Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- Prevention 2
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Crime prevention 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Information technology 1
- Internal security 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Social media 1
- Technology 1
-
81
An ICN-Based Delay-Sensitive Service Scheduling Architecture with Stateful Programmable Data Plane for Computing Network
Published 2024-11-01Subjects: “…Computing Network…”
Get full text
Article -
82
Research on cloud computing network security mechanism and optimization in university education management informatization based on OpenFlow
Published 2025-12-01“…Experimental data shows that cloud computing network environments using OpenFlow technology have reduced response time by 30 % when subjected to network attacks while reducing the risk of data leakage by 40 %. …”
Get full text
Article -
83
Energy Efficiency Maximization in RISs-Assisted UAVs-Based Edge Computing Network Using Deep Reinforcement Learning
Published 2024-12-01“…In this paper, we consider the RISs-assisted multi-UAVs collaborative edge Computing Network (RUCN) in urban environment, in which we study the computational offloading problem. …”
Get full text
Article -
84
Research on the “professional, ideological, and innovative” tri-integration reform of the “computer network security” course in the context of artificial intelligence
Published 2025-01-01“…In this context, the "Computer Network Security" course faces unprecedented challenges and opportunities. …”
Get full text
Article -
85
-
86
Optimization of computer network security system based on improved neural network algorithm and low energy data search
Published 2025-09-01“…Therefore, this paper aims to optimize the computer network security system, and proposes a method based on improved neural network algorithm and low energy consumption data search to improve security and energy efficiency. …”
Get full text
Article -
87
Principles of Information Security /
Published 2016Subjects: “…Computer networks Security measures. 6783…”
View in OPAC
Book -
88
Performance evaluation of AQM schemes: a comparative study
Published 2005-01-01Subjects: “…computer networks…”
Get full text
Article -
89
The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue Attack
Published 2021-06-01Subjects: Get full text
Article -
90
Computational network biology analysis revealed COVID-19 severity markers: Molecular interplay between HLA-II with CIITA.
Published 2025-01-01“…Our findings from computational network biology analysis suggest that suppression and activation of the molecular interplay between HLA class II, CIITA, and CD74 provide crucial clues to uncover the mechanisms of COVID-19 severity.…”
Get full text
Article -
91
The Internet Book : everything you need to know about computer networking and how the Internet works /
Published 2019Subjects: View in OPAC
Book -
92
Designing a Computer-Based Electronic Archiving System for Nineveh Health Department
Published 2018-12-01Subjects: Get full text
Article -
93
Software Defined Networks: a Comparative Study and Quality of Services Evaluation
Published 2019-12-01Subjects: “…software defined networks, floodlight, mininet, computer networks, quality of services…”
Get full text
Article -
94
Artificial Intelligence and Blockchain Technology Enabling Sustainable and Smart Infrastructure
Published 2022-12-01Subjects: Get full text
Article -
95
Performance Evaluation of ns-3 Real-Time Emulation
Published 2025-01-01Subjects: Get full text
Article -
96
-
97
-
98
-
99
-
100
Balancing Usability and Protection: A Decision-Making Approach to Computer Network Security Evaluation using the Neutrosophic Fuzzy Dombi Operator
Published 2025-05-01Subjects: Get full text
Article