Roza Dastres - Academia.edu (original) (raw)
Papers by Roza Dastres
Sustainable Manufacturing and Service Economics
CERN European Organization for Nuclear Research - Zenodo, Jul 2, 2022
Lean manufacturing is a systematic approach to manufacturing operations which saves time, money, ... more Lean manufacturing is a systematic approach to manufacturing operations which saves time, money, and resources by concentrating on decreasing the waste during the part manufacturing. It can improve overall business performance as well as quality of produced parts by decreasing the wastes in processes and resources to increase added values in process of part production. As a result, lean manufacturing can produce advanced manufacturing systems with fewer faults and errors, less waiting, and less complexity in the process of part production. The lean manufacturing systems can be applied to the virtual manufacturing, sustainable manufacturing, supply chain and industry 4.0 in order to enhance the efficiency levels of part production. To manage the resources in the process of part production, knowledge management systems can be applied to the lean production. Advanced assembly lines in the automotive and ship industries can be generated in order to decrease the waste time and energy in assembly process of part production. A review of the implementations of lean production techniques in enhancing part manufacturing efficiency is provided and future research works are also suggested. The study's main goal is to provide a beneficial study for researchers in the field by providing an overview of current research on productivity enhancement using advanced lean production systems. It has been discovered that by reading and analyzing current successes in published papers, the research field can be advanced.
The advancement of technology in human life has resulted in multiple forms of contamination in th... more The advancement of technology in human life has resulted in multiple forms of contamination in the atmosphere, which has thrown off the environment's balance and proportionality. Today, one of the most critical issues in environmental economics is the role of information and communication technology (ICT) in reducing air pollution, which has impacted various aspects of human life in recent years. Environmental research and its application to lawmakers and the general public can benefit from the use of information and communication technology. The use of ICT can reduce dependence on environmental resources in order to decrease the environmental pollution due to the Improper usage of natural resources. Applications of the ICT systems in the environmental protection is presented in the study to improve the quality level of monitoring and protections systems of the environment from the pollutions. The effects of ICT systems in the climate change, forest Degradation, hurricanes and t...
International Journal of Computer and Information Engineering, 2014
Networks are vulnerable devices due to their basic feature of facilitating remote access and data... more Networks are vulnerable devices due to their basic feature of facilitating remote access and data communication. The information in the networks needs to be kept secured and safe in order to provide an effective communication and sharing device in the web of data. Due to challenges and threats of the data in networks, the network security is one of the most important considerations in information technology infrastructures. As a result, the security measures are considered in the network in order to decrease the probability of accessing the secured data by the hackers. The purpose of network security is to protect the network and its components from unauthorized access and abuse in order to provide a safe and secured communication device for the users. In the present research work a review in recent development of network threats and security measures is presented and future research works are also suggested. Different attacks to the networks and security measured against them are discussed in order to increase security in the web of data. So, new ideas in the network security systems can be presented by analyzing the published papers in order to move forward the research field.
Independent Journal of Management & Production, 2022
Radio frequency identification (RFID) is one of the most promising technological innovations in o... more Radio frequency identification (RFID) is one of the most promising technological innovations in order to track and trace products as well as material flow in manufacturing systems. High Frequency (HF) and Ultra High Frequency (UHF) RFID systems can track a wide range of products in the part production process via radio waves with level of accuracy and reliability. As a result, quality and transparency of data across the supply chain can be accurately obtained in order to decrease time and cost of part production. Also, process planning and part production scheduling can be modified using the advanced RFID systems in part manufacturing process. Moreover, to decrease the cost of produced parts, material handling systems in the advanced assembly lines can be analyzed and developed by using the RFID. Smart storage systems can increase efficiency in part production systems by providing accurate information from the stored raw materials and products for the production planning systems. ...
Web technology has enabled an efficient way of providing and exchanging applications for Decision... more Web technology has enabled an efficient way of providing and exchanging applications for Decision Support Systems (DSS). Online technology has become the foundation for the design of the web based DSS and the operation development center of DSS. The Web-based DSS is a powerful method which can help users to identify data and accessible services as an online service on the Intranet. The Web-based DSS consists of a computerized framework which, through the web browser, provides users with decision support information or resources. The aim is to provide fast and inexpensive access to data, information and expertise available around the world, along with the ability in order to collaborate effectively with remote partners in decision support systems. Speedy processes, improved communication and teamwork, distributed computation, improved group members' efficiency, improved data management and data warehouse management in decision making systems and providing remote control are some ...
