Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- Prevention 2
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Crime prevention 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Information technology 1
- Internal security 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Social media 1
- Technology 1
-
481
Networked microcontrollers for accessible, distributed spatial audio
Published 2024-11-01“…Building on the research of the past few decades in the transmission of audio data over computer networks, and the emergence in recent years of increasingly capable, low-cost microcontroller-based development platforms with support for both networking and audio functionality, we present a prototype decentralised, modular alternative. …”
Get full text
Article -
482
-
483
-
484
Proposed Framework for Official Document Sharing and Verification in E-government Environment Based on Blockchain Technology
Published 2022-12-01“… Progression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. …”
Get full text
Article -
485
AI-Based Load Balancing Using Decision Tree Regressor for Parallel Matrix Computation in Cloud Environments
Published 2025-08-01Get full text
Article -
486
Statistical Study of the Impact of Digitalization of Organizations on Lending Activity: Regional Level
Published 2024-05-01“…Russian regions are characterized by uneven levels of Internet adoption, as well as organizations applying computer networks, servers and electronic documentation systems. …”
Get full text
Article -
487
-
488
Detecting malicious code variants using convolutional neural network (CNN) with transfer learning
Published 2025-04-01“…Malware presents a significant threat to computer networks and devices that lack robust defense mechanisms, despite the widespread use of anti-malware solutions. …”
Get full text
Article -
489
Optimizing Industrial IoT Data Security Through Blockchain-Enabled Incentive-Driven Game Theoretic Approach for Data Sharing
Published 2024-01-01“…Connecting smart industrial components to computer networks revolutionizes business operations. However, in the Industrial Internet of Things (IIoT), the sharing of data has bandwidth, computational, and privacy issues. …”
Get full text
Article -
490
Application of Quantum Recurrent Neural Network in Low-Resource Language Text Classification
Published 2024-01-01Get full text
Article -
491
Reverse Engineering Segment Routing Policies and Link Costs With Inverse Reinforcement Learning and EM
Published 2025-01-01“…Network routing is a core functionality in computer networks that holds significant potential for integrating newly developed techniques with minimal software effort through the use of Software-Defined Networking (SDN). …”
Get full text
Article -
492
Self-Supervised Learning Meets Custom Autoencoder Classifier: A Semi-Supervised Approach for Encrypted Traffic Anomaly Detection
Published 2025-01-01“…The widespread adoption of encryption in computer networks has made detecting malicious traffic, especially at network perimeters, increasingly challenging. …”
Get full text
Article -
493
Handover decision with multi-access edge computing in 6G networks: A survey
Published 2025-03-01Get full text
Article -
494
BAFL-SVM: A blockchain-assisted federated learning-driven SVM framework for smart agriculture
Published 2025-03-01Get full text
Article -
495
ETYMOLOGICAL ANALYSIS OF ENGLISH CYBERSECURITY TERMINOLOGY
Published 2024-11-01“…The article aims at conducting etymological analysis of the English terminology of cybersecurity which has become topical under the conditions of a full-scale invasion into Ukraine and a growing cyberthreat to computer networks and applications all over the world. …”
Get full text
Article -
496
Analytical Evaluation of the WebSocket and WebTransport Protocols for the Class of SCADA Systems Operating Within the Intranet
Published 2024-11-01“…The approach given in the paper on collecting network traffic and analyzing time characteristics will also be useful as part of the educational process for teaching students in the courses “Computer Networks” and “Internet Technologies”.…”
Get full text
Article -
497
-
498
Speaker Identification and Verification Using Convolutional Neural Network CNN
Published 2025-05-01Get full text
Article -
499
-
500
Adversarial Hierarchical-Aware Edge Attention Learning Method for Network Intrusion Detection
Published 2025-07-01“…It leverages the natural graph structure of computer networks to achieve robust, multi-grained intrusion detection. …”
Get full text
Article