SlideShare a Scribd company logo
KERBEROS
k.RAja gangadhar
14A81A0577
cse-B
INDEX_____________________________
___
 Introduction
 History & Development
 Need
 Working
 Applications
 Weakness
 climax
INTRODUCTION…………….____________
 Network authentication protocol.
 Developed at MIT in the mid 1980s.
 A secret key based service for providing authentication in open
networks.
 Provides strong authentication for client-server applications.
HISTORY & DEVELOPMENT______________
 Steve Miller and Clifford Neuman designed the
primary Kerberos version.
 Versions 1–3 occurred only internally at MIT as part
of project Athena.
 Windows 2000 was Microsoft's first system to
implement Kerberos security standard.
 Version 5, designed by John Kohl and Clifford
Neuman, appeared in 1993 .
NEED
________________________________
• The primary goal of kerberos is to elimate the transmission of
unencrypted passwords across the networks.
• Sending usernames and passwords in the clear jeopardizes the
security of network.
• Each time a password is sent in clear , there is a chance for
interception.
WORKING___________________________
__
WORKING___________________________
__
Abbreviations Used:
AS Authentication Server.
KDC Key Distribution Center.
TGS Ticket Granting Server.
SS Service Server.
TGT Ticket Granting Ticket.
WORKING:VIDEO
DISADVANTAGES_____________________
 Compromise of central server will compromise all
users' secret keys. If stolen, TGT can be used to
access network services of others.
 Kerberos only provide authentication only for
clients and services.
 Vulnerable to users making poor password
choices.
ADVANTAGES
 Passwords are never sent across the network
unencrypted.
 Tickets have a limited lifetime.
 Authentication through the AS only has to happen
once.
 Sharing secret keys is more efficient than public-
keys.
CLIMAX____________________________
__
 Kerberos is an authentication service using
convention encryption.
 Kerberos the solution to network security is a
protocol designed to provide centralized
authentication whose function is to authenticate
user to server and server to user.
Kerberos
Kerberos

More Related Content

What's hot

Kerberos authentication
Kerberos authenticationKerberos authentication
Kerberos authentication
Suraj Singh
 
Kerberos (1)
Kerberos (1)Kerberos (1)
Kerberos (1)
Ana Salas Elizondo
 
Kerberos Authentication Protocol
Kerberos Authentication ProtocolKerberos Authentication Protocol
Kerberos Authentication Protocol
Bibek Subedi
 
Kerberos
KerberosKerberos
Kerberos
Rahul Pundir
 
Kerberos
KerberosKerberos
Kerberos
Sudeep Shouche
 
Authentication Application in Network Security NS4
Authentication Application in Network Security NS4Authentication Application in Network Security NS4
Authentication Application in Network Security NS4
koolkampus
 
Kerberos
KerberosKerberos
Kerberos
Sutanu Paul
 
An Introduction to Kerberos
An Introduction to KerberosAn Introduction to Kerberos
An Introduction to Kerberos
Shumon Huque
 
Kerberos presentation
Kerberos presentationKerberos presentation
Kerberos presentation
Chris Geier
 
Rakesh raj
Rakesh rajRakesh raj
Rakesh raj
DBNCOET
 
Kerberos protocol
Kerberos protocolKerberos protocol
Kerberos protocol
Ajit Dadresa
 
Kerberos
KerberosKerberos
Kerberos
Sparkbit
 
Kerberos
KerberosKerberos
Kerberos
Prafull Johri
 
Ch15
Ch15Ch15
SSO with kerberos
SSO with kerberosSSO with kerberos
SSO with kerberos
Claudia Rosu
 
Cued click point image based kerberos authentication protocol
Cued click point image based kerberos authentication protocolCued click point image based kerberos authentication protocol
Cued click point image based kerberos authentication protocol
IAEME Publication
 
Kerberos
KerberosKerberos
Kerberos
AJINKYA PATIL
 
Kerberos explained
Kerberos explainedKerberos explained
Kerberos explained
Dotan Patrich
 
Ch14
Ch14Ch14
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificates
Stephane Potier
 

What's hot (20)

Kerberos authentication
Kerberos authenticationKerberos authentication
Kerberos authentication
 
Kerberos (1)
Kerberos (1)Kerberos (1)
Kerberos (1)
 
Kerberos Authentication Protocol
Kerberos Authentication ProtocolKerberos Authentication Protocol
Kerberos Authentication Protocol
 
Kerberos
KerberosKerberos
Kerberos
 
Kerberos
KerberosKerberos
Kerberos
 
Authentication Application in Network Security NS4
Authentication Application in Network Security NS4Authentication Application in Network Security NS4
Authentication Application in Network Security NS4
 
