Search
Now showing items 1-3 of 3
A Collaboration Incentive Exploiting the Primary-Secondary Systems' Cross Interference for PHY Security Enhancement
(
IEEE
, 2016 , Article)
We investigate the spectrum sharing possibility as an incentive to enhance the physical layer security. The concept behind is that a legitimate source-destination pair, communicating in the presence of a passive eavesdropper, ...
Changing Dynamics of network security involving hacking/cracking with next generation firewalls (NGFW)
(
IGI Global
, 2016 , Book chapter)
With increasing number of users on the internet, risk of security and probability of vulnerable attacks are increasing day by day. For every user connected to network, security attacks like hacking and cracking are very ...
A cost-aware model for risk mitigation in Cloud computing systems
(
IEEE Computer Society
, 2016 , Conference Paper)
Security is an important element in Cloud computing. Intruders may exploit clouds for their advantage. This paper presents a cost-aware model for risk mitigation in cloud computing systems. The proposed model is integrated ...