Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Razvi Doomun"'
Autor:
Razvi Doomun, M.
Publikováno v:
Business Process Management Journal, 2008, Vol. 14, Issue 6, pp. 849-857.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/14637150810916026
Publikováno v:
Security and Communication Networks, Vol 2020 (2020)
Publikováno v:
International Journal of Computer Network and Information Security. 6:27-36
Mobile forensics deals with evidence from mobile devices. Data recovered from the mobile devices are helpful in investigation to solve criminal cases. It is crucial to preserve the integrity of these data. According to research carried out [1], it ha
Publikováno v:
Security and Communication Networks. 7:2015-2038
In wireless sensor networks WSNs, sensor devices have limited supply of energy. The sensor death due to dissipating battery energy is one of the fundamental design issues in WSNs. Hence, energy efficiency is argued to be the most important requiremen
Publikováno v:
Security and Communication Networks. 4:888-901
The identity and/or location of communicating entities in wireless ad hocnetworks is extremely important due to the potential of their being identified and subsequently subjected to cyber or physical attacks. In this paper, we show that a global atta
Autor:
Nevin Vunka Jungum, Razvi Doomun
Publikováno v:
Business Process Management Journal. 14:838-848
PurposeThe purpose of this paper is to develop a flexible framework through which business processes can be modelled, simulated and reengineered in a cost‐effective way.Design/methodology/approachThis paper is mainly based on a review of the litera
Autor:
Sudha Cheerkoot-Jalim, Kavi Kumar Khedo, Anuja Meetoo-Appavoo, Shakuntala Baichoo, Zarine Cadersaib, Bibi Rubeena Doomun, Oveeyen Moonian, Razvi Doomun, Soulakshmee D. Nagowah
Publikováno v:
2014 IST-Africa Conference Proceedings.
The volume of the data involved in healthcare systems and the sensitivity of the data call for strict, non-obtrusive and efficient access control. This paper presents the design and implementation of a software prototype to demonstrate how Role-Based
Publikováno v:
2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).
Arbitrary usage of cloud computing, either private or public, can lead to uneconomical energy consumption in data processing, storage and communication. Hence, green cloud computing solutions aim not only to save energy but also reduce operational co
Publikováno v:
ICCCN
In wireless ad hoc networks, protecting source and destination nodes location privacy is a challenging task due to malicious traffic analysis and privacy attacks. Existing solutions, such as incorporating fake source destination pairs in the network,
Publikováno v:
Innovations and Advances in Computer Sciences and Engineering ISBN: 9789048136575
SCSS (1)
SCSS (1)
With rapid growth in wireless network technologies, there is high need for secure communication in such as highly heterogeneous environment. Since mobile wireless devices have limited battery capacity, wireless network security should make optimal us
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4b7c4882a5122b4dc82161e985fce69a
https://doi.org/10.1007/978-90-481-3658-2_13
https://doi.org/10.1007/978-90-481-3658-2_13