Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- Prevention 2
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Crime prevention 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Information technology 1
- Internal security 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Social media 1
- Technology 1
-
401
-
402
A Generalized and Robust Nonlinear Approach based on Machine Learning for Intrusion Detection
Published 2024-12-01“…NLC provides generalized and robust solutions to detect intrusion attacks, ensuring the integrity and security of computer networks.…”
Get full text
Article -
403
WHAT WILL THE FUTURE SOCIETY BE LIKE?
Published 2019-02-01“…The article characterizes the forming network society defined by computer networks. Its essence and structural principles are specified, and the features of network culture are studied. …”
Get full text
Article -
404
Research of authentication techniques for the Internet of things
Published 2020-07-01“…Identity authentication technology is a key technology in the Internet of things (IoT)security field which ensures the authenticity of the identity information of users and device nodes connected to the IoT.Due to the low cost,low power consumption,small storage of IoT devices and heterogeneity of IoT network,the identity authentication mechanisms in traditional computer networks are often not applicable.Firstly,the development process of IoT was introduced,the security risks of IoT and the challenges faced by the authentication work were analyzed.Then the emphasis was put on comparison of the advantages and disadvantages among five typical authentication protocols.Moreover,the authentication technologies in several practical scenarios of RFID,smart grid,Internet of vehicles,and smart home were summarized and analyzed.Finally,the future research direction was discussed.…”
Get full text
Article -
405
Detour Polynomials of Generalized Vertex Identified of Graphs
Published 2023-04-01“… The Detour distance is one of the most common distance types used in chemistry and computer networks today. Therefore, in this paper, the detour polynomials and detour indices of vertices identified of n-graphs which are connected to themselves and separated from each other with respect to the vertices for n≥3 will be obtained. …”
Get full text
Article -
406
Looking to the future of depression: instant diagnosis and medication-free treatment
Published 2019-10-01“…In January 2016, with combined backgrounds in clinical psychology, computer networks, computational neuroscience and electrical engineering, they launched Flow. …”
Get full text
Article -
407
A Formal Model and Verification Problems for Software Defined Networks
Published 2013-12-01“…Software-defined networking (SDN) is an approach to building computer networks that separate and abstract data planes and control planes of these systems. …”
Get full text
Article -
408
ANALYSIS OF THE STARTING LEVEL OF COMPUTER DEPENDENCE OF STUDENTS
Published 2022-02-01“…Almost every educational institution or organization is equipped with a computer and computer networks. The active introduction of computer technology in everyday life, ofcourse, leaves a certain imprint on the formation and development of personal qualities. …”
Get full text
Article -
409
Modeling and analysis of performance reliability for communication networks based on traffic dynamics
Published 2011-01-01“…To investigate the impact of the amount and change of traffic loads on the performance reliability of network,a simple traffic model for computer networks was established based on the traffic dynamics.The ratio between the ex-pected and the practical delay and the packet loss rate of each demand were used to characterize the performance reliabil-ity of the network.The performance reliability of a special local network was simulated and analyzed using the proposed approach.It was shown that the performance reliability of the network exhibited an obvious phase transition,no matter whether traffic loads were the Poisson traffic model or the Burstiness Constraints traffic model.In addition,the value of transition point can be considered as a measurement of network communication capability under special performance constraints.…”
Get full text
Article -
410
Chemical Applicability of Newly Introduced Topological Invariants and Their Relation with Polycyclic Compounds
Published 2022-01-01“…In quantitative structure-property and structure-activity relationships studies, several graph invariants, namely, topological indices have been defined and studied due to their numerous applications in computer networks, biotechnology, and nanochemistry. Topological indices are numeric parameters that describe the biological, physical, and chemical properties depending on the structure and topology of different chemical compounds. …”
Get full text
Article -
411
Intelligent Prevention of DDoS Attacks using Reinforcement Learning and Smart Contracts
Published 2024-05-01“…(Distributed) Denial-of-Service (DoS/DDoS) attacks are among the most dangerous cybersecurity threats to computer networks. Lately, blockchain and artificial intelligence (AI) cyberdefense applications have successfully been implemented to identify attack patterns. …”
Get full text
Article -
412
Wiener and Hyper-Wiener Indices of Polygonal Cylinder and Torus
Published 2021-01-01“…Our suggested mathematical structures could be of potential interests in representation of computer networks and enhancing lattice hardware security.…”
Get full text
Article -
413
Synchronization in PLL Networks: Numerical Simulations Using Julia
Published 2024-01-01“…Clock distribution systems are used in many applications requiring accurate time basis: integrated circuits, computer networks, satellite communications, and Global Position System (GPS). …”
Get full text
Article -
414
Extending Stochastic Network Calculus to Loss Analysis
Published 2013-01-01“…Though stochastic network calculus is a very useful tool for performance evaluation of computer networks, existing studies on stochastic service guarantees mainly focused on the delay and backlog. …”
Get full text
Article -
415
Pengembangan Media Pembelajaran Berbasis Hypertext pada Komunikasi Data dan Jaringan Komputer Berorientasi Konsep Subak
Published 2015-04-01“… This study aimed to develop a hypertext-based learning media for data com- munication and computer networks in Subak concept oriented. The method used an R & D to design development Dick & Carey model of the modi ed software with a special method Software Development Life Cycle. …”
Get full text
Article -
416
Metric Dimension of Line Graphs of Bakelite and Subdivided Bakelite Network
Published 2023-01-01“…Graph theory is employed in forming the structures of different chemical networks, locating robots on a network, and troubleshooting computer networks. Additionally, it finds applications in scheduling airplanes and studying diffusion mechanisms. …”
Get full text
Article -
417
Sun Toughness Conditions for P2 and P3 Factor Uniform and Factor Critical Avoidable Graphs
Published 2021-01-01“…On this basis, considering the particularity of the sun component structures, sun toughness was introduced in mathematics and applied to computer networks. From the perspective of modern graph theory, this paper presents the sun toughness conditions of the path factor uniform graph and the path factor critical avoidable graph in P≥2-factor and P≥3-factor settings. …”
Get full text
Article -
418
Anomaly-based Network Intrusion Detection System using Deep Intelligent Technique
Published 2023-09-01“…Traditional signature-based intrusion detection systems and security solutions by matching rule-based mechanism and prior knowledge are insufficient of fully protecting computer networks against novel attacks. For this purpose, Anomaly-based Network Intrusion Detection System (A-NIDS) as cyber security tool is considered for identifying and detecting anomalous behavior in the flow-based network traffic alongside with firewalls and other security measures.The main objective of the research is to improve the detection rate and reduce false-positive rates of the classifier using anomaly-based technique.…”
Get full text
Article -
419
On the optimal layout of (K p − C p ) n into grid and certain structures
Published 2025-05-01“…The process of constructing layouts on a board using the necessary modules determines the manufacturing cost in computer networks, where knowledge of graph embedding serves as an integral tool. …”
Get full text
Article -
420
CESNET-TimeSeries24: Time Series Dataset for Network Traffic Anomaly Detection and Forecasting
Published 2025-02-01“…Abstract Anomaly detection in network traffic is crucial for maintaining the security of computer networks and identifying malicious activities. …”
Get full text
Article