A Prototypical Solution for Cyber Space
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 10
Abstract
Many things have been written and told about cyber security and its importance around the world during these recent years. To establish Secure Cyber Space an effective communication network is needed. The cognitive networks are effective networks for communication. These networks are also changeable. This network is constructed of network terminals, and wired and wireless connections among them. This network is capable of being aware of the network’s intrinsic and external situation. CN has feature to operate standalone, frame decisions and set itself according to the mentioned goal. A key ability is learning which means that the network can use last made decisions during a CN process. The research focuses on architectural security aspects of network. The main objective of the research is to see how the features of CN could be used for building and framing a cyber security model. The cyber security detailed makeup describes all the security functionalities and controls that are required when implementing the high-secure network. Cognitive tone will create more knowledge on networks. Increasing cyber security threat seeks that security requirements are already taken care of the beginning of framing the network process. Hence, it is obvious and compulsory to build a proposed model that could be used at an initial point when latest networks are thought about and brought into implementation.
Authors and Affiliations
Ms. Neha. D. Mistri , Dr. Nilesh. K. Modi
Review on Coverage and Connectivity in Underwater Wireless Sensor Networks
One of the current trends of the wireless communication is the underwater communication .The two most fundamental problems in underwater sensor network are sensing coverage and network connectivity. The coverage problem...
Feature - based Automated Aerial Image to Satellite Image Registration
Image processing is required in number of fields like clinical diagnosis, remote sensing and computer vision. The need for overlaying of images exists in image processing. Image registration is the basis step in various...
Importance & Applications of Digital Image Processing
Digital image processing has become economical in many fields like signature recognition, iris recognition and face recognition, in forensics, in automobile detection and in military applications. Each of these applicati...
SURVEY OF ACCIDENT SEVERITY ESTIMATION USING DATA MINING TECHNIQUES
As technology has been improved by many changes and inventions are made almost every day. Traumatic events come in many different ways at many different times of one’s life. Recent trends on the advantage of communicatio...
SECURITY ALGORITHM IN CLOUD COMPUTING: OVERVIEW
Network security is becoming more and more important as people spend more and more time connected. It is a specialized field in computer networking that involves securing a computer network infrastructure. It is typicall...