Search alternatives:
networks » network (Expand Search)
Showing 461 - 480 results of 740 for search '"Computer Networks"', query time: 0.13s Refine Results
  1. 461

    Aplikasi Pemodelan 3 Dimensi Router Mikrotik RB433AH. RB450, RB800, RB951G-2HnD dan Haplite Berbasis Augmented Reality dan Firebase by Yohanes Kurniahu

    Published 2023-02-01
    “…This RB433AH Router Board and RB951g-2HnD are used by Kediri Polytechnic students as learning media for subjects related to Computer Networks, while RB450, RB800 and hAP lite are used for Access Points. …”
    Get full text
    Article
  2. 462
  3. 463

    Machine Learning Techniques for Enhanced Intrusion Detection in IoT Security by Hanadi Hakami, Muhammad Faheem, Majid Bashir Ahmad

    Published 2025-01-01
    “…Network Intrusion Detection Systems (NIDSs) are fundamental to safeguarding computer networks. Intrusion detection systems must become more effective as new attacks are developed and networks grow. …”
    Get full text
    Article
  4. 464

    Highly accurate anomaly based intrusion detection through integration of the local outlier factor and convolutional neural network by Rahimullah Rabih, Hamed Vahdat-Nejad, Wathiq Mansoor, Javad Hassannataj Joloudari

    Published 2025-07-01
    “…Abstract Intrusion detection systems (IDS) are critical for safeguarding computer networks by identifying malicious activities. …”
    Get full text
    Article
  5. 465

    Law Enforcement of Cybercrime: Tracking Digital Footprints of Cross-Border Hackers by Idham Qrida Nusa, Bambang Sugiri, Yuliati Yuliati, Faizin Sulistio

    Published 2025-06-01
    “…As a case study to show how cyber criminals commit cyber crimes by using computer networks, investigators still face difficulties in conducting searches and seizures to obtain evidence. …”
    Get full text
    Article
  6. 466

    A Combined Approach Of Adasyn And Tomeklink For Anomaly Network Intrusion Detection System Using Some Selected Machine Learning Algorithms by Nasiru Ige Salihu, Muhammed Nazeer Musa, Awujola J. Olalekan

    Published 2024-09-01
    “…Securing computer networks against malicious attacks requires an efficient Network Intrusion Detection System (IDS). …”
    Get full text
    Article
  7. 467
  8. 468

    Symmetric Block Algorithm WBC1 and Analysis of Its Implementation Complexity by Igor Baranov

    Published 2025-03-01
    “…Introduction. Nowadays, computer networks are gaining more and more importance for information exchange. …”
    Get full text
    Article
  9. 469
  10. 470
  11. 471
  12. 472

    Management of Active Records in Referral Hospitals: A Case Study of Kisoro Hospital. by Hashakimana, Obed

    Published 2024
    “…In conclusion, therefore, the storage types of equipment being used records department should be upgraded and computer networks are required for the smooth running of daily activities. …”
    Get full text
    Thesis
  13. 473

    Cyber-Physical System and 3D Visualization for a SCADA-Based Drinking Water Supply: A Case Study in the Lerma Basin, Mexico City by Gabriel Sepúlveda-Cervantes, Eduardo Vega-Alvarado, Edgar Alfredo Portilla-Flores, Eduardo Vivanco-Rodríguez

    Published 2025-07-01
    “…SCADA systems have evolved along with computing technology, from their beginnings with low-performance computers, monochrome monitors and communication networks with a range of a few hundred meters, to high-performance systems with advanced 3D graphics and wired and wireless computer networks. This article presents a methodology for the design of a SCADA system with a 3D Visualization for Drinking Water Supply, and its implementation in the Lerma Basin System of Mexico City as a case study. …”
    Get full text
    Article
  14. 474

    A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis by Salman Muneer, Umer Farooq, Atifa Athar, Muhammad Ahsan Raza, Taher M. Ghazal, Shadman Sakib

    Published 2024-01-01
    “…Intrusion detection (ID) is critical in securing computer networks against various malicious attacks. Recent advancements in machine learning (ML), deep learning (DL), federated learning (FL), and explainable artificial intelligence (XAI) have drawn significant attention as potential approaches for ID. …”
    Get full text
    Article
  15. 475

    Development of technology for controlling access to digital portals and platforms based on estimates of user reaction time built into the interface by S. G. Magomedov, P. V. Kolyasnikov, E. V. Nikulchev

    Published 2020-12-01
    “…In distributed digital platforms and portals using personal data, big data is collected and processed using specialized applications using computer networks. In accordance with the law, the data is stored on internal corporate servers and data centers. …”
    Get full text
    Article
  16. 476

    Investigating the Metric and Fault-Tolerant Dimensions in Para-Line Network Topologies by M. Faheem, M. Ahmad, Z. Zahid, Njood. S. E. ALmutire, Hamiden Abd El-Wahed Khalifa, Taha Radwan

    Published 2025-04-01
    “…The resolving set (RS) and metric dimension (MD) are critical concepts used in various fields such as computer networks, robot navigation, chemical structures, communication networks, transportation, and electric circuits. …”
    Get full text
    Article
  17. 477

    Application of a novel metaheuristic algorithm inspired by connected banking system in truss size and layout optimum design problems and optimization problems by Mehrdad Nemati, Yousef Zandi, Jamshid Sabouri

    Published 2024-11-01
    “…However, among these various proposed metaheuristics, it is very seldom to face and find a method that is based on technologies such as computer networks. This paper aims to utilize a metaheuristic algorithm which is based on some principals of connected banking systems, which is called the Connected Banking System Optimizer(CBSO) algorithm. …”
    Get full text
    Article
  18. 478

    A phishing attack awareness framework for a South African University of Technology by Japhet M. Kayomb, Errol R. Francke, Tabisa Ncubukezi

    Published 2025-07-01
    “…This creates significant risks for university end-users who depend on computer networks, underscoring the critical need for enhanced phishing awareness. …”
    Get full text
    Article
  19. 479
  20. 480