Digital Signal Processing (DSP) is the use of digital processing systems by computers in order to... more Digital Signal Processing (DSP) is the use of digital processing systems by computers in order to perform a variety of signal processing operations. It is the mathematical manipulation of a digital signal's numerical values in order to increase quality as well as effects of signals. DSP can include linear or nonlinear operators in order to process and analyze the input signals. The nonlinear DSP processing is closely related to nonlinear system detection and can be implemented in time, frequency and space-time domains. Applications of the DSP can be presented as control systems, digital image processing, biomedical engineering, speech recognition systems, industrial engineering, health care systems, radar signal processing and telecommunication systems. In this study, advanced methods and different applications of DSP are reviewed in order to move forward the interesting research filed.
In order to electronically exchange information between network users in the web of data, differe... more In order to electronically exchange information between network users in the web of data, different software such as outlook is presented. So, the traffic of users on a site or even the floors of a building can be decreased as a result of applying a secure and reliable data sharing software. It is essential to provide a fast, secure and reliable network system in the data sharing webs to create an advanced communication systems in the users of network. In the present research work, different encoding methods and algorithms in data sharing systems is studied in order to increase security of data sharing systems by preventing the access of hackers to the transferred data. To increase security in the networks, the possibility of textual conversation between customers of a local network is studied. Application of the encryption and decryption algorithms is studied in order to increase security in networks by preventing hackers from infiltrating. As a result, a reliable and secure commun...
Image processing is a subset of digital signal processing that has different applications and ben... more Image processing is a subset of digital signal processing that has different applications and benefits in different fields. Digital processing is in fact the digital image processing that can be performed with the help of computer science, programming and artificial intelligence. Image processing is one of the applications and subsets of artificial intelligence that, as its name suggests, processes digital images and displays a certain output with specific information based on predefined training. Nowadays, the applications of image processing technology in various fields in technical, industrial, scientific, security, medical, etc. have caused a lot of attention and use by different people. This paper presents the recent development and applications in the image processing systems in order to move forward the research filed by reviewing and analyzing recent achievements in the published papers. As a result, advanced image processing systems in different applications can be develope...
The advancement of technology in human life has resulted in multiple forms of contamination in th... more The advancement of technology in human life has resulted in multiple forms of contamination in the atmosphere, which has thrown off the environment's balance and proportionality. Today, one of the most critical issues in environmental economics is the role of information and communication technology (ICT) in reducing air pollution, which has impacted various aspects of human life in recent years. Environmental research and its application to lawmakers and the general public can benefit from the use of information and communication technology. The use of ICT can reduce dependence on environmental resources in order to decrease the environmental pollution due to the Improper usage of natural resources. Applications of the ICT systems in the environmental protection is presented in the study to improve the quality level of monitoring and protections systems of the environment from the pollutions. The effects of ICT systems in the climate change, forest Degradation, hurricanes and t...
The Meltdown and spectre holes are two security deficiencies which can provide access to personal... more The Meltdown and spectre holes are two security deficiencies which can provide access to personal data for hackers and can potentially affect performances of Linux, Mac systems, and Windows devices plus other operating systems. In order to prevent the capturing data on computer or smartphones by attackers, two vulnerabilities as meltdown and spectre are recently detected on CPU manufacture. Vulnerabilities are part of the hardware design of the processor by changing the processor structures in terms of security enhancement of the CPU manufacture. Meltdown hole is run on a wide range of operating systems including IOS, Linux, MacOS, and Windows which can affect many service providers and cloud services. There are some fixes from manufacturer of OS and BIOS which are trying to fix exploits. Software patches should be used while undergo updating operations should also be applied in order to enhance the security of operating systems. In this paper, the impact of meltdown hole on various...
Artificial Neural Networks is a calculation method that builds several processing units based on ... more Artificial Neural Networks is a calculation method that builds several processing units based on interconnected connections. The network consists of an arbitrary number of cells or nodes or units or neurons that connect the input set to the output. It is a part of a computer system that mimics how the human brain analyzes and processes data. Self-driving vehicles, character recognition, image compression, stock market prediction, risk analysis systems, drone control, welding quality analysis, computer quality analysis, emergency room testing, oil and gas exploration and a variety of other applications all use artificial neural networks. Predicting consumer behavior, creating and understanding more sophisticated buyer segments, marketing automation, content creation and sales forecasting are some applications of the ANN systems in the marketing. In this paper, a review in recent development and applications of the Artificial Neural Networks is presented in order to move forward the research filed by reviewing and analyzing recent achievements in the published papers. Thus, the developed ANN systems can be presented and new methodologies and applications of the ANN systems can be introduced.
