Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Computer security 2
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
361
Relevant SMS Spam Feature Selection Using Wrapper Approach and XGBoost Algorithm
Published 2019-11-01Get full text
Article -
362
A Comparative Study of Three Resolving Parameters of Graphs
Published 2021-01-01“…It is used to monitor the movement of robots on a network, to debug computer networks, to develop algorithms, and to analyze the structural properties of chemical structures, among other things. …”
Get full text
Article -
363
Applying fractional calculus to malware spread: A fractal-based approach to threat analysis.
Published 2025-01-01“…Nobody can survive without use of modern technologies based on computer networking. To avoid threat of malware, different companies provide antivirus strategies on a high cost. …”
Get full text
Article -
364
-
365
A Hybrid Method for Short-Term Host Utilization Prediction in Cloud Computing
Published 2019-01-01Get full text
Article -
366
Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging
Published 2025-01-01“…Securing data transactions across computer networks presents significant challenges, particularly concerning data privacy and cybersecurity threats. …”
Get full text
Article -
367
Application of Quantum Recurrent Neural Network in Low-Resource Language Text Classification
Published 2024-01-01Get full text
Article -
368
Handover decision with multi-access edge computing in 6G networks: A survey
Published 2025-03-01Get full text
Article -
369
Multitask Learning-Based Pipeline-Parallel Computation Offloading Architecture for Deep Face Analysis
Published 2025-01-01Get full text
Article -
370
Network Automation pada Beberapa Perangkat Router Menggunakan Pemrograman Python
Published 2022-02-01“…Abstract Technological developments in the field of computer networks have an effect that more and more vendors are producing network devices. …”
Get full text
Article -
371
Metode Deteksi Intrusi Menggunakan Algoritme Extreme Learning Machine dengan Correlation-based Feature Selection
Published 2021-02-01“…Abstract Intrusion detection of computer networks is a very important activity carried out to maintain data and information security. …”
Get full text
Article -
372
Audit Tata Kelola Teknologi Informasi pada Pengukuran Kinerja dan Kapasitas Bandwith berdasarkan Cobit 4.1
Published 2020-02-01“…The ICT Directorate has the main task of managing, maintaining, maintaining and ensuring programs, hardware, software to computer networks. Based on the division of research focus, the authors limit this research only to the management of internet bandwidth capacity in UISI. …”
Get full text
Article -
373
A forestry investigation: Exploring factors behind improved tree species classification using bark images
Published 2025-03-01Get full text
Article -
374
VIRTUALIZATION OF IDENTITY IN THE CONTEXT OF SELF-REALIZATION OF A PERSONALITY
Published 2020-12-01Subjects: Get full text
Article -
375
Implementasi Load Balancing dan Failover to Device Mikrotik Router Menggunakan Metode NTH (Studi Kasus: PT.GO-JEK Indonesia)
Published 2020-02-01“…Abstract The development of computer networks and internet so rapidly at the present time, particularly on the Internet as information media of course must have good connection quality. …”
Get full text
Article -
376
Russian business in the context of the growth of cybercrime: changes in economic behavior and protective mechanisms
Published 2024-09-01“…Spoofing has been studied as a new type of cyberattack, where masquerading as a legal object (computer, device or network) is used by hackers as a means of penetrating other computer networks. The characteristics of modern types of spoofing and the negative consequences for business that they lead to are given. …”
Get full text
Article -
377
Laryngeal cancer diagnosis based on improved YOLOv8 algorithm
Published 2025-01-01Get full text
Article -
378
Deep learning in microbiome analysis: a comprehensive review of neural network models
Published 2025-01-01Get full text
Article -
379
-
380
Multi-objective optimal offloading decision for cloud-edge collaborative computing scenario in Internet of vehicles
Published 2022-06-01“…Methods:Aiming at the problem that in the cloud-edge collaborative computing scenario of the Internet of vehicles, it is a challenging problem how to efficiently offload services, and simultaneously consider the offloading decisions of services with the collaborative resource allocation of edge servers and cloud servers, a vehicle computing network architecture based on cloud-edge collaboration was designed. …”
Get full text
Article