Works about COMPUTER network monitoring
Results: 229
Brownian Signals: Information Quality, Quantity and Timing in Repeated Games.
- Published in:
- Computational Economics, 2018, v. 52, n. 2, p. 387, doi. 10.1007/s10614-017-9685-5
- By:
- Publication type:
- Article
A lightweight path consistency verification based on INT in SDN.
- Published in:
- Electronic Research Archive, 2023, v. 31, n. 11, p. 1, doi. 10.3934/mbe.2023862
- By:
- Publication type:
- Article
Optimization of Network Monitoring.
- Published in:
- Information Sciences & Technologies: Bulletin of the ACM Slovakia, 2020, v. 12, n. 1, p. 7
- By:
- Publication type:
- Article
About iSTEMIA – Innovation in Science, Technology, Engineering, Mathematics, Informatics and Arts.
- Published in:
- Postmodern Openings / Deschideri Postmoderne, 2020, v. 11, n. 4, p. 262, doi. 10.18662/po/11.4/234
- By:
- Publication type:
- Article
Monitoring of Movement on the Farm Using WiFi Technology.
- Published in:
- Agris On-Line Papers in Economics & Informatics, 2019, v. 11, n. 4, p. 85, doi. 10.7160/aol.2019.110408
- By:
- Publication type:
- Article
Real-Time Monitoring and Management of Hardware and Software Resources in Heterogeneous Computer Networks through an Integrated System Architecture.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 6, p. 1134, doi. 10.3390/sym15061134
- By:
- Publication type:
- Article
FlexMonitor: A Flexible Monitoring Framework in SDN.
- Published in:
- Symmetry (20738994), 2018, v. 10, n. 12, p. 713, doi. 10.3390/sym10120713
- By:
- Publication type:
- Article
Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network Topology.
- Published in:
- International Journal of Digital Crime & Forensics, 2023, v. 15, n. 1, p. 1, doi. 10.4018/IJDCF.317100
- By:
- Publication type:
- Article
Workplace surveillance: examining current instruments, limitations and legal background issues.
- Published in:
- Tourism & Management Studies, 2013, v. 9, n. 1, p. 58
- By:
- Publication type:
- Article
Archiving the web using page changes patterns: a case study.
- Published in:
- International Journal on Digital Libraries, 2012, v. 13, n. 1, p. 33, doi. 10.1007/s00799-012-0094-z
- By:
- Publication type:
- Article
A network system of double twister equipment group on-line state monitoring.
- Published in:
- Wool Textile Journal, 2012, n. 6, p. 61
- By:
- Publication type:
- Article
Monitoring an Information Source Under a Politeness Constraint.
- Published in:
- INFORMS Journal on Computing, 2008, v. 20, n. 1, p. 3, doi. 10.1287/ijoc.1060.0207
- By:
- Publication type:
- Article
Performance of Multi-Service Telecommunication Systems Using the Architectural Concept of Future Networks.
- Published in:
- Journal of Aeronautics & Space Technologies / Havacilik ve Uzay Teknolojileri Dergisi, 2023, v. 16, n. 1, p. 41
- By:
- Publication type:
- Article
An integrated system for data monitoring and differentiated control of welding processes.
- Published in:
- Welding International, 2010, v. 24, n. 7, p. 524, doi. 10.1080/09507110902844659
- By:
- Publication type:
- Article
THE USER, THE SUPERUSER, AND THE REGULATOR: FUNCTIONAL SEPARATION OF POWERS AND THE PLURALITY OF THE STATE IN CYBER.
- Published in:
- Berkeley Technology Law Journal, 2020, v. 35, n. 2, p. 431, doi. 10.15779/Z38V40K05C
- By:
- Publication type:
- Article
INTRUSIVE MONITORING: EMPLOYEE PRIVACY EXPECTATIONS ARE REASONABLE IN EUROPE, DESTROYED IN THE UNITED STATES.
- Published in:
- Berkeley Technology Law Journal, 2011, v. 26, n. 2, p. 979
- By:
- Publication type:
- Article
La gestión de redes inter-organizativas desde el sector público: el caso de los servicios sociales de Barcelona.
- Published in:
- Territorios: Revista de Estudios Regionales y Urbanos, 2006, n. 15, p. 53
- By:
- Publication type:
- Article
An Ontology for Privacy-aware Access Control in Network Monitoring Environments.
- Published in:
- Journal of Research & Practice in Information Technology, 2014, v. 46, n. 4, p. 263
- By:
- Publication type:
- Article
Performance Analysis of Open-Source Network Monitoring Software in Wireless Network.
- Published in:
- Journal of Computing Research & Innovation, 2023, v. 8, n. 2, p. 31, doi. 10.24191/jcrinn.v8i2.375
- By:
- Publication type:
- Article
Domain-Specific Service Selection for Composite Services.
- Published in:
- IEEE Transactions on Software Engineering, 2012, v. 38, n. 4, p. 828, doi. 10.1109/TSE.2011.43
- By:
- Publication type:
- Article
Tools for the Rapid Prototyping of Provably Correct Ambient Intelligence Applications.
- Published in:
- IEEE Transactions on Software Engineering, 2012, v. 38, n. 4, p. 975, doi. 10.1109/TSE.2011.67
- By:
- Publication type:
- Article
Palantír: Early Detection of Development Conflicts Arising from Parallel Code Changes.
- Published in:
- IEEE Transactions on Software Engineering, 2012, v. 38, n. 4, p. 889, doi. 10.1109/TSE.2011.64
- By:
- Publication type:
- Article
Practice report: A review of e-Safety remote computer monitoring for UK sex offenders.
- Published in:
- Journal of Sexual Aggression, 2010, v. 16, n. 2, p. 237, doi. 10.1080/13552601003686870
- By:
- Publication type:
- Article
The Real Benefits of Continuous Monitoring.
- Published in:
- Financial Executive, 2012, v. 28, n. 4, p. 35
- Publication type:
- Article
NEW FEATURES OF AUDIT AND MONITORING FOR ENTERPRISE NETWORK SECURITY.
- Published in:
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2011, v. 1, n. 3, p. 243
- By:
- Publication type:
- Article
SAMPLING DESIGN TRADE-OFFS IN OCCUPANCY STUDIES WITH IMPERFECT DETECTION: EXAMPLES AND SOFTWARE.
- Published in:
- Ecological Applications, 2007, v. 17, n. 1, p. 281, doi. 10.1890/1051-0761(2007)017[0281:SDTIOS]2.0.CO;2
- By:
- Publication type:
- Article
Understanding the Quality of Monitoring for Network Management.
- Published in:
- Computer Journal, 2010, v. 53, n. 5, p. 541, doi. 10.1093/comjnl/bxp058
- By:
- Publication type:
- Article
A Key Escrow Scheme with Time-Limited Monitoring for One-way Communication.
- Published in:
- Computer Journal, 2002, v. 45, n. 6, p. 661, doi. 10.1093/comjnl/45.6.661
- By:
- Publication type:
- Article
Performance Modeling for Relay Cooperation in Delay Tolerant Networks.
- Published in:
- Mobile Networks & Applications, 2013, v. 18, n. 2, p. 186, doi. 10.1007/s11036-012-0357-3
- By:
- Publication type:
- Article
An Automatic Presence Service for Low Duty-Cycled Mobile Sensor Networks.
- Published in:
- Mobile Networks & Applications, 2011, v. 16, n. 4, p. 460, doi. 10.1007/s11036-011-0326-2
- By:
- Publication type:
- Article
A Simplified Internet Routing Architecture.
- Published in:
- Mobile Networks & Applications, 2011, v. 16, n. 4, p. 433, doi. 10.1007/s11036-011-0320-8
- By:
- Publication type:
- Article
Body Area Networks: A Survey.
- Published in:
- Mobile Networks & Applications, 2011, v. 16, n. 2, p. 171, doi. 10.1007/s11036-010-0260-8
- By:
- Publication type:
- Article
Monitoring Smartphones for Anomaly Detection.
- Published in:
- Mobile Networks & Applications, 2009, v. 14, n. 1, p. 92, doi. 10.1007/s11036-008-0113-x
- By:
- Publication type:
- Article
A Particle Swarm Optimization Algorithm for Minimization Analysis of Cost-Sensitive Attack Graphs.
