Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- Prevention 2
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Crime prevention 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Information technology 1
- Internal security 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Social media 1
- Technology 1
-
21
RELIABILITY ANALYSIS OF COMPUTER NETWORKS USING PARAMETRIC FAILURE CRITERIA
Published 2016-07-01Subjects: Get full text
Article -
22
FORENSIC ASPECTS OF THE STUDY OF COMPUTER NETWORKS OF THE BAN AND PAN LEVELS
Published 2025-02-01Get full text
Article -
23
Architecture of Hardware and Software for Unidirectional Data Transmission in Computer Networks
Published 2023-06-01“…The results of a study of the architecture of hardware and software for unidirectional data transmission in computer networks are presented. The architecture is presented in the form of optical galvanic isolation, media converters and proxy servers, excluding bidirectional data transmission at the hardware level. …”
Get full text
Article -
24
Application of Artificial Intelligence Technology in Computer Network Security Communication
Published 2022-01-01“…In order to cope with the frequent challenges of network security issues, a method of applying artificial intelligence technology to computer network security communication is proposed. First, within the framework of computer network communication, an intelligent protocol reverse analysis method is proposed. …”
Get full text
Article -
25
Application of blockchain in urban rail traffic edge computing network
Published 2021-10-01Subjects: “…blockchain;edge computing network;security protection mechanism;urban rail traffic…”
Get full text
Article -
26
Survey on rail transit mobile edge computing network security
Published 2023-04-01“…The introduction of mobile edge computing (MEC) technology in rail transit which has the characteristics of complex environment, high densities of passengers, and high-speed mobility can meet the low latency, mobility, and massive connection requirements of rail transit.However, MEC not only improves the performance of rail transit communication network but also brings security challenges.Firstly, an overview of rail transit communication network and MEC was given.Then the value of introducing MEC into rail transit and the architecture of rail transit edge computing network were discussed.After that, the security threats faced by rail transit edge computing network was analyzed and protection scheme was proposed.Finally, some open questions were proposed, which was expected to provide ideas for future research.…”
Get full text
Article -
27
Optimization strategies in NOMA-based vehicle edge computing network
Published 2021-03-01“…Nowadays, vehicular network is confronting the challenges to support ubiquitous connections and vast computation-intensive and delay-sensitive smart service for numerous vehicles.To address these issues, non-orthogonal multiple access (NOMA) and mobile edge computing (MEC) are considered as two promising technologies by letting multiple vehicles to share the same wireless resources, and the powerful edge computing resources were adopted at the edge of vehicular wireless access network respectively.A NOMA-based vehicular edge computing network was studied.Under the condition of guaranteeing task processing delay, the joint optimization problem of task offloading, user clustering, computing resource allocation and transmission power control was proposed to minimize the task processing cost.Since the proposed problem was difficult to solve, it was divided into sub-problems, and a low-complexity and easy-to-implement method was proposed to solve it.The simulation results show that compared with other benchmark algorithms, the proposed algorithm performs well in minimizing costs.…”
Get full text
Article -
28
Optimization strategies in NOMA-based vehicle edge computing network
Published 2021-03-01“…Nowadays, vehicular network is confronting the challenges to support ubiquitous connections and vast computation-intensive and delay-sensitive smart service for numerous vehicles.To address these issues, non-orthogonal multiple access (NOMA) and mobile edge computing (MEC) are considered as two promising technologies by letting multiple vehicles to share the same wireless resources, and the powerful edge computing resources were adopted at the edge of vehicular wireless access network respectively.A NOMA-based vehicular edge computing network was studied.Under the condition of guaranteeing task processing delay, the joint optimization problem of task offloading, user clustering, computing resource allocation and transmission power control was proposed to minimize the task processing cost.Since the proposed problem was difficult to solve, it was divided into sub-problems, and a low-complexity and easy-to-implement method was proposed to solve it.The simulation results show that compared with other benchmark algorithms, the proposed algorithm performs well in minimizing costs.…”
Get full text
Article -
29
Text analysis of DNS queries for data exfiltration protection of computer networks
Published 2020-09-01Subjects: Get full text
Article -
30
Juveniles as victims of criminal acts committed under the misuse of computer network
Published 2018-01-01“…A special segment of technological development where such misuses are increasingly present are computer networks. Such fear is further expressed when it comes to juveniles, who, due to the characteristics of this development period, represent easy targets, which often leads to serious and long-term consequences. …”
Get full text
Article -
31
Heterogeneous computing network resource management based on virtual network embedding
Published 2024-10-01Subjects: “…heterogeneous computing network…”
Get full text
Article -
32
MEANS OF IMPROVING THE QUALITY OF SERVICE OF THE COMPUTER NETWORK OF THE FORENSIC INFORMATION SYSTEM
Published 2020-06-01Subjects: “…quality of service (QoS) indicators of computer networks…”
Get full text
Article -
33
Joint Task Offloading and Power Allocation for Satellite Edge Computing Networks
Published 2025-05-01Subjects: Get full text
Article -
34
An Approach to Evaluating Computer Network Security with Intuitionistic Trapezoidal Fuzzy Information
Published 2014-01-01“…We investigate the multiple attribute decision-making problems for evaluating the computer network security with intuitionistic trapezoidal fuzzy information. …”
Get full text
Article -
35
Use of a local computer network in the process of teaching Mathematics at school
Published 2023-09-01Subjects: Get full text
Article -
36
Dynamic computing offloading strategy in LEO constellation edge computing network
Published 2024-07-01“…In satellite edge computing networks, when too many ground users access the satellite through the same channel, the resulting co-channel interference will lead to edge computing performance degradation. …”
Get full text
Article -
37
Analysis of Conti Ransomware Attack on Computer Network with Live Forensic Method
Published 2021-06-01“…The results of this study provide forensic data and virus behavior when running on RAM and computer networks so that the data obtained makes it possible to identify ransomware traffic on the network and deal with zero-day, especially ransomware threats. …”
Get full text
Article -
38
ANALYSIS OF THE MAIN ASPECTS OF THE IMPACT OF DoS-ATTACKS ON COMPUTER NETWORK PERFORMANCE
Published 2013-11-01“…The ways of their realization for attacks of computer networks and possibilities of protection against them have considered.…”
Get full text
Article -
39
Retracted: Application of Artificial Intelligence Technology in Computer Network Security Communication
Published 2023-01-01Get full text
Article -
40
Using The Hybrid GA-Ant Algorithm To Find The Optimal Path In Computer Networks
Published 2022-06-01“…Cost management is one of the performance standards in computer networks and routing strategies through which we can get effective paths in the computer network, reach the target and perform highly in the network by improving the routing table (jumps). …”
Get full text
Article