![]() Vulnerability analysis of Extensible Authentication Protocol (EAP) DoS Attack over wireless networks is presented by Malekzadeh et. ![]() There new algorithm strengthens the overall security of the transmitted data over the wireless links. They provided a data security dynamic design algorithm that has the ability to automatically change the configuration of both encoder and decoder based on a few bits of initial input data to the encoder. Kiong in their article presented a method to enhance the security of the transmitted data over the Wireless Local Area Network. This special issue is provided to explore the complexity of this problem and to present possible number of solutions. Cyber security is the science that concerns on protecting these big data from disruption or misused. The growing dimension and complexity of spatiotemporal data generated on daily basis and from variety of sources and its distribution over all types of networks makes it a challenge to protect it from theft or damage. Therefore, we need a focused research on developing efficient techniques, technologies and tools to deal with this stimulating problem. Cyber threat became one of the most serious problem for both economics and national security in the 21st century.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |