Works matching Computer Networks
Results: 5000
ДЕКОМПОЗИЦІЯ ТЕХНОЛОГІЇ КОМП’ЮТЕРНИХ МЕРЕЖ ПРИ ЇХ ПРОЕКТУВАННІ.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2023, v. 29, n. 3, p. 130, doi. 10.18372/2225-5036.29.18072
- By:
- Publication type:
- Article
Better Realization of Mobile Cloud Computing Using Mobile Network Computers.
- Published in:
- Wireless Personal Communications, 2020, v. 111, n. 3, p. 1805, doi. 10.1007/s11277-019-06958-y
- By:
- Publication type:
- Article
Mobile Network Computers Should be the Terminal of Mobile Communication Networks.
- Published in:
- Wireless Personal Communications, 2015, v. 85, n. 4, p. 1895, doi. 10.1007/s11277-015-2878-0
- By:
- Publication type:
- Article
The first propaganda war through computer networks: STEM academia and the breakup of Yugoslavia.
- Published in:
- Internet Histories, 2023, v. 7, n. 2, p. 179, doi. 10.1080/24701475.2021.1992992
- By:
- Publication type:
- Article
Concurrent Design of a Computer Network for x-abilities using MADM Approach.
- Published in:
- Concurrent Engineering: Research & Applications, 2008, v. 16, n. 3, p. 187, doi. 10.1177/1063293X08096179
- By:
- Publication type:
- Article
THE METHOD OF OPTIMIZING THE DISTRIBUTION OF RADIO SUPPRESSION MEANS AND DESTRUCTIVE SOFTWARE INFLUENCE ON COMPUTER NETWORKS.
- Published in:
- Radio Electronics, Computer Science, Control, 2023, n. 4, p. 16, doi. 10.15588/1607-3274-2023-4-2
- By:
- Publication type:
- Article
Model of Threats to Computer Network Software.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 12, p. 1506, doi. 10.3390/sym11121506
- By:
- Publication type:
- Article
EVALUAREA SECURITĂTII RETELELOR DE CALCULATOARE SI SOLUTII PRACTICE DE ADMINISTRARE.
- Published in:
- Studii şi Cercetări de Calcul Economic şi Cibernetică Economică, 2011, v. 45, n. 1/2, p. 95
- By:
- Publication type:
- Article
Toward A Secure Single Sign-On Mechanism for Distributed Computer Networks.
- Published in:
- Computer Journal, 2015, v. 58, n. 4, p. 934, doi. 10.1093/comjnl/bxu014
- By:
- Publication type:
- Article
The Effectiveness of Web-Based Mobile Learning for Mobile Subjects on Computers and Basic Networks in Vocational High Schools.
- Published in:
- International Journal of Interactive Mobile Technologies, 2023, v. 17, n. 9, p. 20, doi. 10.3991/ijim.v17i09.39337
- By:
- Publication type:
- Article
МЕТОДИ ПРОГНОЗУВАННЯ ПОТОКІВ У КОМП‘ЮТЕРНИХ МЕРЕЖАХ НА ОСНОВІ АПРОКСИМАЦІЇ ПАДЕ
- Published in:
- Science-Based Technologies, 2020, v. 46, n. 2, p. 191, doi. 10.18372/2310-5461.46.14814
- By:
- Publication type:
- Article
OPTIMIZATION OF COMPUTER NETWORK SECURITY SYSTEM BASED ON IMPROVED NEURAL NETWORK ALGORITHM AND DATA SEARCHING.
- Published in:
- Scalable Computing: Practice & Experience, 2024, v. 25, n. 5, p. 3979, doi. 10.12694/scpe.v25i5.3150
- By:
- Publication type:
- Article
NETWORK VIRUS AND COMPUTER NETWORK SECURITY DETECTION TECHNOLOGY OPTIMIZATION.
- Published in:
- Scalable Computing: Practice & Experience, 2021, v. 22, n. 2, p. 161, doi. 10.12694/scpe.v22i2.1881
- By:
- Publication type:
- Article
Reliability evaluation according to a routing scheme for multi-state computer networks under assured accuracy rate.
- Published in:
- Annals of Operations Research, 2016, v. 244, n. 1, p. 221, doi. 10.1007/s10479-014-1673-8
- By:
- Publication type:
- Article
An Integrated Framework for Learning Fundamentals in Computer Networks.
- Published in:
- Computers in Education Journal, 2019, v. 10, n. 3, p. 1
- By:
- Publication type:
- Article
Research on Application of Artificial Intelligence in Computer Network Technology.
