Physical security
-
This study was conducted. Moreover, it is shown that choosing the best Tx/Rx parameters is necessary to meet service quality requirements such as BER and transmission confidentiality. The provided findings provide insightful information about the practical considerations of deploying UWOC/ CDMA systems.
11p viengfa 28-10-2024 3 1 Download
-
In this study, we propose a NOMA communication model combined with linear array antennas for the purpose of enhancing physical layer security. We introduce a model of 4 nodes: transmitter node S, receiver node D1, receiver node D2, eavesdropping node E.
10p viling 11-10-2024 1 1 Download
-
Bài viết đề xuất mô hình chuyển tiếp hai chặng, sử dụng kỹ thuật chọn lựa nhiều nút chuyển tiếp đơn phần (Partial Relay Selection) để nâng cao hiệu năng bảo mật ở lớp vật lý (Physical Layer Security) cho mạng thứ cấp (secondary network) trong môi trường vô tuyến nhận thức dạng nền (Underlay Cogntive Radio). Các biểu thức dạng tường minh chính xác của xác suất dừng bảo mật trên kênh truyền fading Rayleigh đã được đưa ra. Mời các bạn cùng tham khảo!
6p wangziyi_1307 26-04-2022 19 4 Download
-
Bài viết nghiên cứu phương pháp bảo mật lớp vật lý (Physical-Layer Security) cho mạng vô tuyến nhận thức dạng nền (Underlay Cognitive Radio Network) sử dụng mã Fountain. Trong mô hình nghiên cứu, nguồn thứ cấp và nút chuyển tiếp thứ cấp hiệu chỉnh công suất phát để đảm bảo chất lượng dịch vụ của mạng sơ cấp không bị ảnh hưởng.
9p viaespa2711 31-07-2021 38 2 Download
-
The aim of the present study is to examine the influence of website quality on consumer’s e-loyalty, noting the mediating role of e-trust, e-satisfaction, and perceived enjoyment. Besides, this study examines the consequence of consumer’s e-loyalty.
20p tohitohi 22-05-2020 44 4 Download
-
Learning objectives of this chapter include: Secure the physical installation of and the administrative access to Cisco routers based on different network requirements using the CLI and CCP; configure administrative roles using privilege levels and role-based CLI; Implement the management and reporting features of syslog, SNMP, SSH, and NTP;...
175p youcanletgo_01 04-01-2016 51 6 Download
-
Bài giảng Bảo mật hệ thống thông tin: Chương 9 - An toàn vật lý (Physical security) giới thiệu về an toàn vật lý, các mối nguy hiểm vật lý, kiểm soát an toàn vật lý, quản lý con người. Bài giảng phục vụ cho các bạn chuyên ngành Công nghệ thông tin và những ngành có liên quan.
32p cocacola_17 11-12-2015 110 11 Download
-
Keeping poultry makes a substantial contribution to household food security throughout the developing world. It helps diversify incomes and provides quality food, energy, fertilizer and a renewable asset in over 80 percent of rural households. Small-scale producers are however constrained by poor access to markets, goods and services; they have weak institutions and lack skills, knowledge and appropriate technologies. The result is that both production and productivity remain well below potential and losses and wastage can be high.
60p conduongdinhmenh 07-05-2013 85 6 Download
-
The Data-over-Cable Service Interface Specification (DOCSIS)is an international standard developed by CableLabs, a non-profit research and development consortium for cable-related technologies. • DOCSIS specifies the OSI Layer 1 and Layer 2 requirements: Physical layer-For data signals that the cable operator can use, DOCSIS specifies the channel widths (bandwidths of each channel) as 200 kHz, 400 kHz, 800 kHz, 1.6 MHz, 3.2 MHz, and 6.4 MHz. DOCSIS also specifies modulation techniques (the way to use the RF signal to convey digital data).
47p mrdvad11 12-03-2013 136 54 Download
-
“Access control includes authentication, authorization and audit. It also includes measures such as physical devices, including biometric scans and metal locks, hidden paths, digital signatures, encryption, social barriers, and monitoring by humans and automated systems.” -- Wikipedia
32p muathu_102 28-01-2013 97 3 Download
-
Physical security measures aim to either prevent a direct assault on premises or reduce the potential damage and injuries that can be inflicted should an incident occur.
0p doilan 25-01-2013 60 5 Download
-
Attempt at communication using non-physical links. Examples Radio Waves Light Pulses Often used for networking, but can be used simply to eliminate wires for device to device communication.
29p doilan 25-01-2013 70 3 Download
-
Note: A LOT of this chapter is “missing” from the book. That is the book is only 12 pages..I have put over 70 slides in this chapter (one of the longest) These things you should expect to see on the exam. So pay extra attention to these slides!
82p doilan 25-01-2013 58 5 Download
-
Network Security Identify security risks in LANs and WANs and design security policies that minimize risks Explain how physical security contributes to network security Discuss hardware- and design-based security techniques Use network operating system techniques to provide basic security Understand methods of encryption, such as SSL and IPSec, that can secure data in storage and in transit Describe how popular authentication protocols, such as RADIUS, TACACS, Kerberos, PAP, CHAP, and MS-CHAP, function Understand wireless security protocols, such as WEP, WPA, and 802.11...
56p itvovantien 13-07-2012 82 11 Download
-
Tham khảo luận văn - đề án 'báo cáo hóa học: " research article physical layer built-in security analysis and enhancement algorithms for cdma systems"', luận văn - báo cáo phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
7p sting11 09-03-2012 47 5 Download
-
Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Physical Layer Built-In Security Analysis and Enhancement Algorithms for CDMA Systems
7p sting10 07-03-2012 46 2 Download
-
Summary SS7 was designed without integral security in mind. Its design is based on the use of dedicated physical facilities, making it difficult to compromise externally. In addition, at the time of design, fewer network operators existed
7p chabongthitga 25-09-2010 91 4 Download
-
Hundreds of Thousands of $$$ Worth of Network Equipment can be Rendered Junk in a Flash! The issue of protecting networks from security breaches has attracted considerable attention but organisations also need to guard against environmental risks such as lightning. Damaged or destroyed equipment, which is integrated into manufacturing or data storage processes, can cause physical damage, as well as high consequential losses due to downtime. Lightning strikes can also delay production due to data loss and damage process control computers or computer-based warehouse and storage systems.
2p qd-tek 28-04-2010 81 3 Download
-
This lab demonstrates gaining access to a router with an unknown privileged mode (enable) password. One point to be made here is that anyone with this procedure and access to a console port on a router can change the password and take control of the router. That is why it is of critical importance that routers also have physical security to prevent unauthorized access. Setup a network similar to the one in the previous diagram. Any router that meets the interface requirements may be used. Possible routers include 800, 1600, 1700, 2500, 2600 routers, or a combination.
5p thanhha 27-08-2009 100 4 Download
-
Hello, in this module we are going to discuss wireless networking. Specifically, we'll take a look at how wireless technology works, how it is commonly deployed, and the security issues associated with using it. Because wireless communications can penetrate opaque objects such as buildings, the risk of someone accessing a private network increases markedly. With wireless, an attacker does not need to gain access to physical cables or jacks, but only needs to have an antenna and be within range of the transmissions....
40p huyhoang 07-08-2009 211 74 Download