Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Security measures 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
21
An e-Learning Environment Based on the Moodle Platform for Iraq Universities
Published 2015-10-01Subjects: Get full text
Article -
22
AUTOMATION OF MANAGEMENT BY THE INTELLECTUAL THE RIGHTS IN GLOBAL COMPUTER NETWORKS
Published 2016-08-01Subjects: Get full text
Article -
23
Social big data management through collaborative mobile, regional, and cloud computing
Published 2025-03-01Subjects: Get full text
Article -
24
An Approach for Anomaly Detection in Network Communications Using <i>k-Path</i> Analysis
Published 2024-07-01Subjects: Get full text
Article -
25
MEANS OF IMPROVING THE QUALITY OF SERVICE OF THE COMPUTER NETWORK OF THE FORENSIC INFORMATION SYSTEM
Published 2020-06-01Subjects: “…quality of service (QoS) indicators of computer networks…”
Get full text
Article -
26
RON‐based cross‐chain routing optimization strategy in metaverse
Published 2024-12-01Subjects: Get full text
Article -
27
RECOMMENDATIONS FOR THE CONSTRUCTION OF INFORMATION AND TELECOMMUNICATION NETWORKS BASED ON THE COMPARATIVE EVALUATION OF THEIR SUSTAINABILITY
Published 2019-09-01Subjects: “…heterogyne network, integrated computer networks, information and telecommunication networks, intentional and unintentional obstacles, reliability of heterodyne telecommunication networks.…”
Get full text
Article -
28
Computer networks anomaly detection by using PCA & pattern recognition
Published 2025-06-01Subjects: “…computer networks anomaly detection…”
Get full text
Article -
29
Path Loss of Indoor Hotspot and Indoor Factory Environments for 5G Wireless Networks
Published 2025-03-01Subjects: “…Computer Networks…”
Get full text
Article -
30
The practice of cloud system administration : designing and operating large distributed systems /
Published 2015Subjects: “…Computer networks Management. 14156…”
View in OPAC
Book -
31
An optimization model of computer network security based on GABP neural network algorithm
Published 2025-04-01Subjects: Get full text
Article -
32
CYBER TERRORISM AND THE EFFECTS OF THE RUSSIAN ATTACKS ON DEMOCRATIC STATES IN EAST EUROPE
Published 2020-03-01Subjects: Get full text
Article -
33
An Approach to the Construction of a Network Processing Unit
Published 2019-03-01Subjects: Get full text
Article -
34
A METHOD FOR IMPROVING THE QUALITY INDICATORS OF A DISTRIBUTED FORENSIC INFORMATION SYSTEM
Published 2020-12-01Subjects: Get full text
Article -
35
Adaptive and survivable trust management for Internet of Things systems
Published 2021-09-01Subjects: “…computer network management…”
Get full text
Article -
36
Improved meet‐in‐the‐middle attacks on reduced‐round Joltik‐BC
Published 2021-05-01Subjects: Get full text
Article -
37
-
38
LDoS attack detection method based on traffic classification prediction
Published 2022-03-01Subjects: “…computer network security…”
Get full text
Article -
39
A behavioural in‐depth analysis of ransomware infection
Published 2021-01-01Subjects: Get full text
Article -
40
AUTOMATIC CONTROL OF INTELLECTUAL RIGHTS IN THE GLOBAL COMPUTER NETWORKS
Published 2016-08-01Subjects: Get full text
Article