A Prototypical Solution for Cyber Space
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 10
Abstract
Many things have been written and told about cyber security and its importance around the world during these recent years. To establish Secure Cyber Space an effective communication network is needed. The cognitive networks are effective networks for communication. These networks are also changeable. This network is constructed of network terminals, and wired and wireless connections among them. This network is capable of being aware of the network’s intrinsic and external situation. CN has feature to operate standalone, frame decisions and set itself according to the mentioned goal. A key ability is learning which means that the network can use last made decisions during a CN process. The research focuses on architectural security aspects of network. The main objective of the research is to see how the features of CN could be used for building and framing a cyber security model. The cyber security detailed makeup describes all the security functionalities and controls that are required when implementing the high-secure network. Cognitive tone will create more knowledge on networks. Increasing cyber security threat seeks that security requirements are already taken care of the beginning of framing the network process. Hence, it is obvious and compulsory to build a proposed model that could be used at an initial point when latest networks are thought about and brought into implementation.
Authors and Affiliations
Ms. Neha. D. Mistri , Dr. Nilesh. K. Modi
PERIODICITY DETECTION ALGORITHMS IN TIME SERIES DATABASES-A SURVEY
Periodicity mining is used for predicting different applications such as prediction,forcasting etc.It has several application in Timeseries databases.Several algorithms are present for detecting the periodicity.But most...
A Novel Authentication Protocol Based on Elliptic Curves
Authentication is the process of determining whether someone or something is, in fact, who or that it is declared to be. It is a client-server based protocol by which a server identifies the identity of a remote client w...
Elliptic Curve Public-Key Cryptosystem Over Z(i)
A method to implement elliptic curve public-key cryptosystem over Z(i) is discussed. The method is in fact the same as the technique that works on Galois fields but here works on Z(i). The curve under Z(i) generates more...
Association Rules and Mining Frequent Itemsets using Algorithms
Association rules are the main technique for data mining. Association rule mining is to find association relationships among large data sets. Mining frequent patterns is an important aspect in association rule mining. In...
Real Time Detection Of Network Attacks Using Signature Based Approach
Network attack detection is an essential technology in business as well as dynamic research area. It is essential for security of the information. Attacks on network can cause legitimate users being strived or denied ser...