مشخصات مقاله | |
انتشار | مقاله سال 2017 |
تعداد صفحات مقاله انگلیسی | 2 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
منتشر شده در | نشریه اسپرینگر |
نوع مقاله | ISI |
عنوان انگلیسی مقاله | Hacking and convergence computing |
ترجمه عنوان مقاله | هک کردن و محاسبات همگرا |
فرمت مقاله انگلیسی | |
رشته های مرتبط | مهندسی کامپیوتر، فناوری اطلاعات، فناوری اطلاعات و ارتباطات |
گرایش های مرتبط | امنیت اطلاعات، رایانش امن، دیتا و امنیت شبکه |
مجله | مجله ویروس شناسی کامپیوتر و تکنیک های هک – Journal of Computer Virology and Hacking Techniques |
دانشگاه | Strategy Department – Korea Convergence Society – Republic of Korea |
کد محصول | E7708 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
بخشی از متن مقاله: |
Recently, in terms of the use of Internet of Things (IoT) devices in the smart platform for security management, companies have been releasing diverse products, and such products are being proved as effective in the continuous management of computer virology. In addition, in the field of security services, companies and research institutes have been continuously developing solutions using hacking and convergence computing [10–12]. This issue covers some of the hottest topics in hacking and convergence computing, including: hacking in convergence computing; electronics hacking, hardware hacking; communication protocol hacking; information indexing, searching, and visualization; secure and anti-hacking; network connection solution; secure virtual network embedding algorithms; secure information authentication protocol; security framework; secure IoT and protocol; privacy and authentication for network; security in convergence computing; cybersecurity; innovative applications of hacking, security computing.
The paper by Hong [1] presents a secure and light IoT protocol (SLIP) for antihacking. The proposed method introduces a number of typical applications such as the smart home, intelligent transportation, a security-issue analysis, and related convergence technologies for the realization of a secure IoT. Further, a comparison of the security issues between the IoT and the traditional network was performed, and it was concluded that the environment of the IoT-convergence system is a dangerous one with limited resources and fewer network guards. The paper by Li et al. [2] analyzes a study on the service and the trend of fintech security that is based on text mining. This study presents the tasks and directions of the fintech industry in consideration of the successful operation of fintech security through an analysis of the news articles from an online-data collection. The results contributed to a switching of the market awareness of fintech services and security in the present-day ongoing expansion of the fintech market. |