Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Security measures 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
1
Adaptive and survivable trust management for Internet of Things systems
Published 2021-09-01Subjects: “…computer network management…”
Get full text
Article -
2
Improved meet‐in‐the‐middle attacks on reduced‐round Joltik‐BC
Published 2021-05-01Subjects: Get full text
Article -
3
LDoS attack detection method based on traffic classification prediction
Published 2022-03-01Subjects: “…computer network security…”
Get full text
Article -
4
A behavioural in‐depth analysis of ransomware infection
Published 2021-01-01Subjects: Get full text
Article -
5
STCP: A Novel Approach for Congestion Control in IoT Environment
Published 2022-03-01Subjects: Get full text
Article -
6
Penerapan Static VLAN Dan Access List Untuk Meningkatkan Keamanan Jaringan
Published 2019-10-01Subjects: Get full text
Article -
7
Propuesta de diseño de una red LAN para el Hospital Pediátrico Universitario Borrás-Marfán
Published 2023-03-01Subjects: “…lan network, computer network, telecommunications, design.…”
Get full text
Article -
8
Authorisation inconsistency in IoT third‐party integration
Published 2022-03-01Subjects: Get full text
Article -
9
Network traffic anomaly detection model based on feature grouping and multi‐autoencoders integration
Published 2024-12-01Subjects: “…computer network security…”
Get full text
Article -
10
On the performance of non‐profiled side channel attacks based on deep learning techniques
Published 2023-05-01Subjects: “…computer network security…”
Get full text
Article -
11
Comparative analysis of VPN protocols
Published 2023-06-01Subjects: “…computer network; cloud computing; virtual private network…”
Get full text
Article -
12
HealthChain: A blockchain‐based framework for secure and interoperable electronic health records (EHRs)
Published 2024-12-01Subjects: Get full text
Article -
13
An unsupervised approach for the detection of zero‐day distributed denial of service attacks in Internet of Things networks
Published 2024-09-01Subjects: “…computer network security…”
Get full text
Article -
14
Preserving Local Wisdom through Subak Analogy Videos for Teaching Computer Network Concepts
Published 2025-03-01Subjects: Get full text
Article -
15
Evaluating model and simulation analyzing for P2P Churn
Published 2007-01-01Subjects: “…computer network;peer to peer;evaluating model;Churn…”
Get full text
Article -
16
Evaluating model and simulation analyzing for P2P Churn
Published 2007-01-01Subjects: “…computer network…”
Get full text
Article -
17
A fast user actual privilege reasoning framework based on privilege dependency graph reduction
Published 2023-05-01Subjects: “…computer network security…”
Get full text
Article -
18
SIMULATION OF COMPUTER NETWORK LOAD PARAMETERS OVER A GIVEN PERIOD OF TIME
Published 2019-09-01Subjects: “…computer network…”
Get full text
Article -
19
Computer network operations and ‘rule-with-law’ in Australia
Published 2017-03-01Subjects: “…Computer network operations…”
Get full text
Article -
20
Computer technology and Its Application in statistical measurement of college English education
Published 2025-12-01Subjects: “…Computer network…”
Get full text
Article