Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Computer security 2
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
261
QoS rerouting mechanism for SON
Published 2012-11-01“…Along with the development of computer network,SON(self-organizing network)has attracted wide attention with its flexibility,adaptability,robustness.On the basis of OSPFv3,the interactive message of QoS state was defined to establish the information table of neighbors,store the link QoS information,judge the triggering of rerouting,and then the biological behaviors,such as hibernation and awakening,were introduced to the routing nodes.A hybrid rerouting mechanism was adopted to make the corresponding treatment under various network failure situations,so that the application QoS support could be provided when the network state was changing.Simulation results show that the proposed mechanism has better performance.…”
Get full text
Article -
262
EMULATION OF SOFTWARE-DEFINED NETWORK USING MININET
Published 2021-02-01“…Software-defined networking (SDN) represents a new structure of computer network that simplifies and improves network management by splitting the control plane and data plane. …”
Get full text
Article -
263
On Elegant Labelling and Magic Labelling of Large-Scale Graphs
Published 2022-01-01Get full text
Article -
264
Privacy in the Internet: Myth or reality
Published 2016-01-01“…What are the ways to control what personal information we will publicly share with others and is there a safe way to protect privacy on the world's global computer network? The paper gives an overview of the situation in the field, as well as tips for achieving the desired level of data protection.…”
Get full text
Article -
265
Recurrence Relations and Hilbert Series of the Monoid Associated with Star Topology
Published 2020-01-01“…Star network is one of the most common in computer network topologies. In this work, we study star topology Sn and associate a Coxeter structure of affine type on it. …”
Get full text
Article -
266
System detecting network anomaly with visualization techniques
Published 2018-02-01“…With the fast development of information technology and computer network,the scale and complexity of network security data grows rapidly.Traditional visualization techniques are no longer suitable.In addition,it designs interactive functions based on the feature of network security analysis,in order to assist the network security analyst.The existing approaches for network security visualization have some defects,which fail to provide a good indication of network security data in terms of timing and also fail to display information completely and realize user-friendly interaction.A multi-view network security visualization system was proposed,which provided the analysts of both the static status and dynamic changes of the network by combining the force-oriented model and the staged animation.It provides comprehensive information with display and filter of protocols,IP segment and port.The system on Shanghai Network database were evaluated.…”
Get full text
Article -
267
Des cités hallucinées à la grille invisible, William Gibson et les métamorphoses du cyberespace
Published 2017-11-01“…In his first novels, cyberspace is at the same time a narrative trick to depict a global computer network and an element of a more global investigation of the relationship between geographic space and technology. …”
Get full text
Article -
268
Financial Data Anomaly Detection Method Based on Decision Tree and Random Forest Algorithm
Published 2022-01-01“…The fast-developing computer network not only brings convenience to people but also brings security problems to people due to the appearance of various abnormal flows. …”
Get full text
Article -
269
Botnets’ similarity analysis based on communication features and D-S evidence theory
Published 2011-01-01“…A potential hidden relationship may exist among different zombie groups.A method to analyze the relationship among botnets was proposed based on the communication activities.The method extracted several communication fea-tures of botnet,including the number of flows per hour,the number of packets per flow,the number of flows per IP and the packet payloads.It defined similarity statistical functions of the communication features,and built the analysis model of botnets relationship based on the advanced dempster-shafer(D-S) evidence theory to synthetically evaluate the simi-larities between different zombie groups.The experiments were conducted using several botnet traces.The results show that the method is valid and efficient,even in the case of encrypted botnet communication messages.Moreover,the ideal processing results is achieved by applying our method to analyze the data captured from the security monitoring platform of computer network,as well as compare with similar work.…”
Get full text
Article -
270
Influence of Psychological Stress and Moderate Physical Activity in Cardiovascular Reactivity
Published 2018-09-01“…For that a total of 30 bibliographic sources, among them 2 books and a number of articles from scientific journals, accessed through the main managers the computer network. It was concluded that psychological stress and aerobic physical exercises influence antagonistically on cardiovascular reactivity.…”
Get full text
Article -
271
A Method of Intrusion Detection Based on WOA-XGBoost Algorithm
Published 2022-01-01“…With the development of information technology, computer networks have become a part of people’s lives and work. …”
Get full text
Article -
272
Network Anomaly Detection System with Optimized DS Evidence Theory
Published 2014-01-01“…Network anomaly detection has been focused on by more people with the fast development of computer network. Some researchers utilized fusion method and DS evidence theory to do network anomaly detection but with low performance, and they did not consider features of network—complicated and varied. …”
Get full text
Article -
273
A Prerecognition Model for Hot Topic Discovery Based on Microblogging Data
Published 2014-01-01Get full text
Article -
274
Implementation of lightweight intrusion detection model for security of smart green house and vertical farm
Published 2018-04-01“…Nevertheless, current network forensics is still unable to fully monitor and analyze computer network traffic to gather the evidences of malicious attacks or intrusions. …”
Get full text
Article -
275
Development and Application of UAV VR Panoramic Display System for Datengxia Water Project
Published 2021-01-01“…With the rapid development of computer network technology,panoramic technology has been widely applied in many fields such as tourism,real estate,engineering construction,and virtual education.It realizes the all-round interactive viewing and browsing in real scenes,with the sense of the scene and interaction.This paper obtains the panoramic images by the UAV aerial photography and image stitching technology,develops the UAV VR panoramic display system of Datengxia Water Project based on krpano engine and geographic information technology for realizing many functions including panoramic data storage management,online editing,releasing,etc.After the system is applied to the panoramic data management of Datengxia,there are lots of good feedback,and the work efficiency is greatly improved.In addition,this panoramic system provides data support for the virtual monitoring of the Datengxia Water Project construction,promotes the classification and efficient retrieval of panoramic data in the project,improves the efficiency of users in making panoramic projects and managing panoramic data,and offers an operation platform for building the Datengxia Water Project exhibition site and the VR display project of the Datengxia Museum.…”
Get full text
Article -
276
Design of Anomaly Based Intrusion Detection System Using Support Vector Machine and Grasshopper Optimization Algorithm in IoT
Published 2024-02-01“…Computer networks play an important and practical role in communication and data exchange, and they also share resources with complete ease. …”
Get full text
Article -
277
Knee Point Search Using Cascading Top-k Sorting with Minimized Time Complexity
Published 2013-01-01Get full text
Article -
278
Inflammatory Acute Response. Biochemical and Cellular Considerations
Published 2015-02-01“…The present work aimed at argumenting on the mechanisms that explain the vascular changes, and the establishment of the signs of the acute inflammatory response with an in-depth molecular level. 18 articles of scientific magazines, 2 books and other sources of information that was accessed by means of the principal managers of the computer network, adding up a total of 20 sources, were consulted. …”
Get full text
Article -
279
On Fault-Tolerant Resolving Sets of Some Families of Ladder Networks
Published 2021-01-01“…In computer networks, vertices represent hosts or servers, and edges represent as the connecting medium between them. …”
Get full text
Article -
280
The role of the Internet in the modern life of children and teenagers: analysis of a sociological survey
Published 2023-03-01“…Achievements in the field of technology, which serve as the foundation of the emerging modern information society, have led to the rapid development of the Internet – a global computer network. The Internet is a mean of social communication that has both positive and negative effects on the global community. …”
Get full text
Article