Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- Prevention 2
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Crime prevention 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Information technology 1
- Internal security 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Social media 1
- Technology 1
-
581
Computation of the Double Metric Dimension in Convex Polytopes
Published 2021-01-01“…Source localization has much importance in order to model many real-world phenomena, for instance, spreading of a virus in a computer network, epidemics in human beings, and rumor spreading on the internet. …”
Get full text
Article -
582
A Virus Propagation Model and Optimal Control Strategy in the Point-to-Group Network to Information Security Investment
Published 2021-01-01“…Epidemiological dynamics is a vital method in studying the spread of computer network viruses. In this paper, an optimal control measure is proposed based on the SEIR virus propagation model in point-to-group information networks. …”
Get full text
Article -
583
Security risk analysis of power 5G hybrid networking
Published 2022-01-01“…5G communication technology provides strong support for the power internet of things, and it also introduces new security challenges in the application process of the power industry.Starting from the analysis of the needs of the power 5G business, five 5G networking deployment and construction plans were proposed, and a comparative analysis of them was conducted in security and cost.And then, a hybrid networking architecture of 5G and power communication networks was proposed, and the 5G network slicing architecture was re-segmented according to business scenarios.Finally, from the four parts of terminal access, edge computing, network channel and core network, the security risks introduced by 5G technology were analyzed in detail.…”
Get full text
Article -
584
KRIVIČNOPRAVNA REAKCIJA NA DEČIJU PORNOGRAFIJU/PORNOGRAFIJU MALOLETNIH LICA - PLASIRANU/NASTALU ZLOUPOTREBOM RAČUNARSKE MREŽE/KOMUNIKACIJE DRUGIM TEHNIČKIM SREDSTVIMA
Published 2022-06-01“… In the article are explained the basic characteristics of the criminal law reaction to child pornography, i.e. pornography of minors/juveniles, especially when it is realised using appropriate so-called high technology, which boils down to the misuse of a computer network or communication by other technical means. …”
Get full text
Article -
585
Computation of Resolvability Parameters for Benzenoid Hammer Graph
Published 2022-01-01“…This idea was delivered in various problems of computer networking as well as in chemical graph theory. …”
Get full text
Article -
586
Inflammatory Acute Response. Biochemical and Cellular Considerations
Published 2015-02-01“…The present work aimed at argumenting on the mechanisms that explain the vascular changes, and the establishment of the signs of the acute inflammatory response with an in-depth molecular level. 18 articles of scientific magazines, 2 books and other sources of information that was accessed by means of the principal managers of the computer network, adding up a total of 20 sources, were consulted. …”
Get full text
Article -
587
Load Balancer Operation Analyses of Video-Conference Service
Published 2022-09-01“…The graphs of the load on the hardware components of the virtual server at three stages of testing for the central processor, RAM, and network interfaces both within the service and in the structure of the local computer network are given. The results of the analysis of graphs are described in order to identify the key features of the operation of the video conferencing service with a load balancer. …”
Get full text
Article -
588
INTERPRETABLE PREDICTIVE MODEL OF NETWORK INTRUSION USING SEVERAL MACHINE LEARNING ALGORITHMS
Published 2022-03-01“…Network intrusion is any unauthorized activity on a computer network. Attacks on the network computer system can be devastating and affect networks and company establishments. …”
Get full text
Article -
589
Heterogeneous resource cooperative game in space-ground computing power network
Published 2023-12-01“…To deal with the resource competition among satellites in the multi-satellite space-ground computing network, a space-ground heterogeneous resource cooperative game mechanism was designed in terms of the computing and spectrum domains.Each satellite published a computing task which was independent of other tasks and relied on UE to generate raw data.By competing the resources of user terminals and UE, the task offloading and processing was achieved.To provide real-time data services, a distributed scheme was proposed based on multi-agent reinforcement learning to coordinate the computing and spectrum resource competition among satellites, thereby minimizing the system latency.Simulation results indicated that, compared with the existing schemes, the proposed algorithm achieves a lower system latency by fully utilizing the computing and spectrum resources and coordinating the resource competition.…”
Get full text
Article -
590
Runtime collaborative scheduling of resources in computing power network oriented to the wide-area distributed intelligent computing environment
