Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Computer security 2
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
21
Deterministic and Stochastic Study for an Infected Computer Network Model Powered by a System of Antivirus Programs
Published 2017-01-01“…This model describes the spread of viruses into an infected computer network which is powered by a system of antivirus software. …”
Get full text
Article -
22
-
23
Principles of Information Security /
Published 2016Subjects: “…Computer networks Security measures. 6783…”
View in OPAC
Book -
24
The Internet Book : everything you need to know about computer networking and how the Internet works /
Published 2019Subjects: View in OPAC
Book -
25
Securing the Clicks : network security in the age of social media /
Published 2012Subjects: “…Computer networks Security measures. 8590…”
View in OPAC
Book -
26
-
27
Is low‐rate distributed denial of service a great threat to the Internet?
Published 2021-09-01Subjects: Get full text
Article -
28
FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial–temporal modelling
Published 2023-07-01Subjects: “…computer network security…”
Get full text
Article -
29
The practice of cloud system administration : designing and operating large distributed systems /
Published 2015Subjects: “…Computer networks Management. 14156…”
View in OPAC
Book -
30
PCA mix‐based Hotelling's T2 multivariate control charts for intrusion detection system
Published 2022-05-01Subjects: “…computer network security…”
Get full text
Article -
31
Integrating PCA and DEA techniques for strategic assessment of network security
Published 2023-03-01Subjects: Get full text
Article -
32
-
33
Task Offloading Optimization Using PSO in Fog Computing for the Internet of Drones
Published 2024-12-01Subjects: Get full text
Article -
34
An optimal defensive deception framework for the container‐based cloud with deep reinforcement learning
Published 2022-05-01Subjects: Get full text
Article -
35
Corrigendum to “Implementation and Evaluation of WLAN 802.11ac for Residential Networks in NS-3”
Published 2018-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
36
Cooperative and Adaptive Network Coding for Gradient Based Routing in Wireless Sensor Networks with Multiple Sinks
Published 2017-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
37
On Internet Traffic Classification: A Two-Phased Machine Learning Approach
Published 2016-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
38
Multistage System-Based Machine Learning Techniques for Intrusion Detection in WiFi Network
Published 2019-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
39
Analyzing the Evolution and the Future of the Internet Topology Focusing on Flow Hierarchy
Published 2015-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
40
Resource Allocation in D2D-Enabled 5G Networks Using Multiagent Reinforcement Learning
Published 2024-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article