The Meltdown and spectre holes are two security deficiencies which can provide access to personal... more The Meltdown and spectre holes are two security deficiencies which can provide access to personal data for hackers and can potentially affect performances of Linux, Mac systems, and Windows devices plus other operating systems. In order to prevent the capturing data on computer or smartphones by attackers, two vulnerabilities as meltdown and spectre are recently detected on CPU manufacture. Vulnerabilities are part of the hardware design of the processor by changing the processor structures in terms of security enhancement of the CPU manufacture. Meltdown hole is run on a wide range of operating systems including IOS, Linux, MacOS, and Windows which can affect many service providers and cloud services. There are some fixes from manufacturer of OS and BIOS which are trying to fix exploits. Software patches should be used while undergo updating operations should also be applied in order to enhance the security of operating systems. In this paper, the impact of meltdown hole on various...
International Journal of Engineering and Future Technology
The Meltdown and spectre holes are two security deficiencies which can provide access to personal... more The Meltdown and spectre holes are two security deficiencies which can provide access to personal data for hackers and can potentially affect performances of Linux, Mac systems, and Windows devices plus other operating systems. In order to prevent the capturing data on computer or smartphones by attackers, two vulnerabilities as meltdown and spectre are recently detected on CPU manufacture. Vulnerabilities are part of the hardware design of the processor by changing the processor structures in terms of security enhancement of the CPU manufacture. Meltdown hole is run on a wide range of operating systems including IOS, Linux, MacOS, and Windows which can affect many service providers and cloud services. There are some fixes from manufacturer of OS and BIOS which are trying to fix exploits. Software patches should be used while undergo updating operations should also be applied in order to enhance the security of operating systems. In this paper, the impact of meltdown hole on various...
In order to electronically exchange information between network users in the web of data, differe... more In order to electronically exchange information between network users in the web of data, different software such as outlook is presented. So, the traffic of users on a site or even the floors of a building can be decreased as a result of applying a secure and reliable data sharing software. It is essential to provide a fast, secure and reliable network system in the data sharing webs to create an advanced communication systems in the users of network. In the present research work, different encoding methods and algorithms in data sharing systems is studied in order to increase security of data sharing systems by preventing the access of hackers to the transferred data. To increase security in the networks, the possibility of textual conversation between customers of a local network is studied. Application of the encryption and decryption algorithms is studied in order to increase security in networks by preventing hackers from infiltrating. As a result, a reliable and secure commun...
Networks are vulnerable devices due to their basic feature of facilitating remote access and data... more Networks are vulnerable devices due to their basic feature of facilitating remote access and data communication. The information in the networks needs to be kept secured and safe in order to provide an effective communication and sharing device in the web of data. Due to challenges and threats of the data in networks, the network security is one of the most important considerations in information technology infrastructures. As a result, the security measures are considered in the network in order to decrease the probability of accessing the secured data by the hackers. The purpose of network security is to protect the network and its components from unauthorized access and abuse in order to provide a safe and secured communication device for the users. In the present research work a review in recent development of network threats and security measures is presented and future research works are also suggested. Different attacks to the networks and security measured against them are d...
International Journal of Computer and Information Engineering, 2021
Networks are vulnerable devices due to their basic feature of facilitating remote access and data... more Networks are vulnerable devices due to their basic feature of facilitating remote access and data communication. The information in the networks needs to be kept secured and safe in order to provide an effective communication and sharing device in the web of data. Due to challenges and threats of the data in networks, the network security is one of the most important considerations in information technology infrastructures. As a result, the security measures are considered in the network in order to decrease the probability of accessing the secured data by the hackers. The purpose of network security is to protect the network and its components from unauthorized access and abuse in order to provide a safe and secured communication device for the users. In the present research work a review in recent development of network threats and security measures is presented and future research works are also suggested. Different attacks to the networks and security measured against them are discussed in order to increase security in the web of data. So, new ideas in the network security systems can be presented by analyzing the published papers in order to move forward the research field.
