Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Computer security 2
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
1
Computer Networks : principles, technologies, and protocols for network design /
Published 2006Subjects: “…Computer networks Textbooks. 3870…”
Table of contents only
Publisher description
View in OPAC
Book -
2
-
3
Computer Network Attacks and Modern International Law
Published 2014-04-01Subjects: Get full text
Article -
4
Peculiarities of rendering of material in virtual computers' network course
Published 2004-12-01“… Problems of singling out the most important themes of distance computers' network course are analyzed in the present article. …”
Get full text
Article -
5
Network Restoration for Next-Generation Communication and Computing Networks
Published 2018-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
6
PERFORMANCE REQUIRED FOR COMMON-USE COMPONENTS OF COMPUTER NETWORKS
Published 2024-09-01“…Sometimes, in practice, simple solutions of quick preliminary estimation of basic characteristics of a computer network are needed.In this aim, the backbone subnet and server set of wide area computer networks are examined. …”
Get full text
Article -
7
Optimal Management of Computer Network Security in the Era of Big Data
Published 2022-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
8
Online auction-based resource scheduling in grid computing networks
Published 2016-10-01Get full text
Article -
9
Juveniles as victims of criminal acts committed under the misuse of computer network
Published 2018-01-01“…A special segment of technological development where such misuses are increasingly present are computer networks. Such fear is further expressed when it comes to juveniles, who, due to the characteristics of this development period, represent easy targets, which often leads to serious and long-term consequences. …”
Get full text
Article -
10
A Classical LTE Cellular System Simulator for Computer Network Education
Published 2021-01-01“…In this study, a classical LTE cellular system simulator is proposed as a testbed to aid the education of computer networks at college. The proposed simulator is an extension of the functionality of LTE-Sim frameworks. …”
Get full text
Article -
11
Distributed Task Offloading Game in Multiserver Mobile Edge Computing Networks
Published 2020-01-01Get full text
Article -
12
Text analysis of DNS queries for data exfiltration protection of computer networks
Published 2020-09-01Subjects: Get full text
Article -
13
Dynamics of a Delayed Model for the Transmission of Malicious Objects in Computer Network
Published 2014-01-01“…An SEIQRS model for the transmission of malicious objects in computer network with two delays is investigated in this paper. …”
Get full text
Article -
14
Hunting the Pertinency of Bloom Filter in Computer Networking and Beyond: A Survey
Published 2019-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
15
Is low‐rate distributed denial of service a great threat to the Internet?
Published 2021-09-01Subjects: Get full text
Article -
16
New strategies to solve multi criteria optimization problems applying a computer network
Published 2003-12-01“…The experiments with a computer network suggest a more effective strategy to solve a problem applying a single computer. …”
Get full text
Article -
17
Multi-tenant computing network resource allocation algorithm based on deep reinforcement learning
Published 2024-12-01“…With the rapid advancement of intelligent businesses, the pre-existing relationship between traditional network architectures and computing capabilities has made it difficult to meet the current demands, making the implementation of computing-network convergence inevitable. Under the new computing power network framework brought about by the convergence of computing networks, efficient and intelligent resource scheduling strategy has become a key link to improve user experience. …”
Get full text
Article -
18
-
19
Revolutionizing load harmony in edge computing networks with probabilistic cellular automata and Markov decision processes
Published 2025-01-01“…Abstract In general, edge computing networks are based on a distributed computing environment and hence, present some difficulties to obtain an appropriate load balancing, especially under dynamic workload and limited resources. …”
Get full text
Article -
20
Deterministic and Stochastic Study for an Infected Computer Network Model Powered by a System of Antivirus Programs
Published 2017-01-01“…This model describes the spread of viruses into an infected computer network which is powered by a system of antivirus software. …”
Get full text
Article