Works matching DE "COMPUTER network monitoring"
Results: 231
Batch-Free Event Sequence Pattern Mining for Communication Stream Data with Instant and Persistent Events.
- Published in:
- Wireless Personal Communications, 2019, v. 105, n. 2, p. 673, doi. 10.1007/s11277-018-5985-x
- By:
- Publication type:
- Article
Energy Efficient Data Collection Algorithm for Mobile Wireless Sensor Network.
- Published in:
- Wireless Personal Communications, 2019, v. 105, n. 1, p. 219, doi. 10.1007/s11277-018-6109-3
- By:
- Publication type:
- Article
An Improved Pillar K-Means Based Protocol for Privacy-Preserving Location Monitoring in Wireless Sensor Network.
- Published in:
- Wireless Personal Communications, 2018, v. 101, n. 2, p. 915, doi. 10.1007/s11277-018-5733-2
- By:
- Publication type:
- Article
Event Driven Network Topology Discovery and Inventory Listing Using REAMS.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 3, p. 415, doi. 10.1007/s11277-015-3061-3
- By:
- Publication type:
- Article
End-to-End Network Performance Management Framework Based on Case-Based Reasoning.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 1, p. 69, doi. 10.1007/s11277-015-3157-9
- By:
- Publication type:
- Article
Tracking via Square Grid of RFID Reader Positioning and Diffusion Algorithm.
- Published in:
- Wireless Personal Communications, 2011, v. 61, n. 1, p. 227, doi. 10.1007/s11277-010-0021-9
- By:
- Publication type:
- Article
RPSF: A Routing Protocol with Selective Forwarding for Mobile Ad-Hoc Networks.
- Published in:
- Wireless Personal Communications, 2007, v. 43, n. 2, p. 411, doi. 10.1007/s11277-006-9231-6
- By:
- Publication type:
- Article
CHATTER MATTERS.
- Published in:
- Marketing Research, 2011, v. 23, n. 3, p. 22
- By:
- Publication type:
- Article
Performance Analysis of Open-Source Network Monitoring Software in Wireless Network.
- Published in:
- Journal of Computing Research & Innovation, 2023, v. 8, n. 2, p. 31, doi. 10.24191/jcrinn.v8i2.375
- By:
- Publication type:
- Article
ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks.
- Published in:
- Wireless Networks (10220038), 2009, v. 15, n. 4, p. 525, doi. 10.1007/s11276-007-0067-0
- By:
- Publication type:
- Article
A Machine Learning Operations (MLOps) Monitoring Model Using BI-LSTM and SARSA Algorithms.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 10, p. 583, doi. 10.14569/ijacsa.2024.0151060
- By:
- Publication type:
- Article
Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network Topology.
- Published in:
- International Journal of Digital Crime & Forensics, 2023, v. 15, n. 1, p. 1, doi. 10.4018/IJDCF.317100
- By:
- Publication type:
- Article
Statistical analysis of Snort alarms for a medium-sized network.
- Published in:
- Journal of Information System Security, 2011, v. 7, n. 3, p. 17
- By:
- Publication type:
- Article
A NAÏVE BAYES CLASSIFIER FOR WEB DOCUMENT SUMMARIES CREATED BY USING WORD SIMILARITY AND SIGNIFICANT FACTORS.
- Published in:
- International Journal on Artificial Intelligence Tools, 2010, v. 19, n. 4, p. 465, doi. 10.1142/S0218213010000285
- By:
- Publication type:
- Article
Western Regional News and Comments.
- Published in:
- North American Bird Bander, 2011, v. 36, n. 3, p. 133
- By:
- Publication type:
- Article
Un modelo multifractal simplificado para flujos de tráfico en redes de computadoras de alta velocidad.
- Published in:
- INGENIARE - Revista Chilena de Ingeniería, 2013, v. 21, n. 3, p. 408
- By:
- Publication type:
- Article
Robust detection and reconstruction of state and sensor attacks for cyber-physical systems using sliding modes.
