Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Computer security 2
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
281
-
282
Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging
Published 2025-01-01“…Securing data transactions across computer networks presents significant challenges, particularly concerning data privacy and cybersecurity threats. …”
Get full text
Article -
283
Application of Quantum Recurrent Neural Network in Low-Resource Language Text Classification
Published 2024-01-01Get full text
Article -
284
Handover decision with multi-access edge computing in 6G networks: A survey
Published 2025-03-01Get full text
Article -
285
Multitask Learning-Based Pipeline-Parallel Computation Offloading Architecture for Deep Face Analysis
Published 2025-01-01Get full text
Article -
286
Network Automation pada Beberapa Perangkat Router Menggunakan Pemrograman Python
Published 2022-02-01“…Abstract Technological developments in the field of computer networks have an effect that more and more vendors are producing network devices. …”
Get full text
Article -
287
Metode Deteksi Intrusi Menggunakan Algoritme Extreme Learning Machine dengan Correlation-based Feature Selection
Published 2021-02-01“…Abstract Intrusion detection of computer networks is a very important activity carried out to maintain data and information security. …”
Get full text
Article -
288
Audit Tata Kelola Teknologi Informasi pada Pengukuran Kinerja dan Kapasitas Bandwith berdasarkan Cobit 4.1
Published 2020-02-01“…The ICT Directorate has the main task of managing, maintaining, maintaining and ensuring programs, hardware, software to computer networks. Based on the division of research focus, the authors limit this research only to the management of internet bandwidth capacity in UISI. …”
Get full text
Article -
289
A forestry investigation: Exploring factors behind improved tree species classification using bark images
Published 2025-03-01Get full text
Article -
290
VIRTUALIZATION OF IDENTITY IN THE CONTEXT OF SELF-REALIZATION OF A PERSONALITY
Published 2020-12-01Subjects: Get full text
Article -
291
Implementasi Load Balancing dan Failover to Device Mikrotik Router Menggunakan Metode NTH (Studi Kasus: PT.GO-JEK Indonesia)
Published 2020-02-01“…Abstract The development of computer networks and internet so rapidly at the present time, particularly on the Internet as information media of course must have good connection quality. …”
Get full text
Article -
292
Russian business in the context of the growth of cybercrime: changes in economic behavior and protective mechanisms
Published 2024-09-01“…Spoofing has been studied as a new type of cyberattack, where masquerading as a legal object (computer, device or network) is used by hackers as a means of penetrating other computer networks. The characteristics of modern types of spoofing and the negative consequences for business that they lead to are given. …”
Get full text
Article -
293
Laryngeal cancer diagnosis based on improved YOLOv8 algorithm
Published 2025-01-01Get full text
Article -
294
Deep learning in microbiome analysis: a comprehensive review of neural network models
Published 2025-01-01Get full text
Article -
295