Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Mohammed Shafiul Alam Khan"'
Publikováno v:
Knowledge Engineering and Data Science, Vol 4, Iss 1, Pp 29-37 (2021)
Missing link smell occurs when developers contribute to the same source code without communicating with each other. Existing studies have analyzed the relationship of missing link smells with code smell and developer contribution. However, the produc
Externí odkaz:
https://doaj.org/article/49dc11352536400fbaac014d7d56de7d
Forest Land Analysis using Normalized Difference Vegetation Index (NDVI): A Case Study of Bangladesh
Publikováno v:
International Journal of Computer Applications. 183:15-19
Publikováno v:
WISEC
We address the decades-old privacy problem of disclosure of the permanent subscriber identity (IMSI) that makes IMSI catchers a real threat to all generations of mobile networks. A number of possible modifications to existing protocols have been prop
Publikováno v:
Security and Trust Management ISBN: 9783319465975
STM
STM
As has been widely discussed, the GSM mobile telephony system only offers unilateral authentication of the mobile phone to the network; this limitation permits a range of attacks. While adding support for mutual authentication would be highly benefic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e73c007b008f8f1c7caaeb32462a6fae
https://doi.org/10.1007/978-3-319-46598-2_2
https://doi.org/10.1007/978-3-319-46598-2_2
Publikováno v:
Security Standardisation Research ISBN: 9783319271514
SSR
SSR
A number of approaches to the automatic generation of IPv6 addresses have been proposed with the goal of preserving the privacy of IPv6 hosts. However, existing schemes for address autoconfiguration do not adequately consider the full context in whic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e0ba05e687fe08c468fbdfbeea73160a
https://doi.org/10.1007/978-3-319-27152-1_10
https://doi.org/10.1007/978-3-319-27152-1_10
Publikováno v:
Security Standardisation Research ISBN: 9783319271514
SSR
SSR
Although the security properties of 3G and 4G mobile networks have significantly improved by comparison with 2G GSM, significant shortcomings remain with respect to user privacy. A number of possible modifications to 2G, 3G and 4G protocols have been
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1e69aed3e6f7643ad9f429ea54a5bbb7
https://doi.org/10.1007/978-3-319-27152-1_9
https://doi.org/10.1007/978-3-319-27152-1_9
Publikováno v:
Information Security and Privacy ISBN: 9783319083438
ACISP
ACISP
Arapinis et al. [1] have recently proposed modifications to the operation of 3G mobile phone security in order to address newly identified threats to user privacy. In this paper we critically examine these modifications. This analysis reveals that th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5bdf8d7de5a8c9226d02cd2cce17be06
https://doi.org/10.1007/978-3-319-08344-5_25
https://doi.org/10.1007/978-3-319-08344-5_25
Now a day's Heterogeneous wireless network is a promising field of research interest. Various challenges exist in this hybrid combination like load balancing, resource management and so on. In this paper we introduce a reliable load balancing archite
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e2bccb94393effb7e79d616b3556740a
http://arxiv.org/abs/1202.1918
http://arxiv.org/abs/1202.1918
Improving software process to achieve high quality in a software development organization is the key factor to success. Bangladeshi software firms have not experienced much in this particular area in comparison to other countries. The ISO 9001 and CM
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6ad107a287d0f05d40543c8ff3b947d6