- Published in:
- IET Control Theory & Applications (Wiley-Blackwell), 2017, v. 11, n. 11, p. 1756, doi. 10.1049/iet-cta.2016.1313
- By:
- Publication type:
- Article
Security analysis of cyber-physical systems using X² norm.
- Published in:
- IET Control Theory & Applications (Wiley-Blackwell), 2017, v. 11, n. 11, p. 1749, doi. 10.1049/iet-cta.2016.1391
- By:
- Publication type:
- Article
SecHMS- A Secure Hybrid Monitoring Scheme for Cloud Data Monitoring.
- Published in:
- EAI Endorsed Transactions on Scalable Information Systems, 2021, v. 8, n. 30, p. 1, doi. 10.4108/eai.23-10-2020.166719
- By:
- Publication type:
- Article
Probe generation for active probing.
- Published in:
- International Journal of Network Management, 2018, v. 28, n. 4, p. 1, doi. 10.1002/nem.2021
- By:
- Publication type:
- Article
Online traffic prediction in the cloud.
- Published in:
- International Journal of Network Management, 2016, v. 26, n. 4, p. 269, doi. 10.1002/nem.1934
- By:
- Publication type:
- Article
Multi-granular, multi-purpose and multi-Gb/s monitoring on off-the-shelf systems.
- Published in:
- International Journal of Network Management, 2014, v. 24, n. 4, p. 221, doi. 10.1002/nem.1861
- By:
- Publication type:
- Article
Flow-based Approaches in Network Management: Recent Advances and Future Trends.
- Published in:
- 2014
- By:
- Publication type:
- Editorial
Similarity as a central approach to flow-based anomaly detection.
- Published in:
- International Journal of Network Management, 2014, v. 24, n. 4, p. 318, doi. 10.1002/nem.1867
- By:
- Publication type:
- Article
Performance Modeling for Relay Cooperation in Delay Tolerant Networks.
- Published in:
- Mobile Networks & Applications, 2013, v. 18, n. 2, p. 186, doi. 10.1007/s11036-012-0357-3
- By:
- Publication type:
- Article
An Automatic Presence Service for Low Duty-Cycled Mobile Sensor Networks.
- Published in:
- Mobile Networks & Applications, 2011, v. 16, n. 4, p. 460, doi. 10.1007/s11036-011-0326-2
- By:
- Publication type:
- Article
A Simplified Internet Routing Architecture.
- Published in:
- Mobile Networks & Applications, 2011, v. 16, n. 4, p. 433, doi. 10.1007/s11036-011-0320-8
- By:
- Publication type:
- Article
Body Area Networks: A Survey.
- Published in:
- Mobile Networks & Applications, 2011, v. 16, n. 2, p. 171, doi. 10.1007/s11036-010-0260-8
- By:
- Publication type:
- Article
Monitoring Smartphones for Anomaly Detection.
- Published in:
- Mobile Networks & Applications, 2009, v. 14, n. 1, p. 92, doi. 10.1007/s11036-008-0113-x
- By:
- Publication type:
- Article
A methodological review on attack and defense strategies in cyber warfare.
- Published in:
- Wireless Networks (10220038), 2019, v. 25, n. 6, p. 3323, doi. 10.1007/s11276-018-1724-1
- By:
- Publication type:
- Article
Detection and classification mean-shifts in multi-attribute processes by artificial neural networks.
- Published in:
- International Journal of Production Research, 2008, v. 46, n. 11, p. 2945, doi. 10.1080/00207540601039809
- By:
- Publication type:
- Article
Performance Analysis of IEEE 802.15.4 based Sensor Networks for Smart Grids Communications.
- Published in:
- Journal of Electrical Engineering: Theory & Application, 2010, v. 1, n. 3, p. 129
- By:
- Publication type:
- Article
A network system of double twister equipment group on-line state monitoring.