- Published in:
- International Journal of Pattern Recognition & Artificial Intelligence, 2019, v. 33, n. 5, p. N.PAG, doi. 10.1142/S0218001419590158
- By:
- Publication type:
- Article
Big Data Security Management Countermeasures in the Prevention and Control of Computer Network Crime.
- Published in:
- Journal of Global Information Management, 2022, v. 30, n. 7, p. 1, doi. 10.4018/JGIM.295450
- By:
- Publication type:
- Article
Research on Environment Monitoring of Network Computer Rooms in Colleges and Universities Based on The Internet of Things Technology.
- Published in:
- Wireless Personal Communications, 2023, v. 128, n. 4, p. 2453, doi. 10.1007/s11277-022-10051-2
- By:
- Publication type:
- Article
USING THE SECURITY NETWORK SCANNER GFI LANGUARD TO DISCOVER AND IMPROVE THE VULNERABILITIES IN THE COMPUTER NETWORK SYSTEMS.
- Published in:
- Journal Scientific & Applied Research, 2013, v. 4, p. 74, doi. 10.46687/jsar.v4i1.83
- By:
- Publication type:
- Article
CONSIDERATIONS ABOUT COMPUTER NETWORKS SECURITY UNDER VARIOUS OPERATING SYSTEMS.
- Published in:
- Journal of Applied Quantitative Methods, 2010, v. 5, n. 4, p. 571
- By:
- Publication type:
- Article
Spreading in scale-free computer networks with improved clustering.
- Published in:
- International Journal of Modern Physics B: Condensed Matter Physics; Statistical Physics; Applied Physics, 2018, v. 32, n. 28, p. N.PAG, doi. 10.1142/S0217979218503095
- By:
- Publication type:
- Article
SYSTEM RELIABILTIY WITH ROUTING SCHEME FOR A STOCHASTIC COMPUTER NETWORK UNDER ACCURACY RATE.
- Published in:
- International Journal of Industrial Engineering, 2013, v. 20, n. 5/6, p. 319
- By:
- Publication type:
- Article
Development of a Method for Determining the List of Key Threats to Information Security of Computer Networks.
- Published in:
- International Journal of Safety & Security Engineering, 2023, v. 13, n. 6, p. 1039, doi. 10.18280/ijsse.130606
- By:
- Publication type:
- Article
Analysis and implementation of computer network graph based on iterative control algorithm theory.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2023, v. 27, n. 23, p. 18113, doi. 10.1007/s00500-023-09222-5
- By:
- Publication type:
- Article
Application and Analysis of Computer Network Technology in Electronic Information Engineering.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2022, v. 26, n. 16, p. 7773, doi. 10.1007/s00500-022-06775-9
- By:
- Publication type:
- Article
MATHEMATICAL MODELS OF EFFECTIVE TOPOLOGY OF COMPUTER NETWORKS FOR ELECTRIC POWER SUPPLY CONTROL ON RAILWAY TRANSPORT.
- Published in:
- Komunikácie, 2022, v. 24, n. 2, p. C27, doi. 10.26552/com.C.2022.2.C27-C32
- By:
- Publication type:
- Article
Modelling Reliability Characteristics of Technical Equipment of Local Area Computer Networks.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 8, p. 955, doi. 10.3390/electronics10080955
- By:
- Publication type:
- Article
Virtual monitoring method for computer network security in earth observation communication using multi ant colony random walk classification algorithm.
- Published in:
- Earth Science Informatics, 2024, v. 17, n. 4, p. 3673, doi. 10.1007/s12145-024-01369-5
- By:
- Publication type:
- Article
Research on computer network security evaluation based on image recognition and neural network.
- Published in:
- Journal of Electronic Imaging, 2023, v. 32, n. 1, p. 11214, doi. 10.1117/1.JEI.32.1.011214
- By:
- Publication type:
- Article
Important Role Of Operating System In Computer Network Connection.
- Published in:
- Dinasti International Journal of Education Management & Social Science, 2024, v. 6, n. 2, p. 1251, doi. 10.38035/dijemss.v6i2.3658
- By:
- Publication type:
- Article
Computer Network Reliability Optimization Calculation Based on Genetic Algorithm.
- Published in:
- Telkomnika, 2013, v. 11, n. 3, p. 603, doi. 10.12928/telkomnika.v11i3.1145
- By:
- Publication type:
- Article
Capacity Optimization in Dynamically Routing Computer Network Systems.
- Published in:
- Technical Journal / Tehnički Glasnik, 2022, v. 16, n. 1, p. 23, doi. 10.31803//tg-20201215233216
- By:
- Publication type:
- Article
ETHICAL ROLES IN COMPUTER NETWORKS.