- Published in:
- ISeCure, 2010, v. 2, n. 1, p. 13
- By:
- Publication type:
- Article
VPN Solutions and Network Monitoring to Support Virtual Teams Work in Virtual Enterprises.
- Published in:
- Computer Science & Information Systems, 2011, v. 8, n. 1, p. 1, doi. 10.2298/CSIS100127033R
- By:
- Publication type:
- Article
EFFICIENTLY MINING RECENT FREQUENT PATTERNS OVER ONLINE TRANSACTIONAL DATA STREAMS.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2009, v. 19, n. 5, p. 707, doi. 10.1142/S0218194009004325
- By:
- Publication type:
- Article
Configuration strategy of multi-PLC control system.
- Published in:
- Journal of the Tianjin Polytechnic University / Tianjin Gongye Daxue Xuebao, 2013, v. 32, n. 6, p. 68
- By:
- Publication type:
- Article
Intake.
- Published in:
- Opflow Online, 2021, v. 47, n. 6, p. 2, doi. 10.1002/opfl.1553
- Publication type:
- Article
Western Regional News and Comments.
- Published in:
- North American Bird Bander, 2011, v. 36, n. 3, p. 133
- By:
- Publication type:
- Article
Event Monitoring and Service in a Flat World—Benefits and Challenges.
- Published in:
- IT Professional, 2010, v. 12, n. 1, p. 32, doi. 10.1109/MITP.2010.25
- By:
- Publication type:
- Article
Surviving Insecure IT: Effective Patch Management.
- Published in:
- IT Professional, 2009, v. 11, n. 2, p. 49, doi. 10.1109/MITP.2009.38
- By:
- Publication type:
- Article
THE PROMIRA PROJECT INFORMATION SYSTEM: IMPROVED SEISMIC MONITORING -- IMPROVED DECISION MAKING RELATED TO THE LONG-TERM SAFE EXPLOITATION OF THE SALT DEPOSIT IN THE REGION.
- Published in:
- Advances in Bulgarian Science, 2006, v. 3, p. 16
- By:
- Publication type:
- Article
Attack Detection Algorithm Based on Rossle Chaotic Average Mutual Information Feature Mining.
- Published in:
- International Journal of Simulation: Systems, Science & Technology, 2016, v. 17, n. 36, p. 1, doi. 10.5013/IJSSST.a.17.36.34
- By:
- Publication type:
- Article
An Automated Algorithm In Data Visualization For Large Network Data: A Review And An Initial Study.
- Published in:
- International Journal of Simulation: Systems, Science & Technology, 2010, v. 11, n. 3, p. 40
- By:
- Publication type:
- Article
Downlink power distributions for 2G and 3G mobile communication networks.
- Published in:
- Radiation Protection Dosimetry, 2013, v. 157, n. 4, p. 477, doi. 10.1093/rpd/nct169
- By:
- Publication type:
- Article
A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS).
- Published in:
- Issues in Informing Science & Information Technology, 2009, v. 6, p. 631, doi. 10.28945/1086
- By:
- Publication type:
- Article
Sustaining Negotiated QoS in Connection Admission Control for ATM Networks Using Fuzzy Logic Techniques.
- Published in:
- Issues in Informing Science & Information Technology, 2008, v. 5, p. 645, doi. 10.28945/1033
- By:
- Publication type:
- Article
Building Association-Rule Based Sequential Classifiers for Web-Document Prediction.
- Published in:
- Data Mining & Knowledge Discovery, 2004, v. 8, n. 3, p. 253, doi. 10.1023/B:DAMI.0000023675.04946.f1
- By:
- Publication type:
- Article
On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms.
- Published in:
- Data Mining & Knowledge Discovery, 2004, v. 8, n. 3, p. 275, doi. 10.1023/B:DAMI.0000023676.72185.7c
- By:
- Publication type:
- Article
COMPUTER NETWORKS MONITORING AND MANAGEMENT METHODS.
- Published in:
- Science-Based Technologies, 2018, v. 39, n. 3, p. 281, doi. 10.18372/2310-5461.39.13075
- By:
- Publication type:
- Article