Results 1 to 10 of about 2,602,398 (316)
Computer Network Vulnerabilities [PDF]
System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Donald Pipkin defines system vulnerability as a condition, a weakness of or an absence of security procedure or technical, physical, or other controls that could be exploited ...
Kizza J.
europepmc +3 more sources
Computation in Complex Networks [PDF]
The Special Issue on “Computation in Complex Networks” focused on gathering highly original papers in the field of current complex network research [...]
Pizzuti C, Socievole A
openaire +6 more sources
PENGUJIAN QOS PADA IMPLEMENTASI SDN BERBASIS MININET DAN OPENDAYLIGHT MENGGUNAKAN TOPOLOGI TREE
The development of information technology and computer network from time to time is increasing along with the increase in user needs for both from the business, education, industrial, to data security side.
I Putu Agus Eka Pratama+1 more
doaj +1 more source
Computing in Social Networks [PDF]
This paper defines the problem of Scalable Secure Computing in a Social network: we call it the S3 problem. In short, nodes, directly reflecting on associated users, need to compute a function f: V->U of their inputs in a set of constant size, in a scalable and secure way.
Giurgiu, Andrei+3 more
openaire +5 more sources
Is the network capable of computation? [PDF]
Ensuring correct network behavior is hard. Previous state of the art has demonstrated that analyzing a network containing middleboxes is hard. In this paper, we show that even using only statically configured switches, and asking the simplest possible question – “Will this concrete packet reach the destination?” – can make the problem intractable ...
Peresini, Peter, Kostic, Dejan
openaire +4 more sources
The Value Orientation of Electronic Commerce Law Based on Computer Network [PDF]
In the era of legal globalization, e-commerce platform increasingly mature environment, in order to better meet the practical requirements of e-commerce activities, in the process of e-commerce legislation, practice, should always adhere to the value ...
Qin Di, Mu Zhaonan, Yue Sijialu
doaj +1 more source
LateX, 77 pages,23 figures; to appear in Annals of ...
MARZUOLI, ANNALISA, Rasetti Mario
openaire +4 more sources
The Dutch interbank computer network [PDF]
At the end of 1980, a strategic decision was made by the Dutch banks and savings banks to commence the development of a Data Communications Infrastructure (DCI), to be used for a number of forthcoming interbank applications.
Michiels, Eddie
core +8 more sources
Analyzing a Python programming example of building an artificial intelligence machine learning model for detecting cyber-attacks: Benefits and challenges [PDF]
Artificial intelligence systems offer a wide range of real-world applications that are already being used in many different fields. They can be found in computer systems, web browsers, smart home appliances, navigation and vehicle management, shape, and ...
Radaković Mladen U.+1 more
doaj
In this paper, a class of multi-group SEIQR models with random perturbation in computer network is investigated. The existence and uniqueness of global positive solution with any positive initial value are obtained.
Ramziya Rifhat +4 more
doaj +1 more source