Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- Prevention 2
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Crime prevention 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Information technology 1
- Internal security 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Social media 1
- Technology 1
-
441
The Process of Creating a Digital Communication Model for the Vatican
Published 2021-03-01“…This model was first based on the capabilities of computer networks and then on the Internet. It was first tested by the Holy See in Latin America. …”
Get full text
Article -
442
-
443
A fluid flow model for the software defined wide area networks analysis
Published 2025-01-01“…Enhancing Quality of Service (QoS) in computer networks by focusing on bandwidth and communication delay is critical. …”
Get full text
Article -
444
Mentality and symbolic nature of culture
Published 2023-03-01“…An attempt has been made to study the mentality in the transition to the coming information civilization with a network structure for organizing communications based on global computer networks. Trends in the field of cultural research associated with the emergence of such phenomena as information and intellectual culture, mosaic mass culture, elite culture, culture of virtual reality and identifying their relationship, interpenetration and interaction with folk spiritual culture have been denoted. …”
Get full text
Article -
445
PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing
Published 2021-05-01Get full text
Article -
446
Distance Measurements Related to Cartesian Product of Cycles
Published 2020-01-01“…Making the graph of computer networks and analyzing it with aid of graph theory are extensively studied and researched in the literature. …”
Get full text
Article -
447
Comparison of Personal Data Protection Laws Using Narrative Policy Framework Between Indonesia, Malaysia, and Japan
Published 2022-12-01“…The era of information and communication technology continues to grow and shows a significant increase. is a type of offensive maneuver used by a state, individual, group, or organization that targets computer information systems, infrastructure, computer networks, and or personal computer devices using malicious acts which usually originate from anonymous sources who steal, modify or destroy the specified target by hacking a vulnerable system. …”
Get full text
Article -
448
The Problem of Shaping the Capacity of Sovereign Powers of a State in the Digital Age
Published 2020-08-01“…The global architecture of computer networks poses a security dilemma: while modern information and communication technologies allow adversaries to challenge the exclusive power of states over “his own” cyberspace, following traditional notions of sovereignty, respectively, may limit the ability of states to actively counter challenges and threats in global networks. …”
Get full text
Article -
449
Performance Evaluation of Neighbors-Based Learning Methods for Network Intrusion Detection System
Published 2025-05-01“… The rapid advancement of computer networks offers substantial benefits but also introduces growing cybersecurity risks. …”
Get full text
Article -
450
Whole Slide Images and Digital Media in Pathology Education, Testing, and Practice: The Oklahoma Experience
Published 2012-01-01“…Until the introduction of digitized whole slide images that could be accessed through computer networks, the sharing of pathology slides was a major logistic issue in pathology education and practice. …”
Get full text
Article -
451
Visual Web-Oriented Environment of Dynamic Control of Data Flow in Campus of Software Defined Networks
Published 2019-03-01“…Nowadays new innovative approaches based on the technology of software defined networks (SDN) are gaining popularity in the field of computer networks (CN). SDN provide a flexible approach to the processing and control of data flows in CN by separating the control plane and data plane, as well as centralizing the representation of the entire network. …”
Get full text
Article -
452
-
453
A method of forming a self-similar flow with a given Hurst parameter for network traffic modeling
Published 2024-12-01“…The procedure can be used to describe traffic when constructing a simulation model of computer network functioning.…”
Get full text
Article -
454
Ensuring Legal Safeguards for Digitalized Social Services within the Framework of Government Decentralization
Published 2023-12-01“…The author reveals the essence of "Portal Diia", which is introduced within the framework of the Unified Social Information System of a single electronic document in the social matters, and highlighted the disadvantage of this application: ensuring the protection of personal data, and access to information about the citizen sphere of interests accumulated in computer networks.…”
Get full text
Article -
455
IMPROVING INTRUSION DETECTION USING TREE ADJOINING GRAMMAR GUIDED GENETIC PROGRAMMING
Published 2017-09-01“…Nowadays, the problem of network security has become urgent and affect the performance of modern computer networks greatly. Detection and prevention of network attacks have been the main topic of many researchers in the World. …”
Get full text
Article -
456
Analysis of anomalous behaviour in network systems using deep reinforcement learning with convolutional neural network architecture
Published 2024-12-01“…The increasing importance of computer networks in daily life is a result of our growing dependence on them. …”
Get full text
Article -
457
-
458
-
459
Design Principles for Reinforcement Learning in Congestion Control Environments
Published 2025-01-01“…Recent years have seen growth in interest in applying RL to managing Congestion Control (CC) in computer networks, with the goal of handling diverse kinds of traffic that may be challenging for human-designed algorithms. …”
Get full text
Article -
460
Parallel Communicating Finite Automata: Productiveness and Succinctness
Published 2025-04-01“…This model is relevant for studying complex systems such as computer networks and multi-agent environments. In this paper, we explore two key aspects of PCFA: their undecidability and their descriptional complexity. …”
Get full text
Article