Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Social media 3
- Computer security 2
- Information technology 2
- Internet 2
- Law and legislation 2
- Legal ethics 2
- Moral and ethical aspects 2
- Online social networks 2
- Social networks 2
- Access control 1
- Binnary 1
- Business networks 1
- COMPUTERS / Desktop Applications / Suites 1
- Censorship 1
- Cloud computing 1
- Computer network protocols 1
- Computer software 1
- Computer systems 1
- Cultural policy 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Digital Circuits 1
- Distributed processing 1
- Electric circuit analysis 1
- Electric network analysis 1
- Electronic data processing 1
- Ethnicity 1
-
3781
Design and Implementation of Protocols Association Scbeme on Iu-PS Interface in TD-SCDMA Network
Published 2014-09-01Subjects: “…TD-SCDMA network…”
Get full text
Article -
3782
Network Anomaly Prediction Method Based on Big Data
Published 2014-06-01Subjects: “…network management…”
Get full text
Article -
3783
Knowledge triple extraction in cybersecurity with adversarial active learning
Published 2020-10-01Subjects: Get full text
Article -
3784
3D data augmentation and dual-branch model for robust face forgery detection
Published 2025-03-01Subjects: “…Dual-branch network…”
Get full text
Article -
3785
Research and verification of cement smart factory solution based on 5G MEC
Published 2022-12-01Subjects: “…5G private network…”
Get full text
Article -
3786
Autoencoder neural network-based abnormal data detection in edge computing enabled large-scale IoT systems
Published 2018-12-01Subjects: “…autoencoder neural network…”
Get full text
Article -
3787
Node-link simultaneous mapping based multi-type service resource orchestration algorithm
Published 2024-04-01Subjects: Get full text
Article -
3788
Traffic scheduling method based on segment routing in software-defined networking
Published 2018-11-01Subjects: Get full text
Article -
3789
A multi-source threat intelligence confidence value evaluation method based on machine learning
Published 2020-01-01Subjects: Get full text
Article -
3790
Few-Shot Graph Anomaly Detection via Dual-Level Knowledge Distillation
Published 2025-01-01Subjects: Get full text
Article -
3791
Reconfigurable Integrated Photonic Unitary Neural Networks With Phase Encoding Enabled by In-Situ Training
Published 2024-01-01Subjects: “…photonic unitary neural network…”
Get full text
Article -
3792
Fault detection and diagnosis method for heterogeneous wireless network based on GAN
Published 2020-08-01Subjects: “…heterogeneous wireless network…”
Get full text
Article -
3793
Orchestration mechanism for VNF hardware acceleration resources in SDN/NFV architecture
Published 2018-06-01Subjects: Get full text
Article -
3794
Energy-efficient and QoS-supported deployment strategy of dense Macro-Femto cellular network
Published 2018-07-01Subjects: “…heterogeneous cellular network…”
Get full text
Article -
3795
Analysis of correspondence property for security protocols
Published 2006-01-01Subjects: “…network security…”
Get full text
Article -
3796
Data red envelope clients mining and communication model based on social network analysis
Published 2020-08-01Subjects: “…social network analysis…”
Get full text
Article -
3797
Research on Network Selection Algorithm Based on User Preference in Heterogeneous System
Published 2014-06-01Subjects: “…network selection…”
Get full text
Article -
3798
Bayesian predictive system for assessing the damage intensity of residential masonry buildings under the impact of continuous ground deformation
Published 2025-01-01Subjects: Get full text
Article -
3799
Saisir les liens entre trame bleue, paysages de l’eau et projets urbains
Published 2019-06-01Subjects: Get full text
Article -
3800
Elevating the Antagonist Encounter: How the ‘Stitch’ Transforms Victimhood Contestation on TikTok
Published 2024-10-01Subjects: Get full text
Article