Search alternatives:
networks » network (Expand Search)
Showing 481 - 500 results of 740 for search '"Computer Networks"', query time: 0.12s Refine Results
  1. 481

    Networked microcontrollers for accessible, distributed spatial audio by Thomas Albert Rushton, Romain Michon, Stefania Serafin, Tanguy Risset, Stéphane Letz

    Published 2024-11-01
    “…Building on the research of the past few decades in the transmission of audio data over computer networks, and the emergence in recent years of increasingly capable, low-cost microcontroller-based development platforms with support for both networking and audio functionality, we present a prototype decentralised, modular alternative. …”
    Get full text
    Article
  2. 482
  3. 483
  4. 484

    Proposed Framework for Official Document Sharing and Verification in E-government Environment Based on Blockchain Technology by Rana F. Ghani, Asia Ali Salman Al-Karkhi, Shakir Mahmood Mahdi

    Published 2022-12-01
    “… Progression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. …”
    Get full text
    Article
  5. 485
  6. 486

    Statistical Study of the Impact of Digitalization of Organizations on Lending Activity: Regional Level by I. K. Zarov

    Published 2024-05-01
    “…Russian regions are characterized by uneven levels of Internet adoption, as well as organizations applying computer networks, servers and electronic documentation systems. …”
    Get full text
    Article
  7. 487
  8. 488

    Detecting malicious code variants using convolutional neural network (CNN) with transfer learning by Nazish Younas, Shazia Riaz, Saqib Ali, Rafiullah Khan, Farman Ali, Daehan Kwak

    Published 2025-04-01
    “…Malware presents a significant threat to computer networks and devices that lack robust defense mechanisms, despite the widespread use of anti-malware solutions. …”
    Get full text
    Article
  9. 489

    Optimizing Industrial IoT Data Security Through Blockchain-Enabled Incentive-Driven Game Theoretic Approach for Data Sharing by Muhammad Noman Sohail, Adeel Anjum, Iftikhar Ahmed Saeed, Madiha Haider Syed, Axel Jantsch, Semeen Rehman

    Published 2024-01-01
    “…Connecting smart industrial components to computer networks revolutionizes business operations. However, in the Industrial Internet of Things (IIoT), the sharing of data has bandwidth, computational, and privacy issues. …”
    Get full text
    Article
  10. 490
  11. 491

    Reverse Engineering Segment Routing Policies and Link Costs With Inverse Reinforcement Learning and EM by Kai Wang, Chee Wei Tan

    Published 2025-01-01
    “…Network routing is a core functionality in computer networks that holds significant potential for integrating newly developed techniques with minimal software effort through the use of Software-Defined Networking (SDN). …”
    Get full text
    Article
  12. 492

    Self-Supervised Learning Meets Custom Autoencoder Classifier: A Semi-Supervised Approach for Encrypted Traffic Anomaly Detection by A. Ramzi Bahlali, Abdelmalik Bachir, Abdeldjalil Labed

    Published 2025-01-01
    “…The widespread adoption of encryption in computer networks has made detecting malicious traffic, especially at network perimeters, increasingly challenging. …”
    Get full text
    Article
  13. 493
  14. 494
  15. 495

    ETYMOLOGICAL ANALYSIS OF ENGLISH CYBERSECURITY TERMINOLOGY by Vladyslav Zhovtiak

    Published 2024-11-01
    “…The article aims at conducting etymological analysis of the English terminology of cybersecurity which has become topical under the conditions of a full-scale invasion into Ukraine and a growing cyberthreat to computer networks and applications all over the world. …”
    Get full text
    Article
  16. 496

    Analytical Evaluation of the WebSocket and WebTransport Protocols for the Class of SCADA Systems Operating Within the Intranet by G. A. Zvonareva, A. S. Smirnov

    Published 2024-11-01
    “…The approach given in the paper on collecting network traffic and analyzing time characteristics will also be useful as part of the educational process for teaching students in the courses “Computer Networks” and “Internet Technologies”.…”
    Get full text
    Article
  17. 497
  18. 498
  19. 499
  20. 500

    Adversarial Hierarchical-Aware Edge Attention Learning Method for Network Intrusion Detection by Hao Yan, Jianming Li, Lei Du, Binxing Fang, Yan Jia, Zhaoquan Gu

    Published 2025-07-01
    “…It leverages the natural graph structure of computer networks to achieve robust, multi-grained intrusion detection. …”
    Get full text
    Article