienceGrid ComputingData Protection
Electronic commerce (e-commerce) is widely considered the buying and selling of products over the internet, but any transaction that is completed solely through electronic measures can be considered as e-commerce. E-commerce may have... more
    • by  and +1
    •   40  
      MarketingEngineeringComputer ScienceSoftware Engineering
Note Décembre 2014 Face à la dégradation de la situation sécuritaire dans l'espace Sahara-Sahel, consécutive à la crise libyenne, les espaces transfrontaliers ont fait l'objet d'une approche sécuritaire de la part d'acteurs régionaux et... more
    • by 
    •   3  
      Borders and FrontiersSecurity IssuesPolitics and Terrorism Maghreb and Sahel
The Internet of Things (IoT), an emerging research area and talk of the scientific world. Today, the Internet connectivity is widely available and the cost of connection is drastically decreasing. The number of devices connected to... more
    • by 
    •   3  
      ConfidentialitySecurity IssuesInternet of Things (IoT)
E-commerce is widely considered the buying and selling of products over the internet, but any transaction that is completed solely through electronic measures can be considered e-commerce. E-commerce is subdivided into three categories:... more
    • by 
    •   6  
      Information SystemsComputer ScienceM-CommerceSecurity Issues
The modern world is filled with a huge data. As data is distributed across different networks by the distributed systems so security becomes the most important issues in these systems. Data is distributed via public networks so the data... more
    • by  and +2
    •   3  
      Distributed SystemsIntegritySecurity Issues
An appealing feature of blockchain technology is smart contracts. A smart contract is executable code that runs on top of the blockchain to facilitate, execute and enforce an agreement between untrusted parties without the involvement of... more
    • by  and +1
    •   19  
      Image ProcessingData MiningDatabase SystemsSoft Computing
Security is an important issue in the actual educational context where e-learning increases in popularity and increasingly more people are taking online courses. The e-learning platforms are today production systems that need to be... more
    • by 
    •   2  
      SecuritySecurity Issues
Social media is playing a prominent part in people's lives now-a-days. Facebook, YouTube, Instagram, Google+ etc. have emerged as the popular social media websites. Since its inception in 2004, Facebook has emerged as the most popular... more
    • by 
    •   3  
      Social MediaStrategic AnalysisSecurity Issues
MANET has been around for more than two decades. Ad hoc network deployment, ability to cater emergent requirements on-the-spot and providing infrastructure less utility makes Ad hoc networks a play field for testing dynamics and... more
    • by 
    •   8  
      RoutingHistorical PerspectiveDetecting Malicious Nodes For Secure Routing In MANETS Using Reputation Based MechanismSecurity Issues
Without the need of an infrastructure, low-cost, auto-managed, flexible and low power consumer, wireless communication is becoming emerging technology. It shows great binder for present as well as future hi-tech applications. Increasing... more
    • by 
    •   7  
      Information SecurityComputer SecurityCryptographySecurity Issues
Abstract: In recent years wireless sensor networks has gained a lot of attention and is used in number of commercial and military applications including home automation, building structure monitoring, battlefield monitoring and... more
    • by 
    •   4  
      Wireless Sensor Networks (WSN)Security IssuesActive AttacksDenial of Service (dos) Attacks
In wireless sensor network (WSN) there are two main problems in employing conventional compression techniques. The compression performance depends on the organization of the routes for a larger extent. The efficiency of an in-network... more
    • by  and +1
    •   10  
      Wireless Sensor NetworksInteroperabilityMulti Agent Systems and TechnologiesWireless Sensor Networks (WSNs)
Internet of Things (IoT) can be found everywhere in our life. They find application at homes for control and reporting in emergency clinics and for adjustment reporting in various conditions, counteracting fires and in various other... more
    • by 
    •   4  
      Security IssuesInternet of Things (IoT)Transport LayerWireless Sensor Network (WSN)
Cloud computing is a technique to deliver software, storage and processing. It increases system's capability without changing the existing infrastructure, educating new people or taking license for the softwares. It improves the existing... more
    • by 
    •   8  
      Computer ScienceInformation SecurityComputer SecurityCloud Computing
The aim of this research is to identify the availability levels of fear, neutralization, and Information Systems Security (ISS) and determining the impacts of Fear, and Neutralization on ISS. The primary data of the study collected using... more
    • by  and +1
    •   2  
      Security IssuesE-Commerce
Cloud computing is a technique to deliver software, storage and processing. It increases system's capability without changing the existing infrastructure, educating new people or taking license for the softwares. It improves the existing... more
    • by 
    •   8  
      Computer ScienceInformation SecurityComputer SecurityCloud Computing
VoIP (Voice over Internet Protocol) is a growing technology during last decade. It provides the audio, video streaming facility on successful implementation in the network. However, it provides the text transport facility over the... more
    • by 
    •   9  
      Open SourceFirewallSecurity IssuesClients
