Network Security: Detailed Analysis
With the growth of the internet and the communication network the susceptibility of the attack by intruders increasing day by day. This paper reviews the concept of the network security and also explains in briefs the network attacks and security concepts for counter measuring of these attacks.
Keywords: Network Security, Security Attacks, Cryptography, Encryption
Cite this Article
Monica Pancholi, Mohit Singhal. Network Security: Detailed Analysis. Journal of Software Engineering Tools & Technology Trends. 2018; 5(3): 10–13p.
Gunjan Gupta, Rama Chawla, Review on Encryption Ciphers of Cryptography in Network Security, Int J Adv Res Comput Sci Softw Eng. 2012.
Shilpa Pareek, Ashutosh Gautam, Ratul Dey, Different Type Network Security Threats and Solutions, A Review, IPASJ Int J Comput Sci (IIJCS). 2017.
Shyam Nandan Kumar, Review on Network Security and Cryptography, Int T Electr Comp Eng Syst. 2015.
Abdel-Karim R. Al Tamimi, Security in Wireless Data Networks: A Survey Paper, 2016; 1-30p.
Asif MK, Khan TA, Taj TA, Naeem U, Yakoob S. Network Intrusion Detection and its strategic importance Network Intrusion Detection and its Strategic Importance, IEEE Business Engineering and Industrial Applications Colloquium (BEIAC), Langkawi, Malaysia, 2013, 140–144p.
Roozbahani FS, Azad R. Security Solutions against Computer Networks Threats, Int J Adv Netw Appl. 2015; 7(1): 2576–2581p.
Kaushik AS, Singhal A. Network Security Using Cryptographic Techniques, Int J Adv Res Comput Sci Softw Eng. 2012; 2(12): 2277–128p.
Singh A. Vaish, Keserwani PK. Information Security: Components and Techniques, Int J Adv Res Comput Sci Softw Eng. 2014; 4(1): 2277–128p.
Tayal S, Gupta N, Gupta P, Goyal D, Goyal M. A Review paper on Network Security and Cryptography, 2017; 10(5): 763–770p.
Joshi MR, Avinash Karkade R. Network Security with Cryptography, Int J Comput Sci Mob Comput. 2015; 41(1): 201–204p.
Golchha P, Deshmukh R, Lunia P. www.ijser.in A Review on Network Security Threats and Solutions, Int J Sci Eng Res. 2014; 3(4): 3–5p.
- There are currently no refbacks.
This site has been shifted to https://stmcomputers.stmjournals.com/