Limitations of Network Security for Enabling Application Access

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

Authors and Affiliations

Rajesh Kumar

Keywords

Related Articles

A Survey of Clustering Scheme for Manets

Abstract: Mobile adhoc network is a network in which nodes are dynamic in nature and has limited bandwidth and battery power. They are used in different situations such as military services, medical or embedded applicati...

 Web Penetration Testing using Nessus and Metasploit Tool

 Abstract: Web Penetration Testing is a tool that is being used widely to see how the website reacts when an vulnerability attack is done. Now days many ethical hackers use web penetration tool to predict the vulner...

 Simulation of Denial of Service (DoS) Attack using Matlab and Xilinx

 Abstract: As the Internet is growing – so is the vulnerability of the network. Companies now days are spending huge amount of money to protect their sensitive data from different attacks that they face. DoS or Deni...

 The Application of Model Predictive Control (MPC) to Fast Systems such as Autonomous Ground Vehicles (AGV)

 Abstract: This paper investigates the application of Model Predictive Control (MPC) to fast systems such as Autonomous Ground Vehicles (AGV) or mobile robots. The control of Autonomous ground vehicles (AGV) is chal...

 Image Enhancement Techniques: A Selected Review

 Image enhancement is one of the key issues in high quality pictures such as digital cameras. Since image clarity is very easily affected by lighting, weather, or equipment that has been used to capture the image....

Download PDF file
  • EP ID EP126808
  • DOI -
  • Views 103
  • Downloads 0

How To Cite

Rajesh Kumar (2014).  Limitations of Network Security for Enabling Application Access. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 43-46. https://europub.co.uk/articles/-A-126808