Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Computer security 2
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
1
Is low‐rate distributed denial of service a great threat to the Internet?
Published 2021-09-01Subjects: Get full text
Article -
2
Evaluating model and simulation analyzing for P2P Churn
Published 2007-01-01Subjects: “…computer network…”
Get full text
Article -
3
FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial–temporal modelling
Published 2023-07-01Subjects: “…computer network security…”
Get full text
Article -
4
Network-based malcode detection technology
Published 2007-01-01Subjects: “…computer network…”
Get full text
Article -
5
GBSS:researches on group-based semantic search
Published 2006-01-01Subjects: “…computer network…”
Get full text
Article -
6
Large scale network worm detection using automatic signature extraction
Published 2006-01-01Subjects: “…computer network…”
Get full text
Article -
7
PCA mix‐based Hotelling's T2 multivariate control charts for intrusion detection system
Published 2022-05-01Subjects: “…computer network security…”
Get full text
Article -
8
Research on range matching for wire-speed hardware NIDS
Published 2006-01-01Subjects: “…computer network…”
Get full text
Article -
9
Research and Achievement of Redundancy Elimination of Backbone Network
Published 2013-09-01Subjects: “…computer network…”
Get full text
Article -
10
Universal active network architecture and prototype application based on mobile agent technology
Published 2005-01-01Subjects: “…computer network…”
Get full text
Article -
11
Congestion control algorithm for unreliable unicast traffic
Published 2008-01-01Subjects: “…computer network…”
Get full text
Article -
12
Bayesian-network-approximate-reasoning-based method for network vulnerabilities evaluation
Published 2008-01-01Subjects: “…computer network…”
Get full text
Article -
13
Integrating PCA and DEA techniques for strategic assessment of network security
Published 2023-03-01Subjects: Get full text
Article -
14
Research on Architecture and Energy-Saving Mechanism of Reconfigurable Flexible Network
Published 2013-09-01Subjects: “…computer network…”
Get full text
Article -
15
Research on fault prediction of computer network nodes driven by log information
Published 2024-08-01Subjects: Get full text
Article -
16
Text analysis of DNS queries for data exfiltration protection of computer networks
Published 2020-09-01Subjects: Get full text
Article -
17
Computer Networks : principles, technologies, and protocols for network design /
Published 2006Subjects: “…Computer networks Textbooks. 3870…”
Table of contents only
Publisher description
View in OPAC
Book -
18
A Control-Theoretical Zero-Knowledge Proof Scheme for Networked Control Systems
Published 2024-01-01Subjects: “…Computer/network security…”
Get full text
Article -
19
An optimal defensive deception framework for the container‐based cloud with deep reinforcement learning
Published 2022-05-01Subjects: Get full text
Article -
20