Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Security measures 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
61
Research on range matching for wire-speed hardware NIDS
Published 2006-01-01Subjects: “…computer network…”
Get full text
Article -
62
A Survey of Data Stream-Based Intrusion Detection Systems
Published 2025-01-01Subjects: “…Computer networks…”
Get full text
Article -
63
Research and Achievement of Redundancy Elimination of Backbone Network
Published 2013-09-01Subjects: “…computer network…”
Get full text
Article -
64
The application and performance optimization of multi-controller-based load balancing algorithm in computer networks
Published 2025-06-01Subjects: Get full text
Article -
65
Development of the analytical model and method of optimization of the priority service corporate computer "Elections" network
Published 2025-06-01Subjects: “…computer network…”
Get full text
Article -
66
Research on range matching for wire-speed hardware NIDS
Published 2006-01-01Subjects: “…computer network;intrusion detection;hardware accelerating;packet classify;range matching…”
Get full text
Article -
67
Network optimization by regional computing for UAVs' big data
Published 2025-06-01Subjects: Get full text
Article -
68
Congestion control algorithm for unreliable unicast traffic
Published 2008-01-01Subjects: “…computer network…”
Get full text
Article -
69
An e-Learning Environment Based on the Moodle Platform for Iraq Universities
Published 2015-10-01Subjects: Get full text
Article -
70
Balancing Usability and Protection: A Decision-Making Approach to Computer Network Security Evaluation using the Neutrosophic Fuzzy Dombi Operator
Published 2025-05-01Subjects: Get full text
Article -
71
INVESTIGATION OF CHANGES IN THE LEVEL OF NETWORK SECURITY BASED ON A COGNITIVE APPROACH
Published 2024-12-01Subjects: Get full text
Article -
72
AUTOMATION OF MANAGEMENT BY THE INTELLECTUAL THE RIGHTS IN GLOBAL COMPUTER NETWORKS
Published 2016-08-01Subjects: Get full text
Article -
73
INFORMATION SYSTEMS IN THE JUDICIARY: THE STAGES, THE USE OF PRACTICE
Published 2016-08-01Subjects: Get full text
Article -
74
Beamforming and resource optimization in UAV integrated sensing and communication network with edge computing
Published 2023-09-01Subjects: “…integrated sensing-communication-computation network…”
Get full text
Article -
75
Social big data management through collaborative mobile, regional, and cloud computing
Published 2025-03-01Subjects: Get full text
Article -
76
An Approach for Anomaly Detection in Network Communications Using <i>k-Path</i> Analysis
Published 2024-07-01Subjects: Get full text
Article -
77
Integrating PCA and DEA techniques for strategic assessment of network security
Published 2023-03-01Subjects: Get full text
Article -
78
Research on Architecture and Energy-Saving Mechanism of Reconfigurable Flexible Network
Published 2013-09-01Subjects: “…computer network…”
Get full text
Article -
79
Adversarial Threats to Cloud IDS: Robust Defense With Adversarial Training and Feature Selection
Published 2025-01-01Subjects: Get full text
Article -
80
Design of an efficient dynamic context‐based privacy policy deployment model via dual bioinspired Q learning optimisations
Published 2024-12-01Subjects: Get full text
Article