Cloud computing is a technique to deliver software, storage and processing. It increases system's capability without changing the existing infrastructure, educating new people or taking license for the softwares. It improves the existing... more
    • by 
    •   8  
      Computer ScienceInformation SecurityComputer SecurityCloud Computing
Cloud computing is utility-based computing provides many benefits to its clients but security is one aspect which is delaying its adoptions. Security challenges include data security, network security and infrastructure security. Data... more
    • by 
    •   20  
      Social NetworksWireless CommunicationsNetwork SecurityAccess Control
Cloud computing is a model which uses the mixture concept of " software-as-a-service " and " utility co mputing " , and provides various on-demand services in a convenient way requested end users. It is internet based where resources are... more
    • by 
    •   5  
      Information SystemsComputer ScienceCloud ComputingSecurity Issues
"Integracja europejska. Wprowadzenie, praca zbiorowa pod redakcją Macieja Perkowskiego - to nowoczesny podręcznik akademicki, adresowany do studentów i słuchaczy studiów podyplomowych kierunków: prawo, administracja, ekonomia,... more
    • by 
    •   7  
      LawEconomicsPolitical ScienceAdministracion
Présentation séminaire Promédiation Centre 4S - Septembre 2015
    • by 
    •   2  
      Security IssuesRegional Cooperation and Integration In West Africa
Mobile Ad-Hoc Networks (MANET) is top area of research. MANET is self-configured, self- administered and self-organized network. In MANET, nodes are not bodily connected to each other, but the communication can takes place if nodes are in... more
    • by 
    •   9  
      Information SecurityComputer NetworksMetricsBlackhole Attack
— Without the need of an infrastructure, low-cost, auto-managed, flexible and low power consumer, wireless communication is becoming emerging technology. It shows great binder for present as well as future hi-tech applications. Increasing... more
    • by 
    •   6  
      Mobile Ad Hoc NetworksWsnSecurity IssuesDenial of Service
    • by 
    •   95  
      Cultural StudiesSocial ChangePhysicsChemistry
The Internet of Things (IoT), an emerging research area and talk of the scientific world. Today, the Internet connectivity is widely available and the cost of connection is drastically decreasing. The number of devices connected to... more
    • by 
    •   3  
      ConfidentialitySecurity IssuesInternet of Things (IoT)
 mgr Katarzyna Skiert-Andrzejuk, Im bliżej Azji, tym bliżej wyzwań dla bezpieczeństwa [recenzja książki Bliżej Azji. Współczesne wyzwania dla bezpieczeństwa]
    • by 
    •   8  
      International RelationsAfghanistanChinaNepal
Without the need of an infrastructure, low-cost, auto-managed, flexible and low power consumer, wireless communication is becoming emerging technology. It shows great binder for present as well as future hi-tech applications. Increasing... more
    • by 
    •   8  
      Information SecurityMobile Ad Hoc NetworksWireless CommunicationsComputer Security
    • by 
    •   7  
      Information SystemsComputer ScienceGrid ComputingData Protection
The Computer Network technology is developing rapidly and the recent advances have introduced a new technology for wireless communication over the internet in future in MANET. It becomes the popular research topic in recent years.... more
    • by 
    •   16  
      Computer ScienceInformation TechnologyTechnologyComputer Engineering
ARTICLE INFO ABSTRACT Advancements instructions and other services. However, as more organizations continue to embrace technology in their online operations, the risk of information security attacks cannot education institutions have a... more
    • by 
    •   6  
      CryptographyEncryptionSurveyData Breaches
Wireless sensor networks determine probable in military, environments, health and commercial applications. The process of transferring of information from a remote sensor node to other nodes in a network holds importance for such... more
    • by 
    •   23  
      Data MiningDatabase SystemsData AnalysisSecurity Studies
Mobile Ad hoc Networks (MANETs) are wireless networks consisted of mobile free nodes that can move anywhere at any time without the need to any fixed infrastructure or any centralized administration. In this category of networks existing... more
    • by 
    •   14  
      Mobile Ad Hoc NetworksQoS parameters (Mobile Ad Hoc Networks)Mobility Modeling (Mobile Ad Hoc Networks)Mobile Ad-hoc Networks (MANETs)
In this paper a meticulous analysis of applicable literature on “Security in Grid Computing” is turned out. The intension of this survey is to bring out the recently available security models and authorization mechanisms in Grid... more
    • by 
    • Security Issues
Security is an important issue in the actual educational context where e-learning increases in popularity and increasingly more people are taking online courses. The e-learning platforms are today production systems that need to be... more
    • by 
    •   2  
      SecuritySecurity Issues
Książka jest ósmym tomem wydanym w ramach w serii edytorskiej „Władza – Elity – Przywództwo”. Prezentuje wyniki kolejnego etapu badań prowadzonych przez międzynarodowy zespół badawczy projektu naukowego Elity polityczne Kaukazu... more
    • by 
    •   4  
      Political RegimesNorth CaucasusSecurity IssuesEtnopolitics
Over the last years many solutions have been proposed for facial expression analyses for emotion assessment, some of which claim high recognition accuracy in real time, even on natural expressions. However, in most (if not all) cases,... more
    • by 
    •   2  
      Computer ScienceSecurity Issues