- الوحدات والمجموعات
- تصفح النسخ ب :
- تاريخ النشر
- المؤلف
- العنوان
- الموضوع
تسجيلة بيانات وصفية كاملة
حقل DC | القيمة | اللغة |
---|---|---|
dc.contributor.adviser | Felemban, Emad | - |
dc.contributor.author | AL-Bogami, Salem | - |
dc.date.accessioned | 2022-01-31T08:12:24Z | - |
dc.date.available | 2022-01-31T08:12:24Z | - |
dc.date.issued | 2020 | en_US |
dc.identifier.uri | http://dorar.uqu.edu.sa//uquui/handle/20.500.12248/132089 | - |
dc.description | 48 ورقة | en_US |
dc.description.abstract | In the last few years, and with the massive development in wireless networks, high internet speeds, and car manufacturing improvements, more focus has been placed on Vehicular Ad-HOC Networks (VANETs). Consequently, many frameworks that serve VANETs were researched, and one of the main issues that were researched and tested is the security of VANETs. Despite that, a small number of research studies have considered the identification of performance standards and parameters. In this research paper, many of these VANET security frameworks were surveyed, studied and analyzed, and finally resulted identifying a list of performance evaluation parameters. These parameters counted forty, and afterwards they were defined and categorized based on the nature of the parameter, i.e., whether it is in the security, network or general context. These parameters were identified to be used by future researchers to have a base to work-on when it comes to evaluating their proposed VANET security frameworks. The implementation paradigms of the surveyed security frameworks were also identified, revealing that all the surveyed researches used simulation for implementation and testing. The simulators used in the simulation processes were also analyzed, and the results of this study showed that most of the surveyed studies used the NS-2 simulator, with a usage percentage of 54.4%. Not all researched studies used specific urban scenario, however, among the studies that had this specification in place, | en_US |
dc.language.iso | انجليزي | en_US |
dc.publisher | جامعة أم القرى | en_US |
dc.relation.isformatof | مكتبة الملك عبدالله بن عبدالعزيز الجامعية | en_US |
dc.subject | الحاسب الآلي | en_US |
dc.title | الإطار الأمني ل VANET: المسح والتقييم | en_US |
dc.title.alternative | Security Framework for VANET: Survey and Evaluation | en_US |
dc.identifier.callnum | 24396 | - |
dc.type.format | ماجستير | en_US |
dc.publisher.country | المملكة العربية السعودية | en_US |
dc.relation.collage | الحاسب الآلي ونظم المعلومات | en_US |
dc.type.status | مجاز | en_US |
dc.rights.hold | Yes | en_US |
dc.rights.digital | Yes | en_US |
dc.publisher.city | مكة المكرمة | en_US |
dc.date.issuedhijri | 1441 | en_US |
dc.relation.dep | هندسة الحاسب الآلي | en_US |
dc.rights.digitized | Yes | en_US |
يظهر في المجموعات : | الرسائل العلمية المحدثة |
الملفات في هذا العنصر:
ملف | الوصف | الحجم | التنسيق | |
---|---|---|---|---|
24396.pdf " الوصول المحدود" | الرسالة الكاملة | 951.68 kB | Adobe PDF | عرض/ فتحطلب نسخة |
absa24396.pdf " الوصول المحدود" | ملخص الرسالة بالعربي | 101.91 kB | Adobe PDF | عرض/ فتحطلب نسخة |
abse24396.pdf " الوصول المحدود" | ملخص الرسالة بالإنجليزي | 28.88 kB | Adobe PDF | عرض/ فتحطلب نسخة |
cont24396.pdf " الوصول المحدود" | فهرس الموضوعات | 110.94 kB | Adobe PDF | عرض/ فتحطلب نسخة |
indu24396.pdf " الوصول المحدود" | المقدمة | 324.69 kB | Adobe PDF | عرض/ فتحطلب نسخة |
title24396.pdf " الوصول المحدود" | غلاف | 57.82 kB | Adobe PDF | عرض/ فتحطلب نسخة |
جميع الأوعية على المكتبة الرقمية محمية بموجب حقوق النشر، ما لم يذكر خلاف ذلك
تعليقات (0)