A Prototypical Solution for Cyber Space
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 10
Abstract
Many things have been written and told about cyber security and its importance around the world during these recent years. To establish Secure Cyber Space an effective communication network is needed. The cognitive networks are effective networks for communication. These networks are also changeable. This network is constructed of network terminals, and wired and wireless connections among them. This network is capable of being aware of the network’s intrinsic and external situation. CN has feature to operate standalone, frame decisions and set itself according to the mentioned goal. A key ability is learning which means that the network can use last made decisions during a CN process. The research focuses on architectural security aspects of network. The main objective of the research is to see how the features of CN could be used for building and framing a cyber security model. The cyber security detailed makeup describes all the security functionalities and controls that are required when implementing the high-secure network. Cognitive tone will create more knowledge on networks. Increasing cyber security threat seeks that security requirements are already taken care of the beginning of framing the network process. Hence, it is obvious and compulsory to build a proposed model that could be used at an initial point when latest networks are thought about and brought into implementation.
Authors and Affiliations
Ms. Neha. D. Mistri , Dr. Nilesh. K. Modi
A STUDY ON PROTOCOLS IN WIRELESS MESH NETWORK
Wireless Mesh Networks (WMN) are the networks in which each node can communicate directly with more than one peer nodes. Wireless mesh networks can self form and self heal. In this paper we discuss about the some protoco...
A Comprehensive Review on the Relevance Feedback in Visual Information Retrieval
Visual information retrieval in images and video has been developing rapidly in our daily life and is an important research field in content-based information indexing and retrieval, automatic annotation and structuring...
Secure Data Sharing using Decoy Technology
Cloud computing is a virtualized compute power and storage delivered via platform-agnostic infrastructures of abstracted hardware and software accessed over the Internet. Data sharing is an important functionality in clo...
Web Page Change Detection Using Data Mining Techniques and Algorithms
This paper describes web page detection for structural change detection which have to provide direct access to information on the web page. A new technique has been provided for detecting changes in Web page. The techniq...
IP Network Recovery Based on Security Managements
Computer networks are complex systems, often routing hundreds, thousands, or even millions of data packets every second. Therefore, in order for networks to handle large amounts of data, it is important that the data rou...