Results 1 to 10 of about 2,602,398 (316)

Computer Network Vulnerabilities [PDF]

open access: yesA Guide to Computer Network Security, 2009
System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Donald Pipkin defines system vulnerability as a condition, a weakness of or an absence of security procedure or technical, physical, or other controls that could be exploited ...
Kizza J.
europepmc   +3 more sources

Computation in Complex Networks [PDF]

open access: yesEntropy, 2021
The Special Issue on “Computation in Complex Networks” focused on gathering highly original papers in the field of current complex network research [...]
Pizzuti C, Socievole A
openaire   +6 more sources

PENGUJIAN QOS PADA IMPLEMENTASI SDN BERBASIS MININET DAN OPENDAYLIGHT MENGGUNAKAN TOPOLOGI TREE

open access: yesJurnal Sisfokom, 2021
The development of information technology and computer network from time to time is increasing along with the increase in user needs for both from the business, education, industrial, to data security side.
I Putu Agus Eka Pratama   +1 more
doaj   +1 more source

Computing in Social Networks [PDF]

open access: yesInformation and Computation, 2010
This paper defines the problem of Scalable Secure Computing in a Social network: we call it the S3 problem. In short, nodes, directly reflecting on associated users, need to compute a function f: V->U of their inputs in a set of constant size, in a scalable and secure way.
Giurgiu, Andrei   +3 more
openaire   +5 more sources

Is the network capable of computation? [PDF]

open access: yes2013 21st IEEE International Conference on Network Protocols (ICNP), 2013
Ensuring correct network behavior is hard. Previous state of the art has demonstrated that analyzing a network containing middleboxes is hard. In this paper, we show that even using only statically configured switches, and asking the simplest possible question – “Will this concrete packet reach the destination?” – can make the problem intractable ...
Peresini, Peter, Kostic, Dejan
openaire   +4 more sources

The Value Orientation of Electronic Commerce Law Based on Computer Network [PDF]

open access: yesMATEC Web of Conferences, 2022
In the era of legal globalization, e-commerce platform increasingly mature environment, in order to better meet the practical requirements of e-commerce activities, in the process of e-commerce legislation, practice, should always adhere to the value ...
Qin Di, Mu Zhaonan, Yue Sijialu
doaj   +1 more source

Computing spin networks [PDF]

open access: yesAnnals of Physics, 2005
LateX, 77 pages,23 figures; to appear in Annals of ...
MARZUOLI, ANNALISA, Rasetti Mario
openaire   +4 more sources

The Dutch interbank computer network [PDF]

open access: yes, 1988
At the end of 1980, a strategic decision was made by the Dutch banks and savings banks to commence the development of a Data Communications Infrastructure (DCI), to be used for a number of forthcoming interbank applications.
Michiels, Eddie
core   +8 more sources

Analyzing a Python programming example of building an artificial intelligence machine learning model for detecting cyber-attacks: Benefits and challenges [PDF]

open access: yesTehnika, 2023
Artificial intelligence systems offer a wide range of real-world applications that are already being used in many different fields. They can be found in computer systems, web browsers, smart home appliances, navigation and vehicle management, shape, and ...
Radaković Mladen U.   +1 more
doaj  

Global stability of multi-group SEIQR epidemic models with stochastic perturbation in computer network

open access: yesElectronic Research Archive, 2023
In this paper, a class of multi-group SEIQR models with random perturbation in computer network is investigated. The existence and uniqueness of global positive solution with any positive initial value are obtained.
Ramziya Rifhat   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy