Showing 361 - 380 results of 380 for search '"Computer network"', query time: 0.07s Refine Results
  1. 361
  2. 362

    A Comparative Study of Three Resolving Parameters of Graphs by Hafiz Muhammad Ikhlaq, Hafiz Muhammad Afzal Siddiqui, Muhammad Imran

    Published 2021-01-01
    “…It is used to monitor the movement of robots on a network, to debug computer networks, to develop algorithms, and to analyze the structural properties of chemical structures, among other things. …”
    Get full text
    Article
  3. 363

    Applying fractional calculus to malware spread: A fractal-based approach to threat analysis. by Nausheen Razi, Muhammad Bilal Riaz, Ambreen Bano, Tayyab Kamran, Umar Ishtiaq, Anum Shafiq

    Published 2025-01-01
    “…Nobody can survive without use of modern technologies based on computer networking. To avoid threat of malware, different companies provide antivirus strategies on a high cost. …”
    Get full text
    Article
  4. 364
  5. 365
  6. 366

    Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging by Ikram Benfarhat, Vik Tor Goh, Chun Lim Siow, Muhammad Sheraz, Teong Chee Chuah

    Published 2025-01-01
    “…Securing data transactions across computer networks presents significant challenges, particularly concerning data privacy and cybersecurity threats. …”
    Get full text
    Article
  7. 367
  8. 368
  9. 369
  10. 370

    Network Automation pada Beberapa Perangkat Router Menggunakan Pemrograman Python by Setiya Nugroho, Bambang Pujiarto

    Published 2022-02-01
    “…Abstract Technological developments in the field of computer networks have an effect that more and more vendors are producing network devices. …”
    Get full text
    Article
  11. 371

    Metode Deteksi Intrusi Menggunakan Algoritme Extreme Learning Machine dengan Correlation-based Feature Selection by Sulandri Sulandri, Achmad Basuki, Fitra Abdurrachman Bachtiar

    Published 2021-02-01
    “…Abstract Intrusion detection of computer networks is a very important activity carried out to maintain data and information security. …”
    Get full text
    Article
  12. 372

    Audit Tata Kelola Teknologi Informasi pada Pengukuran Kinerja dan Kapasitas Bandwith berdasarkan Cobit 4.1 by Widya Sayekti, Juliana Ermawati, Renny Sari Dewi

    Published 2020-02-01
    “…The ICT Directorate has the main task of managing, maintaining, maintaining and ensuring programs, hardware, software to computer networks. Based on the division of research focus, the authors limit this research only to the management of internet bandwidth capacity in UISI. …”
    Get full text
    Article
  13. 373
  14. 374
  15. 375

    Implementasi Load Balancing dan Failover to Device Mikrotik Router Menggunakan Metode NTH (Studi Kasus: PT.GO-JEK Indonesia) by Achmmad Mustofa, Desi Ramayanti

    Published 2020-02-01
    “…Abstract The development of computer networks and internet so rapidly at the present time, particularly on the Internet as information media of course must have good connection quality. …”
    Get full text
    Article
  16. 376

    Russian business in the context of the growth of cybercrime: changes in economic behavior and protective mechanisms by S. G. Simonov, I. V. Lysenko

    Published 2024-09-01
    “…Spoofing has been studied as a new type of cyberattack, where masquerading as a legal object (computer, device or network) is used by hackers as a means of penetrating other computer networks. The characteristics of modern types of spoofing and the negative consequences for business that they lead to are given. …”
    Get full text
    Article
  17. 377
  18. 378
  19. 379
  20. 380

    Multi-objective optimal offloading decision for cloud-edge collaborative computing scenario in Internet of vehicles by Sifeng ZHU, Jianghao CAI, Zhengyi CHAI, Enlin SUN

    Published 2022-06-01
    “…Methods:Aiming at the problem that in the cloud-edge collaborative computing scenario of the Internet of vehicles, it is a challenging problem how to efficiently offload services, and simultaneously consider the offloading decisions of services with the collaborative resource allocation of edge servers and cloud servers, a vehicle computing network architecture based on cloud-edge collaboration was designed. …”
    Get full text
    Article