A Survey of Network and Information Security
Abstract
Security threats and shows abnormality about security, safety, privacy and trust as network security-related data, in short, security-related data. Apparently, the first step to detect network attacks and intrusions is to collect the security-related data. In this paper, we will present a lot of approaches to solving Networks and Information Security issues. We survey network security in LTE technologies, Vehicular Ad-Hoc Network, and security in Wireless Sensor Network. Internet of Things. In this paper, we describe many methods in Information Security. Is consist of Information Security in Big Data and Cloud Computing.
Downloads
IJICOM is an open-access journal. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.