Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Computer security 2
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
1
Computer Networks : principles, technologies, and protocols for network design /
Published 2006Subjects: “…Computer networks Textbooks. 3870…”
Table of contents only
Publisher description
View in OPAC
Book -
2
-
3
Future vehicular fog computing networks
Published 2020-06-01“…Facing the requirements of secure and reliable vehicle driving,internet of vehicles requires high real-time information transmission and processing,high data storage and security using capacity,and high flexibility and inclusiveness of network architecture.The future vehicular fog computing network can reduce the data transmission and processing delay based on the characteristics of fog computing deployed at the edge of the network,can ensure data security based on the characteristics of fog computing black box operation,and can make heterogeneous facilities connect with other devices and make sure resource sharing between vehicle nodes based on the fog computing distributed architecture.The future vehicular fog computing networks were reviewed,the architecture,challenges,and key technologies of vehicle fog computing were introduced,the communication and computing resource sharing and task collaboration in the mobile state,vehicle fog computing security,and vehicle fog computing heterogeneity of facilities were focused on .Finally,a three-level management and control architecture for vehicular fog computing networks were proposed to promote the development of internet of vehicles to on-networking collaborative decision-making and control.…”
Get full text
Article -
4
Computer Network Attacks and Modern International Law
Published 2014-04-01Subjects: Get full text
Article -
5
Computing-network intelligence: research progress and prospects
Published 2024-10-01Subjects: “…computing-network convergence…”
Get full text
Article -
6
Research on the development of intelligent computing network for large models
Published 2024-06-01“…The requirements and related key technologies of intelligent computing networks for large model training were studied, and the standard specifications, academic research, and case practices of intelligent computing networks were analyzed, in order to promote the development of intelligent computing networks.…”
Get full text
Article -
7
Peculiarities of rendering of material in virtual computers' network course
Published 2004-12-01“… Problems of singling out the most important themes of distance computers' network course are analyzed in the present article. …”
Get full text
Article -
8
Network Restoration for Next-Generation Communication and Computing Networks
Published 2018-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
9
PERFORMANCE REQUIRED FOR COMMON-USE COMPONENTS OF COMPUTER NETWORKS
Published 2024-09-01“…Sometimes, in practice, simple solutions of quick preliminary estimation of basic characteristics of a computer network are needed.In this aim, the backbone subnet and server set of wide area computer networks are examined. …”
Get full text
Article -
10
Computing network:a new multi-access edge computing
Published 2019-09-01Subjects: Get full text
Article -
11
Survey on rail transit mobile edge computing network security
Published 2023-04-01“…The introduction of mobile edge computing (MEC) technology in rail transit which has the characteristics of complex environment, high densities of passengers, and high-speed mobility can meet the low latency, mobility, and massive connection requirements of rail transit.However, MEC not only improves the performance of rail transit communication network but also brings security challenges.Firstly, an overview of rail transit communication network and MEC was given.Then the value of introducing MEC into rail transit and the architecture of rail transit edge computing network were discussed.After that, the security threats faced by rail transit edge computing network was analyzed and protection scheme was proposed.Finally, some open questions were proposed, which was expected to provide ideas for future research.…”
Get full text
Article -
12
Optimal Management of Computer Network Security in the Era of Big Data
Published 2022-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
13
Online auction-based resource scheduling in grid computing networks
Published 2016-10-01Get full text
Article -
14
Application of blockchain in urban rail traffic edge computing network
Published 2021-10-01Subjects: Get full text
Article -
15
Optimization strategies in NOMA-based vehicle edge computing network
Published 2021-03-01“…Nowadays, vehicular network is confronting the challenges to support ubiquitous connections and vast computation-intensive and delay-sensitive smart service for numerous vehicles.To address these issues, non-orthogonal multiple access (NOMA) and mobile edge computing (MEC) are considered as two promising technologies by letting multiple vehicles to share the same wireless resources, and the powerful edge computing resources were adopted at the edge of vehicular wireless access network respectively.A NOMA-based vehicular edge computing network was studied.Under the condition of guaranteeing task processing delay, the joint optimization problem of task offloading, user clustering, computing resource allocation and transmission power control was proposed to minimize the task processing cost.Since the proposed problem was difficult to solve, it was divided into sub-problems, and a low-complexity and easy-to-implement method was proposed to solve it.The simulation results show that compared with other benchmark algorithms, the proposed algorithm performs well in minimizing costs.…”
Get full text
Article -
16
Juveniles as victims of criminal acts committed under the misuse of computer network
Published 2018-01-01“…A special segment of technological development where such misuses are increasingly present are computer networks. Such fear is further expressed when it comes to juveniles, who, due to the characteristics of this development period, represent easy targets, which often leads to serious and long-term consequences. …”
Get full text
Article -
17
Heterogeneous computing network resource management based on virtual network embedding
Published 2024-10-01Subjects: “…heterogeneous computing network…”
Get full text
Article -
18
Research on fault prediction of computer network nodes driven by log information
Published 2024-08-01Subjects: Get full text
Article -
19
Resource sharing and incentive mechanism for multi-access edge computing networks
Published 2023-11-01Get full text
Article -
20
A Classical LTE Cellular System Simulator for Computer Network Education
Published 2021-01-01“…In this study, a classical LTE cellular system simulator is proposed as a testbed to aid the education of computer networks at college. The proposed simulator is an extension of the functionality of LTE-Sim frameworks. …”
Get full text
Article