Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Computer security 2
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
261
Influence of Psychological Stress and Moderate Physical Activity in Cardiovascular Reactivity
Published 2018-09-01“…For that a total of 30 bibliographic sources, among them 2 books and a number of articles from scientific journals, accessed through the main managers the computer network. It was concluded that psychological stress and aerobic physical exercises influence antagonistically on cardiovascular reactivity.…”
Get full text
Article -
262
Computing Fault-Tolerant Metric Dimension of Connected Graphs
Published 2022-01-01“…For a connected graph, the concept of metric dimension contributes an important role in computer networking and in the formation of chemical structures. …”
Get full text
Article -
263
Inflammatory Acute Response. Biochemical and Cellular Considerations
Published 2015-02-01“…The present work aimed at argumenting on the mechanisms that explain the vascular changes, and the establishment of the signs of the acute inflammatory response with an in-depth molecular level. 18 articles of scientific magazines, 2 books and other sources of information that was accessed by means of the principal managers of the computer network, adding up a total of 20 sources, were consulted. …”
Get full text
Article -
264
Physiopathological Mechanisms of Association between Metabolic Syndrome and Arterial Hypertension: an Update
Published 2023-02-01“…For this, a total of 29 bibliographic sources were consulted, including articles from scientific journals, 3 books and others accessed through the main managers of the computer network. Hypertension and dyslipidemia often occur together and also accompany resistance to insulin-stimulated glucose uptake; factors that often accompany obesity. …”
Get full text
Article -
265
Network Anomaly Detection System with Optimized DS Evidence Theory
Published 2014-01-01“…Network anomaly detection has been focused on by more people with the fast development of computer network. Some researchers utilized fusion method and DS evidence theory to do network anomaly detection but with low performance, and they did not consider features of network—complicated and varied. …”
Get full text
Article -
266
On Elegant Labelling and Magic Labelling of Large-Scale Graphs
Published 2022-01-01Get full text
Article -
267
Analysis of attacks on device manager in software-defined Internet of Things
Published 2017-08-01“…Software-defined networking is a recent advance in computer networking that redefines the network paradigm for future communication, and the advantages of software-defined networking can also be applied to Internet of Things, namely as software-defined Internet of Things. …”
Get full text
Article -
268
Financial Data Anomaly Detection Method Based on Decision Tree and Random Forest Algorithm
Published 2022-01-01“…The fast-developing computer network not only brings convenience to people but also brings security problems to people due to the appearance of various abnormal flows. …”
Get full text
Article -
269
An adaptive intrusion detection and prevention system for Internet of Things
Published 2019-11-01“…The revolution of computer network technologies and telecommunication technologies increases the number of Internet users enormously around the world. …”
Get full text
Article -
270
A Prerecognition Model for Hot Topic Discovery Based on Microblogging Data
Published 2014-01-01Get full text
Article -
271
Implementation of lightweight intrusion detection model for security of smart green house and vertical farm
Published 2018-04-01“…Nevertheless, current network forensics is still unable to fully monitor and analyze computer network traffic to gather the evidences of malicious attacks or intrusions. …”
Get full text
Article -
272
The role of the Internet in the modern life of children and teenagers: analysis of a sociological survey
Published 2023-03-01“…Achievements in the field of technology, which serve as the foundation of the emerging modern information society, have led to the rapid development of the Internet – a global computer network. The Internet is a mean of social communication that has both positive and negative effects on the global community. …”
Get full text
Article -
273
Dynamic QoS-aware intelligent edge computing resource management algorithm for body area networks
Published 2024-12-01“…The existing resource allocation methods in edge computing network are difficult to efficiently and flexibly support dynamic QoS of multi-source heterogeneous tasks in BAN. …”
Get full text
Article -
274
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01“…About 32% of these companies have the controls at the level of computer network, 22% of them have the control at the operating system level, while 38% have the control at the software application level. …”
Get full text
Article -
275
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01“…About 32% of these companies have the controls at the level of computer network, 22% of them have the control at the operating system level, while 38% have the control at the software application level. …”
Get full text
Article -
276
Regional experience in organizing the protection of minors from a destructive information environment (by the example of non-central regions)
Published 2023-03-01“…Achievements in the field of new technologies, on which the formation of the modern information society is based, have led to the rapid development of the global computer network Internet. The Internet as a means of social communication has both a positive impact on the world community and has negative consequences. …”
Get full text
Article -
277
Leveraging Fog Computing for Scalable IoT Datacenter Using Spine-Leaf Network Topology
Published 2017-01-01“…Consequently, a spine-leaf Fog computing network (SL-FCN) is presented for reducing latency and network congestion issues in a highly distributed and multilayer virtualized IoT datacenter environment. …”
Get full text
Article -
278
Knee Point Search Using Cascading Top-k Sorting with Minimized Time Complexity
Published 2013-01-01Get full text
Article -
279
A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings
Published 2014-01-01“…As people in modern societies are busier than any human era and computer network has profound impact on how people work and live through fast and convenient information exchange, people need more help from each other to accomplish more work via network connections in limited period of time. …”
Get full text
Article -
280
Interface Data Modeling to Detect and Diagnose Intersystem Faults for Designing and Integrating System of Systems
Published 2018-01-01“…The software that supports the modeling is implemented using the following concepts: (1) a model-view-viewmodel pattern for overall software design and (2) a computer network for representing sequential properties of field interpretations. …”
Get full text
Article