Showing 281 - 295 results of 295 for search '"Computer network"', query time: 0.04s Refine Results
  1. 281
  2. 282

    Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging by Ikram Benfarhat, Vik Tor Goh, Chun Lim Siow, Muhammad Sheraz, Teong Chee Chuah

    Published 2025-01-01
    “…Securing data transactions across computer networks presents significant challenges, particularly concerning data privacy and cybersecurity threats. …”
    Get full text
    Article
  3. 283
  4. 284
  5. 285
  6. 286

    Network Automation pada Beberapa Perangkat Router Menggunakan Pemrograman Python by Setiya Nugroho, Bambang Pujiarto

    Published 2022-02-01
    “…Abstract Technological developments in the field of computer networks have an effect that more and more vendors are producing network devices. …”
    Get full text
    Article
  7. 287

    Metode Deteksi Intrusi Menggunakan Algoritme Extreme Learning Machine dengan Correlation-based Feature Selection by Sulandri Sulandri, Achmad Basuki, Fitra Abdurrachman Bachtiar

    Published 2021-02-01
    “…Abstract Intrusion detection of computer networks is a very important activity carried out to maintain data and information security. …”
    Get full text
    Article
  8. 288

    Audit Tata Kelola Teknologi Informasi pada Pengukuran Kinerja dan Kapasitas Bandwith berdasarkan Cobit 4.1 by Widya Sayekti, Juliana Ermawati, Renny Sari Dewi

    Published 2020-02-01
    “…The ICT Directorate has the main task of managing, maintaining, maintaining and ensuring programs, hardware, software to computer networks. Based on the division of research focus, the authors limit this research only to the management of internet bandwidth capacity in UISI. …”
    Get full text
    Article
  9. 289
  10. 290
  11. 291

    Implementasi Load Balancing dan Failover to Device Mikrotik Router Menggunakan Metode NTH (Studi Kasus: PT.GO-JEK Indonesia) by Achmmad Mustofa, Desi Ramayanti

    Published 2020-02-01
    “…Abstract The development of computer networks and internet so rapidly at the present time, particularly on the Internet as information media of course must have good connection quality. …”
    Get full text
    Article
  12. 292

    Russian business in the context of the growth of cybercrime: changes in economic behavior and protective mechanisms by S. G. Simonov, I. V. Lysenko

    Published 2024-09-01
    “…Spoofing has been studied as a new type of cyberattack, where masquerading as a legal object (computer, device or network) is used by hackers as a means of penetrating other computer networks. The characteristics of modern types of spoofing and the negative consequences for business that they lead to are given. …”
    Get full text
    Article
  13. 293
  14. 294
  15. 295