Search alternatives:
networks » network (Expand Search)
Showing 61 - 80 results of 740 for search '"Computer Networks"', query time: 0.12s Refine Results
  1. 61

    Outlier Detection in VPN Authentication Logs for Corporate Computer Networks Access using CRISP-DM by Nilo Legowo, Wilyu Mahendra Bad

    Published 2024-12-01
    “…A Virtual Private Network (VPN) serves as a critical network access solution widely employed by corporations, enabling users to connect to company computer networks via a global infrastructure. Amid the ongoing Covid-19 pandemic, heightened reliance on computer network access has increased the vulnerability to data breaches by unauthorized parties. …”
    Get full text
    Article
  2. 62
  3. 63
  4. 64
  5. 65
  6. 66
  7. 67
  8. 68
  9. 69

    Applied network security monitoring : collection, detection, and analysis / by Sanders, Chris

    Published 2014
    Subjects:
    View in OPAC
    Book
  10. 70
  11. 71
  12. 72
  13. 73

    Stochastic and Percolating Models of Blocking Computer Networks Dynamics during Distribution of Epidemics of Evolutionary Computer Viruses by S. A. Lesko, A. S. Alyoshkin, V. V. Filatov

    Published 2019-06-01
    “…The paper presents a complex model of the dynamics of virus epidemies propagation in computer networks, based on topological properties of computer networks and mechanisms of the viruses spread. …”
    Get full text
    Article
  14. 74

    A novel deep learning-based framework with particle swarm optimisation for intrusion detection in computer networks. by Abdullah Asım Yılmaz

    Published 2025-01-01
    “…Hence, a novel deep-learning-based architecture for detecting intrusions into a computer network is proposed in this paper. The aim is to construct a hybrid system that enhances the efficiency and accuracy of intrusion detection. …”
    Get full text
    Article
  15. 75
  16. 76

    GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks by Qianmu Li, Jun Hou, Shunmei Meng, Huaqiu Long

    Published 2020-01-01
    “…The real-time and high-continuity requirements of the edge computing network gain more and more attention because of its active defence problem, that is, a data-driven complex problem. …”
    Get full text
    Article
  17. 77
  18. 78

    Security-driven service caching and computation offloading strategy in air-ground collaborative edge computing networks by WU Mengru, KONG Yawei, HAN Huimei, LU Haiquan, SI Peiyuan, LU Weidang, GUO Lei

    Published 2025-07-01
    “…In air-ground collaborative edge computing networks, the line-of-sight transmission links between an unmanned aerial vehicle (UAV) and ground users can improve computation offloading performance. …”
    Get full text
    Article
  19. 79
  20. 80