Kerberos
KerberosKerberos
Kerberos
 
An Introduction to Kerberos
An Introduction to KerberosAn Introduction to Kerberos
An Introduction to Kerberos
 
Kerberos presentation
Kerberos presentationKerberos presentation
Kerberos presentation
 
Rakesh raj
Rakesh rajRakesh raj
Rakesh raj
 
Kerberos protocol
Kerberos protocolKerberos protocol
Kerberos protocol
 
Kerberos
KerberosKerberos
Kerberos
 
Kerberos
KerberosKerberos
Kerberos
 
Ch15
Ch15Ch15
Ch15
 
SSO with kerberos
SSO with kerberosSSO with kerberos
SSO with kerberos
 
Cued click point image based kerberos authentication protocol
Cued click point image based kerberos authentication protocolCued click point image based kerberos authentication protocol
Cued click point image based kerberos authentication protocol
 
Kerberos
KerberosKerberos
Kerberos
 
Kerberos explained
Kerberos explainedKerberos explained
Kerberos explained
 
Ch14
Ch14Ch14
Ch14
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificates
 

Viewers also liked

MBA + PGD - Risk and Insurance Management
MBA + PGD - Risk and Insurance Management MBA + PGD - Risk and Insurance Management
MBA + PGD - Risk and Insurance Management
JNU Jaipur
 
El IoT
El IoTEl IoT
How Do Users REALLY Behave Online?
How Do Users REALLY Behave Online?How Do Users REALLY Behave Online?
How Do Users REALLY Behave Online?
CodeFuel
 
li-fi technology
li-fi technologyli-fi technology
li-fi technology
Chaitanya Ram
 
La sécurisation foncière des exploitants familiaux dans la zone de l’ODRS
La sécurisation foncière des exploitants familiaux dans la zone de l’ODRSLa sécurisation foncière des exploitants familiaux dans la zone de l’ODRS
La sécurisation foncière des exploitants familiaux dans la zone de l’ODRS
Global Water Initiative - West Africa
 
Revanth - Enterprise Engineer
Revanth - Enterprise EngineerRevanth - Enterprise Engineer
Revanth - Enterprise Engineer
revanth29115
 
Cert Disertacion VACA MUERTA en CCIS - 02-09-15_20151006105732
Cert Disertacion VACA MUERTA en CCIS - 02-09-15_20151006105732Cert Disertacion VACA MUERTA en CCIS - 02-09-15_20151006105732
Cert Disertacion VACA MUERTA en CCIS - 02-09-15_20151006105732Mariela B. Fioramonti
 
Hope in hell
Hope in hell Hope in hell
Hope in hell
Shiva Kumar Reddy
 
A modelo do deserto
A modelo do desertoA modelo do deserto
A modelo do deserto
Stephany Buxbaum
 
Darnell L Hinton Is An Enthusiastic Wildlife Photographer
Darnell L Hinton Is An Enthusiastic Wildlife PhotographerDarnell L Hinton Is An Enthusiastic Wildlife Photographer
Darnell L Hinton Is An Enthusiastic Wildlife Photographer
Darnell L Hinton
 
Eldis 20th Anniversary Workshop 2016: Ruth Bottomley
Eldis 20th Anniversary Workshop 2016: Ruth BottomleyEldis 20th Anniversary Workshop 2016: Ruth Bottomley
Eldis 20th Anniversary Workshop 2016: Ruth Bottomley
IDS Knowledge Services
 
Paulette_gaona_sociedad del conocimiento_201014
Paulette_gaona_sociedad del conocimiento_201014Paulette_gaona_sociedad del conocimiento_201014
Paulette_gaona_sociedad del conocimiento_201014
gaona20
 
New materials for a post-Minamata era (Jirun Sun)
New materials for a post-Minamata era (Jirun Sun)New materials for a post-Minamata era (Jirun Sun)
New materials for a post-Minamata era (Jirun Sun)
fdiworlddental
 
Castro jeimy-actividad-trabajo en casa
Castro jeimy-actividad-trabajo en casaCastro jeimy-actividad-trabajo en casa
Castro jeimy-actividad-trabajo en casa
jeimy katerinne castro torres
 
Alg diag
Alg diag Alg diag
Alg diag
Kary Cusacani
 

Viewers also liked (16)

MBA + PGD - Risk and Insurance Management
MBA + PGD - Risk and Insurance Management MBA + PGD - Risk and Insurance Management
MBA + PGD - Risk and Insurance Management
 
El IoT
El IoTEl IoT
El IoT
 
How Do Users REALLY Behave Online?
How Do Users REALLY Behave Online?How Do Users REALLY Behave Online?
How Do Users REALLY Behave Online?
 