Published 2025-05-01“…The key task selection and backfilling, network traffic scheduling of core flow, and adaptive data placement strategies are designed. The usage of computing, network, and storage resources in the computing power network are comprehensively analyzed, and the strategies are collaboratively implemented to optimized the global utilization of resources. …”
Get full text
Article -
591
An improved Chang cryptography scheme
Published 2000-11-01“…Digital signature and fault tolerance are two important issues in modern computer network communication. In most case, they are addressed and implemented separately. …”
Get full text
Article -
592
A logical structure based fault tolerant approach to handle leader election in mobile ad hoc networks
Published 2017-07-01“…Thus, fast and fault tolerant leader election is a major concern and popular area of research in distributed computing networks, in general, and wireless ad hoc networks, in particular. …”
Get full text
Article -
593
Autonomous computing and network convergence:architecture, technologies, and prospects
Published 2023-12-01“…., intent-driven computing network, the autonomous system operation and the adaptive co-evolution of communication, computing intelligence, were summarized from the proposed Auto-CNC.Meanwhile, the reference architecture and key technologies of Auto-CNC were described, which were followed by several preliminary exploration cases.Finally, future research trends and technical advice were discussed and recommended.…”
Get full text
Article -
594
Physiopathological Mechanisms of Association between Metabolic Syndrome and Arterial Hypertension: an Update
Published 2023-02-01“…For this, a total of 29 bibliographic sources were consulted, including articles from scientific journals, 3 books and others accessed through the main managers of the computer network. Hypertension and dyslipidemia often occur together and also accompany resistance to insulin-stimulated glucose uptake; factors that often accompany obesity. …”
Get full text
Article -
595
Research on intelligent modeling and policy making of CNC brain
Published 2023-08-01“…As a future-oriented new network architecture, the core idea of computing and network convergence is to manage cloud-edge-end computing network resources in a centralized or distributed way by centering on the deep integration of computing force and network resources, so as to provide computing service for users’ needs.Although the CNC has made some progress in standard setting and industrial promotion, the overall development still faces many challenges, and there are still many scientific and engineering problems to be broken through.Research on CNC and its brain was carried out, the latest progress in related fields in the industry was analyzed, and the idea of building intelligent CNC brain was put forward, hoping to throw a brick at the table, jointly promote the implementation of AI in CNC, and truly realize intelligent CNC.…”
Get full text
Article -
596
Advancing Global Resilience through Open Data Resources and Services in Disaster Risk Reduction
Published 2024-11-01Get full text
Article -
597
Probabilistic models for evaluating network edge's resistance against scan and foothold attack
Published 2024-12-01“…Abstract The threat of Scan and Foothold Attack to the Network Edge (SFANE) is increasing, which greatly affects the application and development of edge computing network architecture. However, existing works focus on the implementation of specific technologies that resist the SFANE but ignore the effectiveness analysis of them. …”
Get full text
Article -
598
Monophasic and biphasic neurodynamics of bi-S-type locally active memristor
Published 2025-05-01“…Hardware emulation validates neurodynamics under varying stimuli from theoretical analyses, offering a unit module and theoretical reference for energy-efficient neuromorphic computing network.…”
Get full text
Article -
599
5G industry wireless private network technology and business requirement model
Published 2021-08-01“…5G industry wireless private network has become one of the most important services for operators enabling the vertical industry.The gradual maturity of virtualization, multi-access edge computing, network slicing and other technologies have provided a key technical guarantee for the development of 5G industry wireless private network.The development status, key technology, requirement model, challenges and development recommendations of 5G industry wireless private network were introduced.The concept and classification of 5G industry wireless private network were introduced, the key technologies were generalized, and the design ideas and the main reference index were put forward aiming at business requirement.Finally, the challenges faced by operators when developing 5G wireless private network services were summarized and development suggestions were given.…”
Get full text
Article -
600
METHOD FOR THE DIAGNOSTICS OF SYNCHRONIZATION DISTURBANCES IN THE TELECOMMUNICATIONS NETWORK OF A CRITICAL USED COMPUTER SYSTEM
Published 2020-03-01“…The analysis and classification of the causes of computer network synchronization failure of a critical application computer system is carried out. …”
Get full text
Article