Sustainable Manufacturing and Service Economics
CERN European Organization for Nuclear Research - Zenodo, Jul 2, 2022
Lean manufacturing is a systematic approach to manufacturing operations which saves time, money, ... more Lean manufacturing is a systematic approach to manufacturing operations which saves time, money, and resources by concentrating on decreasing the waste during the part manufacturing. It can improve overall business performance as well as quality of produced parts by decreasing the wastes in processes and resources to increase added values in process of part production. As a result, lean manufacturing can produce advanced manufacturing systems with fewer faults and errors, less waiting, and less complexity in the process of part production. The lean manufacturing systems can be applied to the virtual manufacturing, sustainable manufacturing, supply chain and industry 4.0 in order to enhance the efficiency levels of part production. To manage the resources in the process of part production, knowledge management systems can be applied to the lean production. Advanced assembly lines in the automotive and ship industries can be generated in order to decrease the waste time and energy in assembly process of part production. A review of the implementations of lean production techniques in enhancing part manufacturing efficiency is provided and future research works are also suggested. The study's main goal is to provide a beneficial study for researchers in the field by providing an overview of current research on productivity enhancement using advanced lean production systems. It has been discovered that by reading and analyzing current successes in published papers, the research field can be advanced.
The advancement of technology in human life has resulted in multiple forms of contamination in th... more The advancement of technology in human life has resulted in multiple forms of contamination in the atmosphere, which has thrown off the environment's balance and proportionality. Today, one of the most critical issues in environmental economics is the role of information and communication technology (ICT) in reducing air pollution, which has impacted various aspects of human life in recent years. Environmental research and its application to lawmakers and the general public can benefit from the use of information and communication technology. The use of ICT can reduce dependence on environmental resources in order to decrease the environmental pollution due to the Improper usage of natural resources. Applications of the ICT systems in the environmental protection is presented in the study to improve the quality level of monitoring and protections systems of the environment from the pollutions. The effects of ICT systems in the climate change, forest Degradation, hurricanes and t...
International Journal of Computer and Information Engineering, 2014
Networks are vulnerable devices due to their basic feature of facilitating remote access and data... more Networks are vulnerable devices due to their basic feature of facilitating remote access and data communication. The information in the networks needs to be kept secured and safe in order to provide an effective communication and sharing device in the web of data. Due to challenges and threats of the data in networks, the network security is one of the most important considerations in information technology infrastructures. As a result, the security measures are considered in the network in order to decrease the probability of accessing the secured data by the hackers. The purpose of network security is to protect the network and its components from unauthorized access and abuse in order to provide a safe and secured communication device for the users. In the present research work a review in recent development of network threats and security measures is presented and future research works are also suggested. Different attacks to the networks and security measured against them are discussed in order to increase security in the web of data. So, new ideas in the network security systems can be presented by analyzing the published papers in order to move forward the research field.
Independent Journal of Management & Production, 2022
Radio frequency identification (RFID) is one of the most promising technological innovations in o... more Radio frequency identification (RFID) is one of the most promising technological innovations in order to track and trace products as well as material flow in manufacturing systems. High Frequency (HF) and Ultra High Frequency (UHF) RFID systems can track a wide range of products in the part production process via radio waves with level of accuracy and reliability. As a result, quality and transparency of data across the supply chain can be accurately obtained in order to decrease time and cost of part production. Also, process planning and part production scheduling can be modified using the advanced RFID systems in part manufacturing process. Moreover, to decrease the cost of produced parts, material handling systems in the advanced assembly lines can be analyzed and developed by using the RFID. Smart storage systems can increase efficiency in part production systems by providing accurate information from the stored raw materials and products for the production planning systems. ...
Web technology has enabled an efficient way of providing and exchanging applications for Decision... more Web technology has enabled an efficient way of providing and exchanging applications for Decision Support Systems (DSS). Online technology has become the foundation for the design of the web based DSS and the operation development center of DSS. The Web-based DSS is a powerful method which can help users to identify data and accessible services as an online service on the Intranet. The Web-based DSS consists of a computerized framework which, through the web browser, provides users with decision support information or resources. The aim is to provide fast and inexpensive access to data, information and expertise available around the world, along with the ability in order to collaborate effectively with remote partners in decision support systems. Speedy processes, improved communication and teamwork, distributed computation, improved group members' efficiency, improved data management and data warehouse management in decision making systems and providing remote control are some ...
