Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- Prevention 2
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Crime prevention 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Information technology 1
- Internal security 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Social media 1
- Technology 1
-
1
Computer Networks : principles, technologies, and protocols for network design /
Published 2006Subjects: “…Computer networks Textbooks. 3870…”
Table of contents only
Publisher description
View in OPAC
Book -
2
-
3
Self-Awareness in Computer Networks
Published 2014-01-01“…Although the Internet has evolved to a global system of interconnected computer networks, which links together billions of heterogeneous compute nodes, its static architecture remained more or less the same. …”
Get full text
Article -
4
Evaluation of Enterprise Computer Network Quality
Published 2005-12-01“…Selection of qualitative indices for evaluation of a computer network has been substantiated and an efficient evaluation algorithm permitting to obtain a final result in fire form of an index of requirements’ realization level according to one of three criteria has been proposed.A logically justified and integral three-level decomposition of the process concerning formation of requirements to the quality of a computer network has been advanced in the paper. …”
Get full text
Article -
5
Computer Network Attacks and Modern International Law
Published 2014-04-01Subjects: Get full text
Article -
6
Computer network operations and ‘rule-with-law’ in Australia
Published 2017-03-01Subjects: “…Computer network operations…”
Get full text
Article -
7
Threshold Analysis of Request Degradation in the Computer Network
Published 2019-06-01“…In this paper, the existing approaches to the assessment of computer networks performance are considered. The standard structure of a network of the application layer of the OSI model using the example of SBIS3 application (product of Tensor Company) is treated.Further, two approaches allowing to analyze degradations in a network are considered - on the basis of aggregated data and the operational analysis.The degradation study of more than 60 000 request types between two versions of application which works on the basis of the computer network is the cornerstone of the first decision. …”
Get full text
Article -
8
ON-BOARD HETEROGENEOUS INFORMATION COMPUTER NETWORKS OF PERSPECTIVE AIRCRAFT
Published 2019-04-01Get full text
Article -
9
AUTOMATIC CONTROL OF INTELLECTUAL RIGHTS IN THE GLOBAL COMPUTER NETWORKS
Published 2016-08-01Subjects: Get full text
Article -
10
AUTOMATION OF MANAGEMENT BY THE INTELLECTUAL THE RIGHTS IN GLOBAL COMPUTER NETWORKS
Published 2016-08-01Subjects: Get full text
Article -
11
PERFORMANCE REQUIRED FOR COMMON-USE COMPONENTS OF COMPUTER NETWORKS
Published 2024-09-01“…Sometimes, in practice, simple solutions of quick preliminary estimation of basic characteristics of a computer network are needed.In this aim, the backbone subnet and server set of wide area computer networks are examined. …”
Get full text
Article -
12
Computer Network Control System of TM3 Locomotive
Published 2011-01-01“…This paper introduced the computer network control system and technic characteristics of TM3 locomotive, which compared by TM1, TM2 locomotive.…”
Get full text
Article -
13
Spontaneous Ad Hoc Mobile Cloud Computing Network
Published 2014-01-01“…Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. …”
Get full text
Article -
14
Research on the development of intelligent computing network for large models
Published 2024-06-01“…The requirements and related key technologies of intelligent computing networks for large model training were studied, and the standard specifications, academic research, and case practices of intelligent computing networks were analyzed, in order to promote the development of intelligent computing networks.…”
Get full text
Article -
15
Overview on Intrusion Detection Systems for Computers Networking Security
Published 2025-03-01“…The rapid growth of digital communications and extensive data exchange have made computer networks integral to organizational operations. …”
Get full text
Article -
16
Classification of Computer Network Users with Convolutional Neural Networks
Published 2018-09-01Get full text
Article -
17
Peculiarities of rendering of material in virtual computers' network course
Published 2004-12-01“… Problems of singling out the most important themes of distance computers' network course are analyzed in the present article. …”
Get full text
Article -
18
Understanding the network : a practical guide to internetworking /
Published 2000Subjects: “…Computer networks. 10789…”
View in OPAC
Book -
19
Semi-Supervised Learning for Intrusion Detection in Large Computer Networks
Published 2025-05-01Get full text
Article -
20
Computer networks anomaly detection by using PCA & pattern recognition
Published 2025-06-01Subjects: “…computer networks anomaly detection…”
Get full text
Article