منوی کاربری
  • پشتیبانی: ۴۲۲۷۳۷۸۱ - ۰۴۱
  • سبد خرید

دانلود رایگان مقاله انگلیسی هک کردن و محاسبات همگرا - اشپرینگر 2017

عنوان فارسی
هک کردن و محاسبات همگرا
عنوان انگلیسی
Hacking and convergence computing
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
2
سال انتشار
2017
نشریه
اشپرینگر - Springer
فرمت مقاله انگلیسی
PDF
کد محصول
E7708
رشته های مرتبط با این مقاله
مهندسی کامپیوتر، فناوری اطلاعات، فناوری اطلاعات و ارتباطات
گرایش های مرتبط با این مقاله
امنیت اطلاعات، رایانش امن، دیتا و امنیت شبکه
مجله
مجله ویروس شناسی کامپیوتر و تکنیک های هک - Journal of Computer Virology and Hacking Techniques
دانشگاه
Strategy Department - Korea Convergence Society - Cheonan-si - Chungcheongnam-do - Republic of Korea
۰.۰ (بدون امتیاز)
امتیاز دهید
بخشی از متن مقاله

Recently, in terms of the use of Internet of Things (IoT) devices in the smart platform for security management, companies have been releasing diverse products, and such products are being proved as effective in the continuous management of computer virology. In addition, in the field of security services, companies and research institutes have been continuously developing solutions using hacking and convergence computing [10–12]. This issue covers some of the hottest topics in hacking and convergence computing, including: hacking in convergence computing; electronics hacking, hardware hacking; communication protocol hacking; information indexing, searching, and visualization; secure and anti-hacking; network connection solution; secure virtual network embedding algorithms; secure information authentication protocol; security framework; secure IoT and protocol; privacy and authentication for network; security in convergence computing; cybersecurity; innovative applications of hacking, security computing.


The paper by Hong [1] presents a secure and light IoT protocol (SLIP) for antihacking. The proposed method introduces a number of typical applications such as the smart home, intelligent transportation, a security-issue analysis, and related convergence technologies for the realization of a secure IoT. Further, a comparison of the security issues between the IoT and the traditional network was performed, and it was concluded that the environment of the IoT-convergence system is a dangerous one with limited resources and fewer network guards. The paper by Li et al. [2] analyzes a study on the service and the trend of fintech security that is based on text mining. This study presents the tasks and directions of the fintech industry in consideration of the successful operation of fintech security through an analysis of the news articles from an online-data collection. The results contributed to a switching of the market awareness of fintech services and security in the present-day ongoing expansion of the fintech market.


بدون دیدگاه