Digital Signal Processing (DSP) is the use of digital processing systems by computers in order to... more Digital Signal Processing (DSP) is the use of digital processing systems by computers in order to perform a variety of signal processing operations. It is the mathematical manipulation of a digital signal's numerical values in order to increase quality as well as effects of signals. DSP can include linear or nonlinear operators in order to process and analyze the input signals. The nonlinear DSP processing is closely related to nonlinear system detection and can be implemented in time, frequency and space-time domains. Applications of the DSP can be presented as control systems, digital image processing, biomedical engineering, speech recognition systems, industrial engineering, health care systems, radar signal processing and telecommunication systems. In this study, advanced methods and different applications of DSP are reviewed in order to move forward the interesting research filed.
In order to electronically exchange information between network users in the web of data, differe... more In order to electronically exchange information between network users in the web of data, different software such as outlook is presented. So, the traffic of users on a site or even the floors of a building can be decreased as a result of applying a secure and reliable data sharing software. It is essential to provide a fast, secure and reliable network system in the data sharing webs to create an advanced communication systems in the users of network. In the present research work, different encoding methods and algorithms in data sharing systems is studied in order to increase security of data sharing systems by preventing the access of hackers to the transferred data. To increase security in the networks, the possibility of textual conversation between customers of a local network is studied. Application of the encryption and decryption algorithms is studied in order to increase security in networks by preventing hackers from infiltrating. As a result, a reliable and secure commun...
Image processing is a subset of digital signal processing that has different applications and ben... more Image processing is a subset of digital signal processing that has different applications and benefits in different fields. Digital processing is in fact the digital image processing that can be performed with the help of computer science, programming and artificial intelligence. Image processing is one of the applications and subsets of artificial intelligence that, as its name suggests, processes digital images and displays a certain output with specific information based on predefined training. Nowadays, the applications of image processing technology in various fields in technical, industrial, scientific, security, medical, etc. have caused a lot of attention and use by different people. This paper presents the recent development and applications in the image processing systems in order to move forward the research filed by reviewing and analyzing recent achievements in the published papers. As a result, advanced image processing systems in different applications can be develope...
The advancement of technology in human life has resulted in multiple forms of contamination in th... more The advancement of technology in human life has resulted in multiple forms of contamination in the atmosphere, which has thrown off the environment's balance and proportionality. Today, one of the most critical issues in environmental economics is the role of information and communication technology (ICT) in reducing air pollution, which has impacted various aspects of human life in recent years. Environmental research and its application to lawmakers and the general public can benefit from the use of information and communication technology. The use of ICT can reduce dependence on environmental resources in order to decrease the environmental pollution due to the Improper usage of natural resources. Applications of the ICT systems in the environmental protection is presented in the study to improve the quality level of monitoring and protections systems of the environment from the pollutions. The effects of ICT systems in the climate change, forest Degradation, hurricanes and t...
The Meltdown and spectre holes are two security deficiencies which can provide access to personal... more The Meltdown and spectre holes are two security deficiencies which can provide access to personal data for hackers and can potentially affect performances of Linux, Mac systems, and Windows devices plus other operating systems. In order to prevent the capturing data on computer or smartphones by attackers, two vulnerabilities as meltdown and spectre are recently detected on CPU manufacture. Vulnerabilities are part of the hardware design of the processor by changing the processor structures in terms of security enhancement of the CPU manufacture. Meltdown hole is run on a wide range of operating systems including IOS, Linux, MacOS, and Windows which can affect many service providers and cloud services. There are some fixes from manufacturer of OS and BIOS which are trying to fix exploits. Software patches should be used while undergo updating operations should also be applied in order to enhance the security of operating systems. In this paper, the impact of meltdown hole on various...
Artificial Neural Networks is a calculation method that builds several processing units based on ... more Artificial Neural Networks is a calculation method that builds several processing units based on interconnected connections. The network consists of an arbitrary number of cells or nodes or units or neurons that connect the input set to the output. It is a part of a computer system that mimics how the human brain analyzes and processes data. Self-driving vehicles, character recognition, image compression, stock market prediction, risk analysis systems, drone control, welding quality analysis, computer quality analysis, emergency room testing, oil and gas exploration and a variety of other applications all use artificial neural networks. Predicting consumer behavior, creating and understanding more sophisticated buyer segments, marketing automation, content creation and sales forecasting are some applications of the ANN systems in the marketing. In this paper, a review in recent development and applications of the Artificial Neural Networks is presented in order to move forward the research filed by reviewing and analyzing recent achievements in the published papers. Thus, the developed ANN systems can be presented and new methodologies and applications of the ANN systems can be introduced.
