Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- Prevention 2
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Crime prevention 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Information technology 1
- Internal security 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Social media 1
- Technology 1
-
61
Outlier Detection in VPN Authentication Logs for Corporate Computer Networks Access using CRISP-DM
Published 2024-12-01“…A Virtual Private Network (VPN) serves as a critical network access solution widely employed by corporations, enabling users to connect to company computer networks via a global infrastructure. Amid the ongoing Covid-19 pandemic, heightened reliance on computer network access has increased the vulnerability to data breaches by unauthorized parties. …”
Get full text
Article -
62
-
63
D2D assisted cooperative computational offloading strategy in edge cloud computing networks
Published 2025-04-01Get full text
Article -
64
Computer Network System for Fire Flame detection from Digital Video using Fractal Geometry
Published 2010-06-01Subjects: Get full text
Article -
65
Research on intrusion response strategy based on static Bayesian game in mobile edge computing network
Published 2023-02-01Get full text
Article -
66
Cross-Temperature FeFETs Enabling Long- and Short-Term Memory for Reservoir Computing Network
Published 2025-01-01Get full text
Article -
67
Research on intrusion response strategy based on static Bayesian game in mobile edge computing network
Published 2023-02-01Get full text
Article -
68
Data Communications and Networks /
Published 2006Subjects: Publisher description
Table of contents only
View in OPAC
Book -
69
Applied network security monitoring : collection, detection, and analysis /
Published 2014Subjects: View in OPAC
Book -
70
Feasibility Analysis of an Immersive Network Laboratory as a Support Tool for Teaching Practices
Published 2025-04-01Subjects: Get full text
Article -
71
Feasibility Analysis of an Immersive Network Laboratory as a Support Tool for Teaching Practices
Published 2025-04-01Subjects: Get full text
Article -
72
-
73
Stochastic and Percolating Models of Blocking Computer Networks Dynamics during Distribution of Epidemics of Evolutionary Computer Viruses
Published 2019-06-01“…The paper presents a complex model of the dynamics of virus epidemies propagation in computer networks, based on topological properties of computer networks and mechanisms of the viruses spread. …”
Get full text
Article -
74
A novel deep learning-based framework with particle swarm optimisation for intrusion detection in computer networks.
Published 2025-01-01“…Hence, a novel deep-learning-based architecture for detecting intrusions into a computer network is proposed in this paper. The aim is to construct a hybrid system that enhances the efficiency and accuracy of intrusion detection. …”
Get full text
Article -
75
Interval-Valued Neutrosophic Sets-Based IVNS-RAM Method for Enhanced Security Evaluation in Computer Networks
Published 2025-03-01Subjects: Get full text
Article -
76
GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks
Published 2020-01-01“…The real-time and high-continuity requirements of the edge computing network gain more and more attention because of its active defence problem, that is, a data-driven complex problem. …”
Get full text
Article -
77
Comprehensive Framework for Collaborative Decision-Making in Evaluating Computer Network Security Using Interval Neutrosophic Information
Published 2025-02-01Subjects: Get full text
Article -
78
Security-driven service caching and computation offloading strategy in air-ground collaborative edge computing networks
Published 2025-07-01“…In air-ground collaborative edge computing networks, the line-of-sight transmission links between an unmanned aerial vehicle (UAV) and ground users can improve computation offloading performance. …”
Get full text
Article -
79
Multi-User Task Offloading Strategy in RIS-Aided Multi-AP Mobile Edge Computing Networks
Published 2025-01-01Get full text
Article -
80
Research on SCLOUD+ post-quantum key encapsulation adaptation and BW lattice optimization for intelligent computing networks
Published 2025-07-01Subjects: “…intelligent computing network…”
Get full text
Article