IAE Certificate
IAE CertificateIAE Certificate
IAE Certificate
 
li-fi technology
li-fi technologyli-fi technology
li-fi technology
 
La sécurisation foncière des exploitants familiaux dans la zone de l’ODRS
La sécurisation foncière des exploitants familiaux dans la zone de l’ODRSLa sécurisation foncière des exploitants familiaux dans la zone de l’ODRS
La sécurisation foncière des exploitants familiaux dans la zone de l’ODRS
 
Revanth - Enterprise Engineer
Revanth - Enterprise EngineerRevanth - Enterprise Engineer
Revanth - Enterprise Engineer
 
Cert Disertacion VACA MUERTA en CCIS - 02-09-15_20151006105732
Cert Disertacion VACA MUERTA en CCIS - 02-09-15_20151006105732Cert Disertacion VACA MUERTA en CCIS - 02-09-15_20151006105732
Cert Disertacion VACA MUERTA en CCIS - 02-09-15_20151006105732
 
Hope in hell
Hope in hell Hope in hell
Hope in hell
 
A modelo do deserto
A modelo do desertoA modelo do deserto
A modelo do deserto
 
Darnell L Hinton Is An Enthusiastic Wildlife Photographer
Darnell L Hinton Is An Enthusiastic Wildlife PhotographerDarnell L Hinton Is An Enthusiastic Wildlife Photographer
Darnell L Hinton Is An Enthusiastic Wildlife Photographer
 
Eldis 20th Anniversary Workshop 2016: Ruth Bottomley
Eldis 20th Anniversary Workshop 2016: Ruth BottomleyEldis 20th Anniversary Workshop 2016: Ruth Bottomley
Eldis 20th Anniversary Workshop 2016: Ruth Bottomley
 
Paulette_gaona_sociedad del conocimiento_201014
Paulette_gaona_sociedad del conocimiento_201014Paulette_gaona_sociedad del conocimiento_201014
Paulette_gaona_sociedad del conocimiento_201014
 
New materials for a post-Minamata era (Jirun Sun)
New materials for a post-Minamata era (Jirun Sun)New materials for a post-Minamata era (Jirun Sun)
New materials for a post-Minamata era (Jirun Sun)
 
Castro jeimy-actividad-trabajo en casa
Castro jeimy-actividad-trabajo en casaCastro jeimy-actividad-trabajo en casa
Castro jeimy-actividad-trabajo en casa
 
Alg diag
Alg diag Alg diag
Alg diag
 

Similar to Kerberos

14 577
14 57714 577
Kerberos for Distributed System Security - Omal Perera
Kerberos for Distributed System Security - Omal PereraKerberos for Distributed System Security - Omal Perera
Kerberos for Distributed System Security - Omal Perera
Omal Perera
 
Review of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptxReview of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptx
ssusere142fe
 
chaitraresume
chaitraresumechaitraresume
chaitraresume
Chaitra Shankar
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
 
infraxstructure: Emil Gągała "Ludzie, procesy, technika – czy wirtualizacja ...
infraxstructure: Emil Gągała  "Ludzie, procesy, technika – czy wirtualizacja ...infraxstructure: Emil Gągała  "Ludzie, procesy, technika – czy wirtualizacja ...
infraxstructure: Emil Gągała "Ludzie, procesy, technika – czy wirtualizacja ...
PROIDEA
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
 
Continuous (Non-)Functional Testing of Microservices on K8s
Continuous (Non-)Functional Testing of Microservices on K8sContinuous (Non-)Functional Testing of Microservices on K8s
Continuous (Non-)Functional Testing of Microservices on K8s
QAware GmbH
 
Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key CryptographyIdentity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key Cryptography
CSCJournals
 
Performance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based MicroprocessorsPerformance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based Microprocessors
Hannes Tschofenig
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
CAS
 
Intro to the sel4 Microkernel
Intro to the sel4 MicrokernelIntro to the sel4 Microkernel
Intro to the sel4 Microkernel
Matthew Russell
 
Common types of networks(networking)
Common types of networks(networking)Common types of networks(networking)
Common types of networks(networking)
welcometofacebook
 
Microservices Architecture - Cloud Native Apps
Microservices Architecture - Cloud Native AppsMicroservices Architecture - Cloud Native Apps
Microservices Architecture - Cloud Native Apps
Araf Karsh Hamid
 
Implementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for IntegrationImplementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for Integration
Kim Clark
 
preparing network connections
preparing network connectionspreparing network connections
preparing network connections
aibad ahmed
 
preparing network connections
preparing network connectionspreparing network connections
preparing network connections
aibad ahmed
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
 
Anil Info
Anil InfoAnil Info
Simulations on Computer Network An Improved Study in the Simulator Methodolog...
Simulations on Computer Network An Improved Study in the Simulator Methodolog...Simulations on Computer Network An Improved Study in the Simulator Methodolog...
Simulations on Computer Network An Improved Study in the Simulator Methodolog...
YogeshIJTSRD
 

Similar to Kerberos (20)

14 577
14 57714 577
14 577
 
Kerberos for Distributed System Security - Omal Perera
Kerberos for Distributed System Security - Omal PereraKerberos for Distributed System Security - Omal Perera
Kerberos for Distributed System Security - Omal Perera
 
Review of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptxReview of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptx
 
chaitraresume
chaitraresumechaitraresume
chaitraresume
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
infraxstructure: Emil Gągała "Ludzie, procesy, technika – czy wirtualizacja ...
infraxstructure: Emil Gągała  "Ludzie, procesy, technika – czy wirtualizacja ...infraxstructure: Emil Gągała  "Ludzie, procesy, technika – czy wirtualizacja ...
infraxstructure: Emil Gągała "Ludzie, procesy, technika – czy wirtualizacja ...
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Continuous (Non-)Functional Testing of Microservices on K8s
Continuous (Non-)Functional Testing of Microservices on K8sContinuous (Non-)Functional Testing of Microservices on K8s
Continuous (Non-)Functional Testing of Microservices on K8s
 
Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key CryptographyIdentity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key Cryptography
 
Performance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based MicroprocessorsPerformance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based Microprocessors
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
Intro to the sel4 Microkernel
Intro to the sel4 MicrokernelIntro to the sel4 Microkernel
Intro to the sel4 Microkernel
 
Common types of networks(networking)
Common types of networks(networking)Common types of networks(networking)
Common types of networks(networking)
 
Microservices Architecture - Cloud Native Apps
Microservices Architecture - Cloud Native AppsMicroservices Architecture - Cloud Native Apps
Microservices Architecture - Cloud Native Apps
 
Implementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for IntegrationImplementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for Integration
 
preparing network connections
preparing network connectionspreparing network connections
preparing network connections
 
preparing network connections
preparing network connectionspreparing network connections
preparing network connections
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
Anil Info
Anil InfoAnil Info
Anil Info
 
Simulations on Computer Network An Improved Study in the Simulator Methodolog...
Simulations on Computer Network An Improved Study in the Simulator Methodolog...Simulations on Computer Network An Improved Study in the Simulator Methodolog...
Simulations on Computer Network An Improved Study in the Simulator Methodolog...
 

More from Chaitanya Ram

14 599
14 59914 599
14 598
14 59814 598
14 595
14 59514 595
14 593
14 59314 593
14 587
14 58714 587
14 586
14 58614 586
14 585
14 58514 585
14 584
14 58414 584
14 583
14 58314 583
14 581
14 58114 581
14 576
14 57614 576
14 575
14 57514 575
14A81A0574
14A81A057414A81A0574
14A81A0574
Chaitanya Ram
 
14 572
14 57214 572
14 571
14 57114 571
14 570
14 57014 570
14 569
14 569 14 569
14 569
Chaitanya Ram
 
14 568
14 56814 568
14 567
14 56714 567
14 566
14 56614 566

More from Chaitanya Ram (20)

14 599
14 59914 599
14 599
 
14 598
14 59814 598
14 598
 
14 595
14 59514 595
14 595
 
14 593
14 59314 593
14 593
 
14 587
14 58714 587
14 587
 
14 586
14 58614 586
14 586
 
14 585
14 58514 585
14 585
 
14 584
14 58414 584
14 584
 
14 583
14 58314 583
14 583
 
14 581
14 58114 581
14 581
 
14 576
14 57614 576
14 576
 
14 575
14 57514 575
14 575
 
14A81A0574
14A81A057414A81A0574
14A81A0574
 
14 572
14 57214 572
14 572
 
14 571
14 57114 571
14 571
 
14 570
14 57014 570
14 570
 
14 569
14 569 14 569
14 569
 
14 568
14 56814 568
14 568
 
14 567
14 56714 567
14 567
 
14 566
14 56614 566
14 566
 

Recently uploaded

Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 

Recently uploaded (20)

Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 

Kerberos

Editor's Notes

  1. vf