Zobrazeno 1 - 10
of 202
pro vyhledávání: '"Lawful interception"'
REMOTE SURVEILLANCE: A MEANS OF INTELLIGENCE GATHERING FOR MINIMIZING SECURITY CHALLENGES IN NIGERIA
Publikováno v:
Journal of Engineering Science (Chişinău), Vol XXIX, Iss 4, Pp 59-71 (2022)
Nowadays, national security issues are increasing day by day in most countries. A multitude of measures to reduce the challenges have been presented and even implemented by many authors, but without exhaustive results. The use of computers and sophis
Externí odkaz:
https://doaj.org/article/1ab6437059c7493390ca5858b730538a
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Filipo Sharevski
Publikováno v:
EURASIP Journal on Information Security, Vol 2018, Iss 1, Pp 1-16 (2018)
Abstract The fifth generation (5G) of cellular networks will bring 10 Gb/s user speeds, 1000-fold increase in system capacity, and 100 times higher connection density. In response to these requirements, the 5G networks will incorporate technologies l
Externí odkaz:
https://doaj.org/article/8daf74c8a39440818efd1c09bcf1431f
Publikováno v:
IEEE Access, Vol 6, Pp 55053-55073 (2018)
There has been an ongoing and heated public policy debate on the appropriate role of and limitations to government hacking in maintaining a proper balance of national security and privacy. Asserting that they are compelled to use government hacking t
Externí odkaz:
https://doaj.org/article/5368b910401a437cbbce75b7a7e4ab2b
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Sensors, Vol 21, Iss 2, p 428 (2021)
For the law enforcement agencies, lawful interception is still one of the main means to intercept a suspect or address most illegal actions. Due to its centralized management, however, it is easy to implement in traditional networks, but the cost is
Externí odkaz:
https://doaj.org/article/1d1b07c50c1f405d925b4950e835df54
Autor:
S. Кokiza, V. Stepanov
Publikováno v:
INFORMATION AND LAW. :115-120
The article is devoted to the analysis of regulatory and legal acts and normative documents of the EU on information interception in electronic communication networks in the context of preparation of technical regulations of the united system of tech
Publikováno v:
IEEE Transactions on Network and Service Management. 18:3647-3661
IP Networks serve a variety of connected network entities (NEs) such as personal computers, servers, mobile devices, virtual machines, hosted containers, etc. The growth in the number of NEs and technical considerations has led to a reality where a s
Autor:
Abdulmohsen Almalawi, Adil Fahad
Publikováno v:
IEEE Access, Vol 9, Pp 151681-151696 (2021)
Network traffic classification is basic tool for internet service providers, various government and private organisations to carry out investigation on network activities such as Intrusion Detection Systems (IDS), security monitoring, lawful intercep