Boyanov, Petar
July 2014
Journal Scientific & Applied Research;2014, Vol. 6, p141
Academic Journal
In this paper a performance and connection analysis of determined computer systems and networks is made. Each communication process and state must be daily scanned and analyzed by system administrators, security-professionals and IT specialists. Ensuring a secure flow of computer and network processes and performance is very important priority for many large and small companies and for normal users. Most of the malicious user and programmers use vulnerability in the selected network via determined computer and network processes.


Related Articles

  • System for Detection of Network Threats based on Classifiers. Demir, Bilgiti; Gacovski, Zoran; Pivovarov, Vladimir; Goracinova, Lidija // TEM Journal;May2014, Vol. 3 Issue 2, p120 

    In this paper we present a system that automatically detects and profiles threats on a real network. The realised Threat Detection System (TDS) is based on Snort software and it allows the security experts to evaluate the risk of vulnerability and to retrieve the actual number of threats that...

  • Rise of the code schools. Bayon, David // PC Pro;Dec2012, Issue 218, p36 

    The author looks at the increasing popularity of online coding (OC) schools in Great Britain. He explains the factors that are driving the growth of OC. He discusses the different approaches used by OC schools to teaching a skill that is important in the information technology age. He also looks...

  • HOW IT PROS EMPLOY THE LATEST SECURITY MONITORING TECH. Zurier, Steve // Information Security;Jul2015, Issue 6, p8 

    The article discusses how information technology professionals implement security monitoring technologies. Topics covered include the focus of cyberattacks on network devices and vulnerable computer networks. Also mentioned is the uneasiness of security managers and information technology...

  • Save Time with Word's Styles. McElhearn, Kirk // Macworld;Oct2006, Vol. 23 Issue 10, p74 

    The article focuses on the styling of words in the Microsoft Word. The Basics Word comes with styles for everything from hyperlinks to headers. One can apply a style by using the Formatting Palette or Formatting toolbar. To use the toolbar, one should select the text and then select a style from...

  • An Identity Based Aggregate Signature from Pairings. Yike Yu; Xuefeng Zheng; Hua Sun // Journal of Networks;Apr2011, Vol. 6 Issue 4, p631 

    An aggregate signature is a useful digital signature that supports aggregation: Given n signatures on n distinct messages from n distinct users, aggregate signature scheme is possible to aggregate all these signature into a single short signature. This single signature, along with the n original...

  • IMPROVED SECURE ADDRESS RESOLUTION PROTOCOL. Samvedi, Abhishek; Owlak, Sparsh; Chaurasia, Vijay Kumar // International Journal of Computer Science & Information Technolo;2014, Vol. 6 Issue 4, p201 

    In this paper, an improved secure address resolution protocol is presented where ARP spoofing attack is prevented. The proposed methodology is a centralised methodology for preventing ARP spoofing attack. In the proposed model there is a central server on a network or subnet which prevents ARP...

  • A Process to Improve the Throughput and Reduce the Delay and Packet Loss in Ad-Hoc Wireless Network. Rani, Kirna; Magnat, Kamaljeet Kaur // International Journal of Computer Applications;Aug2014, Vol. 99, p32 

    A network is a collection of two or more computer systems which connected with each other. It is type of replace of information to communicate with one another. It is an association or set up of computer devices which are involved with the communication facilities. When number of computer is...

  • Implementing Truthful Routing Path Generation in WSN through TARF. Dohe, Premakshi B.; Shukla, Rajesh K. // International Journal of Computer Applications;Aug2014, Vol. 99, p51 

    Wireless device networks are susceptible to a good set of security attacks, together with those targeting the routing protocol practicality. The multi-hop routing in wireless device networks (WSNs) offers very little protection against identity deception through replaying routing data. Associate...

  • Cyber-Attackers to Focus on Internet of Things in 2014: IT Experts. Lemos, Robert // eWeek;12/31/2013, p3 

    The article focuses on the continued vulnerability of embedded devices and consumer devices from cyber-attackers in 2014. According to several information technology (IT) security experts, the trend will only accelerate in the coming year due to the rapid adoption of network-connected devices by...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics