Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Computer security 2
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
221
A Prerecognition Model for Hot Topic Discovery Based on Microblogging Data
Published 2014-01-01Get full text
Article -
222
Implementation of lightweight intrusion detection model for security of smart green house and vertical farm
Published 2018-04-01“…Nevertheless, current network forensics is still unable to fully monitor and analyze computer network traffic to gather the evidences of malicious attacks or intrusions. …”
Get full text
Article -
223
Design of Anomaly Based Intrusion Detection System Using Support Vector Machine and Grasshopper Optimization Algorithm in IoT
Published 2024-02-01“…Computer networks play an important and practical role in communication and data exchange, and they also share resources with complete ease. …”
Get full text
Article -
224
Knee Point Search Using Cascading Top-k Sorting with Minimized Time Complexity
Published 2013-01-01Get full text
Article -
225
Inflammatory Acute Response. Biochemical and Cellular Considerations
Published 2015-02-01“…The present work aimed at argumenting on the mechanisms that explain the vascular changes, and the establishment of the signs of the acute inflammatory response with an in-depth molecular level. 18 articles of scientific magazines, 2 books and other sources of information that was accessed by means of the principal managers of the computer network, adding up a total of 20 sources, were consulted. …”
Get full text
Article -
226
On Fault-Tolerant Resolving Sets of Some Families of Ladder Networks
Published 2021-01-01“…In computer networks, vertices represent hosts or servers, and edges represent as the connecting medium between them. …”
Get full text
Article -
227
The role of the Internet in the modern life of children and teenagers: analysis of a sociological survey
Published 2023-03-01“…Achievements in the field of technology, which serve as the foundation of the emerging modern information society, have led to the rapid development of the Internet – a global computer network. The Internet is a mean of social communication that has both positive and negative effects on the global community. …”
Get full text
Article -
228
-
229
Regional experience in organizing the protection of minors from a destructive information environment (by the example of non-central regions)
Published 2023-03-01“…Achievements in the field of new technologies, on which the formation of the modern information society is based, have led to the rapid development of the global computer network Internet. The Internet as a means of social communication has both a positive impact on the world community and has negative consequences. …”
Get full text
Article -
230
Physiopathological Mechanisms of Association between Metabolic Syndrome and Arterial Hypertension: an Update
Published 2023-02-01“…For this, a total of 29 bibliographic sources were consulted, including articles from scientific journals, 3 books and others accessed through the main managers of the computer network. Hypertension and dyslipidemia often occur together and also accompany resistance to insulin-stimulated glucose uptake; factors that often accompany obesity. …”
Get full text
Article -
231
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01“…About 32% of these companies have the controls at the level of computer network, 22% of them have the control at the operating system level, while 38% have the control at the software application level. …”
Get full text
Article -
232
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01“…About 32% of these companies have the controls at the level of computer network, 22% of them have the control at the operating system level, while 38% have the control at the software application level. …”
Get full text
Article -
233
-
234
A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings
Published 2014-01-01“…As people in modern societies are busier than any human era and computer network has profound impact on how people work and live through fast and convenient information exchange, people need more help from each other to accomplish more work via network connections in limited period of time. …”
Get full text
Article -
235
Interface Data Modeling to Detect and Diagnose Intersystem Faults for Designing and Integrating System of Systems
Published 2018-01-01“…The software that supports the modeling is implemented using the following concepts: (1) a model-view-viewmodel pattern for overall software design and (2) a computer network for representing sequential properties of field interpretations. …”
Get full text
Article -
236
-
237
„Nowe” problemy wychowawcze w dobie „nowych” mediów
Published 2012-12-01“…They are everyday household members of Facebook, Twitter, MySpace, YouTube, Communicators and blogs as well as the slaves of computer games. The computer network addicts and leaves sometimes dramatic marks in their lives. …”
Get full text
Article -
238
An adaptive intrusion detection and prevention system for Internet of Things
Published 2019-11-01“…The revolution of computer network technologies and telecommunication technologies increases the number of Internet users enormously around the world. …”
Get full text
Article -
239
Analysis of the Effect of Artificial Intelligence on Role Cognition in the Education System
Published 2022-01-01“…The education system targeted by this questionnaire survey involves 8 categories: preschool education, primary education, secondary education, higher education, adult education, computer network education, enterprise education, and social education; the respondents include 368 teachers, 402 students or learners, 118 school managers, and 124 family members of students or learners in all above education categories. …”
Get full text
Article -
240