- Published in:
- Wool Textile Journal, 2012, n. 6, p. 61
- By:
- Publication type:
- Article
A Novel Nonlinear Multitarget k-Degree Coverage Preservation Protocol in Wireless Sensor Networks.
- Published in:
- Journal of Sensors, 2016, p. 1, doi. 10.1155/2016/3434961
- By:
- Publication type:
- Article
Development and Coverage Evaluation of ZigBee-Based Wireless Network Applications.
- Published in:
- Journal of Sensors, 2016, p. 1, doi. 10.1155/2016/2943974
- By:
- Publication type:
- Article
Telcos plot path to desktop.
- Published in:
- ComputerWorld Hong Kong, 2007, v. 24, n. 11, p. 53
- By:
- Publication type:
- Article
An Automated Algorithm In Data Visualization For Large Network Data: A Review And An Initial Study.
- Published in:
- International Journal of Simulation: Systems, Science & Technology, 2010, v. 11, n. 3, p. 40
- By:
- Publication type:
- Article
Complex networks: From data to models.
- Published in:
- Nature Physics, 2007, v. 3, n. 4, p. 224, doi. 10.1038/nphys581
- By:
- Publication type:
- Article
Network Distributed Monitoring System Based on Robot Technology Middleware.
- Published in:
- International Journal of Advanced Robotic Systems, 2007, v. 4, n. 1, p. 69, doi. 10.5772/5706
- By:
- Publication type:
- Article
Research on Environment Monitoring of Network Computer Rooms in Colleges and Universities Based on The Internet of Things Technology.
- Published in:
- Wireless Personal Communications, 2023, v. 128, n. 4, p. 2453, doi. 10.1007/s11277-022-10051-2
- By:
- Publication type:
- Article
Evolutionary-Based Deep Stacked Autoencoder for Intrusion Detection in a Cloud-Based Cyber-Physical System.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 14, p. 6875, doi. 10.3390/app12146875
- By:
- Publication type:
- Article
A lightweight network state estimation mechanism in ARQ-based wireless networks.
- Published in:
- Telecommunication Systems, 2014, v. 57, n. 2, p. 137, doi. 10.1007/s11235-013-9810-2
- By:
- Publication type:
- Article
A new structure-preserving method of sampling for predicting self-similar traffic.
- Published in:
- Telecommunication Systems, 2010, v. 43, n. 3/4, p. 265, doi. 10.1007/s11235-009-9201-x
- By:
- Publication type:
- Article
On the complexity of Internet traffic dynamics on its topology.
- Published in:
- Telecommunication Systems, 2010, v. 43, n. 3/4, p. 167, doi. 10.1007/s11235-009-9213-6
- By:
- Publication type:
- Article
Efficient probe selection algorithms for fault diagnosis.
- Published in:
- Telecommunication Systems, 2008, v. 37, n. 1-3, p. 109, doi. 10.1007/s11235-008-9069-1
- By:
- Publication type:
- Article
Integrating heterogeneous network monitoring data.
- Published in:
- Telecommunication Systems, 2008, v. 37, n. 1-3, p. 71, doi. 10.1007/s11235-008-9073-5
- By:
- Publication type:
- Article
Cloud Services Anomalies Detection Using Network Flowdata Analysis.
- Published in:
- Journal of Algebraic Statistics, 2022, v. 13, n. 3, p. 2501
- By:
- Publication type:
- Article
Retracted: Computer Network Information Security Monitoring System Based on Big Data Era.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice
On the Use of Affordable COTS Hardware for Network Measurements: Limits and Good Practices.
- Published in:
- Information (2078-2489), 2018, v. 9, n. 2, p. 43, doi. 10.3390/info9020043
- By:
- Publication type:
- Article
Impedance Estimation with an Enhanced Particle Swarm Optimization for Low-Voltage Distribution Networks.
- Published in:
- Energies (19961073), 2019, v. 12, n. 6, p. 1167, doi. 10.3390/en12061167
- By:
- Publication type:
- Article