Scanning for Vulnerabilities in the Security Mechanisms of the Hosts in the Academic Institutions and Government Agencies
Journal Title: Mathematical and Software Engineering - Year 2018, Vol 4, Issue 1
Abstract
In this paper a sophisticated investigation and scanning for vulnerabilities in the security mechanisms of the hosts in the academic institutions and government agencies is made. The port and network scanner are specialized software tools that can discover detail information about the selected target hosts such as open, filtered, closed ports and the whole computer network topology.
Authors and Affiliations
Hristo Hristov
Determination of Single Knife Edge Equivalent Parameters for Double Knife Edge Diffraction Loss by Deygout Method
In this paper, the computation of dual knife edge diffraction loss by Deygout multiple knife edge diffraction loss method is presented for a 6 GHz C-band microwave link. Also, the computation of equivalent single kni...
Analysis of Environmental and Economic Prospects of Stand-By Solar Powered Systems in Nigeria
Photovoltaic power systems can be used as electrical power source for home to meet its daily energy requirement through direct conversion of solar irradiance into electricity. This paper presents environmental and econom...
Empirical Models for Estimation of Rain Rate in the Fifteen ITU Rain Zones
Rain rate data are essential for the computation of rain attenuation that can be experienced by wireless signal passing through a given area. The International Telecommunication Union (ITU) divided the world into fifteen...
Preliminary Context Analysis of Social Network Web Application for Combating HIV/AIDS Stigmatization
In this paper, context model and preliminary context analysis are presented for a niche Social Network Web Application (SNWA) for combating HIV/AIDS related stigmatization. The contexts model show the stakeholders and ho...
A note on reducing the computation time for minimum distance and equivalence check of binary linear codes
In this paper we show the usability of the Gray code with constant weight words for computing linear combinations of codewords. This can lead to a big improvement of the computation time for finding the minimum distance...