Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- Prevention 2
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Crime prevention 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Information technology 1
- Internal security 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Social media 1
- Technology 1
-
121
A behavioural in‐depth analysis of ransomware infection
Published 2021-01-01Subjects: Get full text
Article -
122
RON‐based cross‐chain routing optimization strategy in metaverse
Published 2024-12-01Subjects: Get full text
Article -
123
STCP: A Novel Approach for Congestion Control in IoT Environment
Published 2022-03-01Subjects: Get full text
Article -
124
Penerapan Static VLAN Dan Access List Untuk Meningkatkan Keamanan Jaringan
Published 2019-10-01Subjects: Get full text
Article -
125
Propuesta de diseño de una red LAN para el Hospital Pediátrico Universitario Borrás-Marfán
Published 2023-03-01Subjects: “…lan network, computer network, telecommunications, design.…”
Get full text
Article -
126
Authorisation inconsistency in IoT third‐party integration
Published 2022-03-01Subjects: Get full text
Article -
127
Network traffic anomaly detection model based on feature grouping and multi‐autoencoders integration
Published 2024-12-01Subjects: “…computer network security…”
Get full text
Article -
128
RECOMMENDATIONS FOR THE CONSTRUCTION OF INFORMATION AND TELECOMMUNICATION NETWORKS BASED ON THE COMPARATIVE EVALUATION OF THEIR SUSTAINABILITY
Published 2019-09-01Subjects: “…heterogyne network, integrated computer networks, information and telecommunication networks, intentional and unintentional obstacles, reliability of heterodyne telecommunication networks.…”
Get full text
Article -
129
Path Loss of Indoor Hotspot and Indoor Factory Environments for 5G Wireless Networks
Published 2025-03-01Subjects: “…Computer Networks…”
Get full text
Article -
130
A METHOD FOR IMPROVING THE QUALITY INDICATORS OF A DISTRIBUTED FORENSIC INFORMATION SYSTEM
Published 2020-12-01Subjects: Get full text
Article -
131
On the performance of non‐profiled side channel attacks based on deep learning techniques
Published 2023-05-01Subjects: “…computer network security…”
Get full text
Article -
132
Comparative analysis of VPN protocols
Published 2023-06-01Subjects: “…computer network; cloud computing; virtual private network…”
Get full text
Article -
133
HealthChain: A blockchain‐based framework for secure and interoperable electronic health records (EHRs)
Published 2024-12-01Subjects: Get full text
Article -
134
An unsupervised approach for the detection of zero‐day distributed denial of service attacks in Internet of Things networks
Published 2024-09-01Subjects: “…computer network security…”
Get full text
Article -
135
Evaluating model and simulation analyzing for P2P Churn
Published 2007-01-01Subjects: “…computer network;peer to peer;evaluating model;Churn…”
Get full text
Article -
136
Evaluating model and simulation analyzing for P2P Churn
Published 2007-01-01Subjects: “…computer network…”
Get full text
Article -
137
A fast user actual privilege reasoning framework based on privilege dependency graph reduction
Published 2023-05-01Subjects: “…computer network security…”
Get full text
Article -
138
The practice of cloud system administration : designing and operating large distributed systems /
Published 2015Subjects: “…Computer networks Management. 14156…”
View in OPAC
Book -
139
CYBER TERRORISM AND THE EFFECTS OF THE RUSSIAN ATTACKS ON DEMOCRATIC STATES IN EAST EUROPE
Published 2020-03-01Subjects: Get full text
Article -
140
An Approach to the Construction of a Network Processing Unit
Published 2019-03-01Subjects: Get full text
Article