Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- Prevention 2
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Crime prevention 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Information technology 1
- Internal security 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Social media 1
- Technology 1
-
461
Aplikasi Pemodelan 3 Dimensi Router Mikrotik RB433AH. RB450, RB800, RB951G-2HnD dan Haplite Berbasis Augmented Reality dan Firebase
Published 2023-02-01“…This RB433AH Router Board and RB951g-2HnD are used by Kediri Polytechnic students as learning media for subjects related to Computer Networks, while RB450, RB800 and hAP lite are used for Access Points. …”
Get full text
Article -
462
Quality of Experience Aware Service Selection Model to Empower Edge Computing in IoT
Published 2025-01-01Get full text
Article -
463
Machine Learning Techniques for Enhanced Intrusion Detection in IoT Security
Published 2025-01-01“…Network Intrusion Detection Systems (NIDSs) are fundamental to safeguarding computer networks. Intrusion detection systems must become more effective as new attacks are developed and networks grow. …”
Get full text
Article -
464
Highly accurate anomaly based intrusion detection through integration of the local outlier factor and convolutional neural network
Published 2025-07-01“…Abstract Intrusion detection systems (IDS) are critical for safeguarding computer networks by identifying malicious activities. …”
Get full text
Article -
465
Law Enforcement of Cybercrime: Tracking Digital Footprints of Cross-Border Hackers
Published 2025-06-01“…As a case study to show how cyber criminals commit cyber crimes by using computer networks, investigators still face difficulties in conducting searches and seizures to obtain evidence. …”
Get full text
Article -
466
A Combined Approach Of Adasyn And Tomeklink For Anomaly Network Intrusion Detection System Using Some Selected Machine Learning Algorithms
Published 2024-09-01“…Securing computer networks against malicious attacks requires an efficient Network Intrusion Detection System (IDS). …”
Get full text
Article -
467
Milling Chatter Control in Low Immersion Condition with an Active Electromagnetic Tool Holder System
Published 2025-02-01Get full text
Article -
468
Symmetric Block Algorithm WBC1 and Analysis of Its Implementation Complexity
Published 2025-03-01“…Introduction. Nowadays, computer networks are gaining more and more importance for information exchange. …”
Get full text
Article -
469
Event-driven bi-fidelity control for efficient and reliable robotic manipulation
Published 2025-06-01Get full text
Article -
470
Image Watermarking Using All Phase Discrete Cosine Biorthogonal Transform in Selected Pixel Blocks
Published 2020-06-01Get full text
Article -
471
Deep Learning-Based Signal Constellation for OFDM Underwater Acoustic Communications
Published 2025-05-01Get full text
Article -
472
Management of Active Records in Referral Hospitals: A Case Study of Kisoro Hospital.
Published 2024“…In conclusion, therefore, the storage types of equipment being used records department should be upgraded and computer networks are required for the smooth running of daily activities. …”
Get full text
Thesis -
473
Cyber-Physical System and 3D Visualization for a SCADA-Based Drinking Water Supply: A Case Study in the Lerma Basin, Mexico City
Published 2025-07-01“…SCADA systems have evolved along with computing technology, from their beginnings with low-performance computers, monochrome monitors and communication networks with a range of a few hundred meters, to high-performance systems with advanced 3D graphics and wired and wireless computer networks. This article presents a methodology for the design of a SCADA system with a 3D Visualization for Drinking Water Supply, and its implementation in the Lerma Basin System of Mexico City as a case study. …”
Get full text
Article -
474
A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis
Published 2024-01-01“…Intrusion detection (ID) is critical in securing computer networks against various malicious attacks. Recent advancements in machine learning (ML), deep learning (DL), federated learning (FL), and explainable artificial intelligence (XAI) have drawn significant attention as potential approaches for ID. …”
Get full text
Article -
475
Development of technology for controlling access to digital portals and platforms based on estimates of user reaction time built into the interface
Published 2020-12-01“…In distributed digital platforms and portals using personal data, big data is collected and processed using specialized applications using computer networks. In accordance with the law, the data is stored on internal corporate servers and data centers. …”
Get full text
Article -
476
Investigating the Metric and Fault-Tolerant Dimensions in Para-Line Network Topologies
Published 2025-04-01“…The resolving set (RS) and metric dimension (MD) are critical concepts used in various fields such as computer networks, robot navigation, chemical structures, communication networks, transportation, and electric circuits. …”
Get full text
Article -
477
Application of a novel metaheuristic algorithm inspired by connected banking system in truss size and layout optimum design problems and optimization problems
Published 2024-11-01“…However, among these various proposed metaheuristics, it is very seldom to face and find a method that is based on technologies such as computer networks. This paper aims to utilize a metaheuristic algorithm which is based on some principals of connected banking systems, which is called the Connected Banking System Optimizer(CBSO) algorithm. …”
Get full text
Article -
478
A phishing attack awareness framework for a South African University of Technology
Published 2025-07-01“…This creates significant risks for university end-users who depend on computer networks, underscoring the critical need for enhanced phishing awareness. …”
Get full text
Article -
479
-
480
An Ultrashort-Term Wind Power Prediction Method Based on a Switching Output Mechanism
Published 2023-01-01Get full text
Article