Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- Prevention 2
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Crime prevention 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Information technology 1
- Internal security 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Social media 1
- Technology 1
-
381
LCRAnnotationsDB: a database of low complexity regions functional and structural annotations
Published 2024-12-01Get full text
Article -
382
-
383
IMCP: A Python package for imbalanced and multiclass data classifier performance comparison
Published 2024-12-01Get full text
Article -
384
Design of Anomaly Based Intrusion Detection System Using Support Vector Machine and Grasshopper Optimization Algorithm in IoT
Published 2024-02-01“…Computer networks play an important and practical role in communication and data exchange, and they also share resources with complete ease. …”
Get full text
Article -
385
The power of eLearning from promises to practices applied in engineering
Published 2023-04-01“…The latter have jointly contributed to the considerable progress of the renewed curricula development and implementation, including the hybrid learning model for a number of key courses such as mathematics, science, computer networks, programming and ICT. Sectoral digitalization is implemented due to the digitalization strategies and initiatives. …”
Get full text
Article -
386
Intelligent voice assistant as an example of inclusive design methodology implementation
Published 2024-03-01“…The use of a voice assistant by students of the Institute of Mathematics and Computer Science of the University of Tyumen in the process of studying the course “Computer Networks” demonstrated the relevance of developing similar question-answering systems to accompany the independent work of students, including those with visual impairments in online and blended learning. …”
Get full text
Article -
387
-
388
-
389
Decoding Phishing Evasion: Analyzing Attacker Strategies to Circumvent Detection Systems
Published 2025-01-01Get full text
Article -
390
NEWS CONTENT UNDER DIGITAL GLOBALIZATION
Published 2022-05-01“…The article deals with the issue of circulating illegal news content in the global computer networks through social networks and the related new ways for manipulating public opinion.…”
Get full text
Article -
391
A novel approach based on XGBoost classifier and Bayesian optimization for credit card fraud detection
Published 2025-12-01Get full text
Article -
392
-
393
A Comparative Evaluation of Machine Learning Methods for Predicting Student Outcomes in Coding Courses
Published 2025-06-01Get full text
Article -
394
Generative Modeling for Imbalanced Credit Card Fraud Transaction Detection
Published 2025-03-01Get full text
Article -
395
Computational Resources and Infrastructures for a Novel Bioinformatics Laboratory: A Case Study
Published 2025-07-01“…This involved the preparation of rooms, computer networks, computational resources novel designs, and upgrades to existing designs. …”
Get full text
Article -
396
A Comprehensive Review and Analysis of Blockchain-Based Security Solutions for Cloud Computing Ecosystems
Published 2025-05-01Get full text
Article -
397
OUT-SOURCING PROJECT STRATEGIC JUSTIFICATION TOOLS AND METHODS FOR UP-TO-DATE COMPANY MANAGEMENT SYSTEMS
Published 2016-12-01“…The term out-sourcing signifies signing an agreement with some external organization on performing certain management functions (accounting, communication, computer networks, etc.). Out-sourcing is an important instrument of company restructuring by improving its management system. …”
Get full text
Article -
398
PATTERN RECOGNITION METHODS FOR BUILDING A NETWORK DIAGNOSTIC SYSTEM
Published 2016-09-01“…A generic method for computer networks diagnosis is proposed, which is based on thetheory of pattern recognition. …”
Get full text
Article -
399
Set Domination in Fuzzy Graphs Using Strong Arcs
Published 2022-08-01“…Set domination in fuzzy graphs is very useful for solving traffic problems during communication in computer networks and travelling networks. In this article, the concept of set domination in fuzzy graphs using strong arcs is introduced. …”
Get full text
Article -
400