Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- Prevention 2
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Crime prevention 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Information technology 1
- Internal security 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Social media 1
- Technology 1
-
721
Reliable Event Detection via Multiple Edge Computing on Streaming Traffic Social Data
Published 2025-01-01Get full text
Article -
722
Reconsidering big data security and privacy in cloud and mobile cloud systems
Published 2021-09-01Get full text
Article -
723
Adaptive Anomaly Detection Framework Model Objects in Cyberspace
Published 2020-01-01“…Taking into consideration the fact that e-banking, e-commerce, and business data will be shared on the computer network, these data may face a threat from intrusion. …”
Get full text
Article -
724
-
725
-
726
-
727
-
728
Serum Uric Acid Increases Risk of Cancer Incidence and Mortality: A Systematic Review and Meta-Analysis
Published 2015-01-01Get full text
Article -
729
A New Encryption Algorithm Utilizing DNA Subsequence Operations for Color Images
Published 2024-11-01“…The computer network has fundamentally transformed modern interactions, enabling the effortless transmission of multimedia data. …”
Get full text
Article -
730
-
731
Using computational pharmacology and experimental verification to decode mechanism of Qing-Wei-San in treating periodontitis
Published 2025-07-01“…The network was validated using a computational network pharmacology model to identify equivalent component groups. …”
Get full text
Article -
732
Soft actor-critic algorithm and improved GNN model in secure access control of disaggregated optical networks
Published 2025-08-01“…Integrating causal inference with game-theoretic equilibrium redefines the security control paradigm—shifting from passive defense to proactive resilience—and provides an interpretable, highly adaptive foundation for next-generation architectures such as multi-domain collaboration and computing-network convergence.…”
Get full text
Article -
733
OP-Gen: A High-Quality Remote Sensing Image Generation Algorithm Guided by OSM Images and Textual Prompts
Published 2025-03-01Get full text
Article -
734
-
735
-
736
A New Transformer Network for Short-Term Global Sea Surface Temperature Forecasting: Importance of Eddies
Published 2025-04-01Get full text
Article -
737
Modules of Organizational and Technical Systems for Solving Problems of Adaptation in a Rapidly Changing Environment
Published 2020-10-01“…These tasks occur when new elements appear in the telecommunications computer network, they fail, change the mode, new tasks occur, etc. …”
Get full text
Article -
738
-
739
-
740