The Meltdown and spectre holes are two security deficiencies which can provide access to personal... more The Meltdown and spectre holes are two security deficiencies which can provide access to personal data for hackers and can potentially affect performances of Linux, Mac systems, and Windows devices plus other operating systems. In order to prevent the capturing data on computer or smartphones by attackers, two vulnerabilities as meltdown and spectre are recently detected on CPU manufacture. Vulnerabilities are part of the hardware design of the processor by changing the processor structures in terms of security enhancement of the CPU manufacture. Meltdown hole is run on a wide range of operating systems including IOS, Linux, MacOS, and Windows which can affect many service providers and cloud services. There are some fixes from manufacturer of OS and BIOS which are trying to fix exploits. Software patches should be used while undergo updating operations should also be applied in order to enhance the security of operating systems. In this paper, the impact of meltdown hole on various...
International Journal of Engineering and Future Technology
The Meltdown and spectre holes are two security deficiencies which can provide access to personal... more The Meltdown and spectre holes are two security deficiencies which can provide access to personal data for hackers and can potentially affect performances of Linux, Mac systems, and Windows devices plus other operating systems. In order to prevent the capturing data on computer or smartphones by attackers, two vulnerabilities as meltdown and spectre are recently detected on CPU manufacture. Vulnerabilities are part of the hardware design of the processor by changing the processor structures in terms of security enhancement of the CPU manufacture. Meltdown hole is run on a wide range of operating systems including IOS, Linux, MacOS, and Windows which can affect many service providers and cloud services. There are some fixes from manufacturer of OS and BIOS which are trying to fix exploits. Software patches should be used while undergo updating operations should also be applied in order to enhance the security of operating systems. In this paper, the impact of meltdown hole on various...
In order to electronically exchange information between network users in the web of data, differe... more In order to electronically exchange information between network users in the web of data, different software such as outlook is presented. So, the traffic of users on a site or even the floors of a building can be decreased as a result of applying a secure and reliable data sharing software. It is essential to provide a fast, secure and reliable network system in the data sharing webs to create an advanced communication systems in the users of network. In the present research work, different encoding methods and algorithms in data sharing systems is studied in order to increase security of data sharing systems by preventing the access of hackers to the transferred data. To increase security in the networks, the possibility of textual conversation between customers of a local network is studied. Application of the encryption and decryption algorithms is studied in order to increase security in networks by preventing hackers from infiltrating. As a result, a reliable and secure commun...
Networks are vulnerable devices due to their basic feature of facilitating remote access and data... more Networks are vulnerable devices due to their basic feature of facilitating remote access and data communication. The information in the networks needs to be kept secured and safe in order to provide an effective communication and sharing device in the web of data. Due to challenges and threats of the data in networks, the network security is one of the most important considerations in information technology infrastructures. As a result, the security measures are considered in the network in order to decrease the probability of accessing the secured data by the hackers. The purpose of network security is to protect the network and its components from unauthorized access and abuse in order to provide a safe and secured communication device for the users. In the present research work a review in recent development of network threats and security measures is presented and future research works are also suggested. Different attacks to the networks and security measured against them are d...
International Journal of Computer and Information Engineering, 2021
Networks are vulnerable devices due to their basic feature of facilitating remote access and data... more Networks are vulnerable devices due to their basic feature of facilitating remote access and data communication. The information in the networks needs to be kept secured and safe in order to provide an effective communication and sharing device in the web of data. Due to challenges and threats of the data in networks, the network security is one of the most important considerations in information technology infrastructures. As a result, the security measures are considered in the network in order to decrease the probability of accessing the secured data by the hackers. The purpose of network security is to protect the network and its components from unauthorized access and abuse in order to provide a safe and secured communication device for the users. In the present research work a review in recent development of network threats and security measures is presented and future research works are also suggested. Different attacks to the networks and security measured against them are discussed in order to increase security in the web of data. So, new ideas in the network security systems can be presented by analyzing the published papers in order to move forward the research field.