Results 1 to 10 of about 8,213,085 (205)
. Network not only brings people convenience, but also becomes a hotbed for breeding crime. And it not only brings people efficiency, but also opens a new criminal platform for the computer network criminals.
Kai Zhang, Liang Zhao, Haiqing Cao
semanticscholar +2 more sources
Computation in Complex Networks [PDF]
The Special Issue on “Computation in Complex Networks” focused on gathering highly original papers in the field of current complex network research [...]
Pizzuti C, Socievole A
openaire +6 more sources
Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP) [PDF]
Machine learning (ML) and Deep Learning (DL) methods are being adopted rapidly, especially in computer network security, such as fraud detection, network anomaly detection, intrusion detection, and much more.
Khushnaseeb Roshan, Aasim Zafar
semanticscholar +1 more source
Topological considerations in the design of the ARPA computer network [PDF]
H. Frank, I. Frisch, W. Chou
openalex +2 more sources
Construction of Computer Network Security System in the Era of Big Data
Computer network security is one of the important factors affecting the development of computer technology. Analyzing and exploring computer network security in the era of big data is conducive to achieving effective protection of data information.
Y. Lin
semanticscholar +1 more source
Application of Data Encryption Technology in Computer Network Information Security
In order to solve the partial optimization problems of the RSA algorithm in computer network security, a method of RSA algorithm optimization based on data encryption was proposed.
Lifeng Li
semanticscholar +1 more source
The Value Orientation of Electronic Commerce Law Based on Computer Network [PDF]
In the era of legal globalization, e-commerce platform increasingly mature environment, in order to better meet the practical requirements of e-commerce activities, in the process of e-commerce legislation, practice, should always adhere to the value ...
Qin Di, Mu Zhaonan, Yue Sijialu
doaj +1 more source
Development of Augmented Reality Application for Learning Computer Network Device
Applied augmented reality works by detecting imageries or pictures, normally called markers, by using smartphone camera that detects these preplaced markers. Augmented reality has seen wide application in various fields, one of them is education.
M. L. Hamzah+5 more
semanticscholar +1 more source
Computing in Social Networks [PDF]
This paper defines the problem of Scalable Secure Computing in a Social network: we call it the S3 problem. In short, nodes, directly reflecting on associated users, need to compute a function f: V->U of their inputs in a set of constant size, in a scalable and secure way.
Giurgiu, Andrei+3 more
openaire +5 more sources
PENGUJIAN QOS PADA IMPLEMENTASI SDN BERBASIS MININET DAN OPENDAYLIGHT MENGGUNAKAN TOPOLOGI TREE
The development of information technology and computer network from time to time is increasing along with the increase in user needs for both from the business, education, industrial, to data security side.
I Putu Agus Eka Pratama+1 more
doaj +1 more source