AZERBAIJAN NATIONAL ACADEMY OF SCIENCES
SECURITY TRENDS IN MODERN COMPUTER NETWORKS
Ramiz H. Shikhaliyev

The article analyses the trends in the security of computer networks (CNs). The trends in the infrastructure, applications and usage of CNs are analysed. The effects of these trends on CN security are analysed. This paper finds that the determination of CN security trends can help uncover new security threats and deal with them effectively. (pp.71-74)

Keywords:computer security, computer networks, security trends, threats.
DOI : 10.25045/jpis.v06.i2.09
References
  • Abramson N. The Aloha System - Another Alternative for Computer Communications / Proceedings of Fall Joint Computer Conference, AFIPS Conference, 1970, p.37.
  • https://www.tools.ietf.org/html/rfc2460
  • Agrawal S., Vieira D., A survey on Internet of Things // Abakуs, Belo Horizonte, 2013, v. 1, n. 2, pp. 78-95.
  • http://www.tra.gov.eg/uploads/technical%20material/Wi-Fi%20report.pdf
  • Mohapatra S.K., Choudhury R.R., Das P., The future directions in evolving wi-fi: technologies, applications and services // International Journal of Next-Generation Networks, 2014, vol.6, no.3, pp.13-22.
  • http://www.media.johnwiley.com.au/product_data/excerpt/0X/04706968/047069680X.pdf
  • http://www4.kfupm.edu.sa/ssc/4845_MohammedUmair_Yaqub.pdf
  • Thomas R.W. Cognitive Networks, Ph.D. Dissertation, Virginia Polytechnic and State University, Blacksburg, VA, June 15, 2007.
  • Mahmoud Q. Cognitive Networks – Towards Self-Aware Networks, John Wiley and Sons, 2007, 368 p.
  • http://www.newsroom.cisco.com/dlls/2008/ts_012808.html
  • http://www.internetlivestats.com/
  • https://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2015_ASR.pdf
  • http://www.securelist.com/files/2014/12/Kaspersky-Security-Bulletin-2014-EN.pdf
  • https://www4.symantec.com/mktginfo/whitepaper/ISTR/21347932_GA-internet-security-threat-report-volume-20-2015-social_v2.pdf
  • http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q4-2014.pdf
  • http://www.newsroom.cisco.com/documents
  • Behl A., Behl K. An analysis of cloud computing security issues / Information and Communication Technologies (WICT), World Congress, 2012, pp.109-114.
  • Parekh D.H, Sridaran R. An Analysis of Security Challenges in Cloud Computing // International Journal of Advanced Computer Science and Applications, 2013, vol. 4, no.1, pp. 38-46.