- Published in:
- International Journal of Ethics (1556-4444), 2014, v. 10, n. 4, p. 375
- By:
- Publication type:
- Article
Application Research of Computer-aided Teaching Based on Network in College English Teaching Reform.
- Published in:
- Educational Sciences: Theory & Practice, 2018, v. 18, n. 5, p. 1765, doi. 10.12738/estp.2018.5.076
- By:
- Publication type:
- Article
The Internet as a transnational project: connecting Central America through computer networks (1990-1996).
- Published in:
- Internet Histories, 2018, v. 2, n. 3/4, p. 230, doi. 10.1080/24701475.2018.1500793
- By:
- Publication type:
- Article
Building community among museum information professionals: a case study of the Museum Computer Network.
- Published in:
- 2013
- By:
- Publication type:
- Case Study
Use of Pre-web Computer Networks to Give Information About the Attacks on Dubrovnik and Vukovar .
- Published in:
- Collegium Antropologicum, 2022, v. 46, n. 4, p. 271, doi. 10.5671/ca.46.4.2
- By:
- Publication type:
- Article
SECURITY OF COMPUTER NETWORKS IMPLEMENTED IN UNIVERSITIES AND BUSINESS ENVIRONMENT.
- Published in:
- Hyperion International Journal of Econophysics & New Economy, 2014, v. 7, n. 2, p. 305
- By:
- Publication type:
- Article
Las redes informáticas como un problema social de la ciencia y la tecnología en la comunidad universitaria.
- Published in:
- Opuntia Brava, 2022, v. 14, n. 4, p. 268
- By:
- Publication type:
- Article
Assessing Computer Network Efficiency Using Data Envelopment Analysis and Multicriteria Decision Analysis Techniques.
- Published in:
- Journal of Multi-Criteria Decision Analysis, 2015, v. 22, n. 5/6, p. 260, doi. 10.1002/mcda.1533
- By:
- Publication type:
- Article
Detecting weak dependence in computer network traffic patterns by using higher criticism.
- Published in:
- Journal of the Royal Statistical Society: Series C (Applied Statistics), 2019, v. 68, n. 3, p. 641, doi. 10.1111/rssc.12325
- By:
- Publication type:
- Article
WNetSim: a web-based computer network simulator.
- Published in:
- International Journal of Electrical Engineering Education, 2009, v. 46, n. 4, p. 383, doi. 10.7227/IJEEE.46.4.7
- By:
- Publication type:
- Article
Packet Inter-arrival Time Distribution in Academic Computer Network.
- Published in:
- Electronics & Electrical Engineering, 2014, v. 20, n. 3, p. 87, doi. 10.5755/j01.eee.20.3.6683
- By:
- Publication type:
- Article
Computer Network Simulation of Firewall and VoIP Performance Monitoring.
- Published in:
- International Journal of Online Engineering, 2018, v. 14, n. 9, p. 4, doi. 10.3991/ijoe.v14i09.8508
- By:
- Publication type:
- Article
The Application of Computer Network in Ideological and Political Education.
- Published in:
- International Journal of Simulation: Systems, Science & Technology, 2015, v. 16, n. 4A, p. 9.1, doi. 10.2013/IJSSST.a.16.4A.09
- By:
- Publication type:
- Article
Synchronized Pair Configuration in Virtualization-Based Lab for Learning Computer Networks.
- Published in:
- Educational Technology & Society, 2017, v. 20, n. 3, p. 54
- By:
- Publication type:
- Article
Analysis of Students' Performances during Lab Sessions of Computer Networks Course.
- Published in:
- Educational Technology & Society, 2013, v. 16, n. 3, p. 329
- By:
- Publication type:
- Article
Detecting Intrusions in Computer Network Traffic with Machine Learning Approaches.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2020, v. 13, n. 3, p. 433, doi. 10.22266/ijies2020.0630.39
- By:
- Publication type:
- Article
АНАЛІТИЧНЕ КОНСТРУЮВАННЯ СИСТЕМИ ОПТИМАЛЬНОГО УПРАВЛІННЯ КОМП'ЮТЕРНОЮ МЕРЕЖЕЮ
- Published in:
- Science-Based Technologies, 2019, v. 43, n. 4, p. 417, doi. 10.18372/2310-5461.44.14317
- By:
- Publication type:
- Article
ЗАБЕЗПЕЧЕННЯ ІНФОРМАЦІЙНОЇ БЕЗПЕКИ КОМП’ЮТЕРНОЇ МЕРЕЖІ АВІАКОМПАНІЇ
- Published in:
- Ukrainian Scientific Journal of Information Security, 2019, v. 25, n. 3, p. 134, doi. 10.18372/2225-5036.25.14457
- By:
- Publication type:
- Article