International Journal of Computer Science and Network Security最新文献

筛选
英文 中文
Problems of Distance Learning in Specialists Training in Modern Terms of The Informative Society During COVID-19 新型冠状病毒病疫情背景下现代信息社会专家远程培训存在的问题
International Journal of Computer Science and Network Security Pub Date : 2021-01-01 DOI: 10.22937/ijcsns.2021.21.12.21
O. Kuchai, S. Yakovenko, T. Zorochkina, T. Okolnycha, I. Demchenko, T. Kuchai
{"title":"Problems of Distance Learning in Specialists Training in Modern Terms of The Informative Society During COVID-19","authors":"O. Kuchai, S. Yakovenko, T. Zorochkina, T. Okolnycha, I. Demchenko, T. Kuchai","doi":"10.22937/ijcsns.2021.21.12.21","DOIUrl":"https://doi.org/10.22937/ijcsns.2021.21.12.21","url":null,"abstract":"The article considers the training of specialists in education in the conditions of distance learning. It is lights up the advantages of distance learning and determined the characteristic features of distance learning of students training in the implementation of these technologies in the educational process. The article focuses on the main aspects of computerization of studies as a technological breach in methodology, organization and practical realization of educational process and informative culture of a teacher. Information technologies are intensive involved in life of humanity, educational process of schools and higher educational establishments. Intercommunication is examined between the processes of informatization of the society and education.","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68345628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
High-Speed Area-Efficient Implementation of AES Algorithm on Reconfigurable Platform AES算法在可重构平台上的高速高效实现
International Journal of Computer Science and Network Security Pub Date : 2020-06-10 DOI: 10.5772/intechopen.82434
A. O. Mulani, P. B. Mane
{"title":"High-Speed Area-Efficient Implementation of AES Algorithm on Reconfigurable Platform","authors":"A. O. Mulani, P. B. Mane","doi":"10.5772/intechopen.82434","DOIUrl":"https://doi.org/10.5772/intechopen.82434","url":null,"abstract":"","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"77 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85733521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Communication Using Cryptography and Covert Channel 使用密码学和隐蔽信道的安全通信
International Journal of Computer Science and Network Security Pub Date : 2020-06-10 DOI: 10.5772/intechopen.82580
T. Fatayer
{"title":"Secure Communication Using Cryptography and Covert Channel","authors":"T. Fatayer","doi":"10.5772/intechopen.82580","DOIUrl":"https://doi.org/10.5772/intechopen.82580","url":null,"abstract":"The keys which are generated by cryptography algorithms have still been compromised by attackers. So, they extra efforts to enhance security, time consumption and communication overheads. Encryption can achieve confidentiality but cannot achieve integrity. Authentication is needed beside encryption technique to achieve integrity. The client can send data indirectly to the server through a covert channel. The covert channel needs pre-shared information between parties before using the channel. The main challenges of covert channel are security of pre-agreement information and detectability. In this chapter, merging between encryption, authentication, and covert channel leads to a new covert channel satisfying integrity and confidentiality of sending data. This channel is used for secure communication that enables parties to agree on keys that are used for future communication.","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84593983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Putting in Place an Intrusion Prevention System (IPS) 安装入侵防御系统
International Journal of Computer Science and Network Security Pub Date : 2020-02-28 DOI: 10.1002/9781119706762.ch6
{"title":"Putting in Place an Intrusion Prevention System (IPS)","authors":"","doi":"10.1002/9781119706762.ch6","DOIUrl":"https://doi.org/10.1002/9781119706762.ch6","url":null,"abstract":"","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"334 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90103714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supervising a Computer Network 管理计算机网络
International Journal of Computer Science and Network Security Pub Date : 2020-02-28 DOI: 10.1002/9781119706762.ch3
{"title":"Supervising a Computer Network","authors":"","doi":"10.1002/9781119706762.ch3","DOIUrl":"https://doi.org/10.1002/9781119706762.ch3","url":null,"abstract":"","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86343154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing a Local Network 保护本地网络
International Journal of Computer Science and Network Security Pub Date : 2020-02-28 DOI: 10.1002/9781119706762.ch7
{"title":"Securing a Local Network","authors":"","doi":"10.1002/9781119706762.ch7","DOIUrl":"https://doi.org/10.1002/9781119706762.ch7","url":null,"abstract":"","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90304067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Studying Advanced Firewalls 学习高级防火墙
International Journal of Computer Science and Network Security Pub Date : 2020-02-28 DOI: 10.1002/9781119706762.ch10
{"title":"Studying Advanced Firewalls","authors":"","doi":"10.1002/9781119706762.ch10","DOIUrl":"https://doi.org/10.1002/9781119706762.ch10","url":null,"abstract":"","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"85 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81569585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Firewalls 使用防火墙
International Journal of Computer Science and Network Security Pub Date : 2020-02-28 DOI: 10.1002/9781119706762.ch5
{"title":"Using Firewalls","authors":"","doi":"10.1002/9781119706762.ch5","DOIUrl":"https://doi.org/10.1002/9781119706762.ch5","url":null,"abstract":"","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"20 7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77631308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fundamentals of Network Security 网络安全基础
International Journal of Computer Science and Network Security Pub Date : 2020-02-28 DOI: 10.1002/9781119706762.ch1
{"title":"Fundamentals of Network Security","authors":"","doi":"10.1002/9781119706762.ch1","DOIUrl":"https://doi.org/10.1002/9781119706762.ch1","url":null,"abstract":"","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78919202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IPsec VPNs
International Journal of Computer Science and Network Security Pub Date : 2020-02-28 DOI: 10.1002/9781119706762.ch9
{"title":"IPsec VPNs","authors":"","doi":"10.1002/9781119706762.ch9","DOIUrl":"https://doi.org/10.1002/9781119706762.ch9","url":null,"abstract":"","PeriodicalId":47430,"journal":{"name":"International Journal of Computer Science and Network Security","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80278422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信