UCSY's Research Repository

Browsing by Author "Aung, May Aye Chan"

Browsing by Author "Aung, May Aye Chan"

Sort by: Order: Results:

  • Aung, May Aye Chan; Thant, Khin Phyo (Fourteenth International Conference On Computer Applications (ICCA 2016), 2016-02-25)
    As the internet evolves and computer networks become bigger and bigger, network security is one of the most challenging issues in today's world that touches many areas using network communication. Nowadays, there is a ...
  • Aung, May Aye Chan; Thant, Khin Phyo (Seventeenth International Conference on Computer Applications(ICCA 2019), 2019-02-27)
    Protection of IEEE 802.11 networks means protection against attacks on confidentiality, integrity and availability. Possible threats come from vulnerabilities of security protocols. The rapid growth in the use of ...
  • Aung, May Aye Chan; Thant, Khin Phyo (Fifteenth International Conference on Computer Applications(ICCA 2017), 2017-02-16)
    Nowadays, Wireless Local Area Network (WLAN) is widely used because of mobility and ease of placement. The rapid growth in the use of wireless networks attracts the attackers as a target. Link layer is the weakness ...
  • Wai, Myat Su; Aung, May Aye Chan (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Ontologies are set to play a vital role in the Semantic Web, e-Commerce, Bio-informatics, Artificial Intelligence, Natural Language Processing, and many other areas by providing a source of shared and precisely defined ...
  • Aung, May Aye Chan; Wai, Myat Su (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Data security is the challenging issue in todays world that touches many areas using computer communication. Recent cyber security attacks have certainly played with the sentiments of the users [9]. Encryption is one ...
  • Aung, May Aye Chan; Thant, Khin Phyo (Sixteenth International Conferences on Computer Applications(ICCA 2018), 2018-02-22)
    With the passage of time, attackers are getting smarter and smarter. Incident handlers and law enforcement have been forced to deal with the complexity linked in wireless technologies to manage and respond security incidents. ...

Search Repository

Browse

My Account