Results 301 to 310 of about 11,841,471 (334)
Some of the next articles are maybe not open access.
Cyber Warfare: Military Cross-Border Computer Network Operations under International Law
, 2014Johann-Christoph Woltag
semanticscholar +1 more source
Modeling and analysis of the effects of antivirus software on an infected computer network
Applied Mathematics and Computation, 2014J. Shukla +3 more
semanticscholar +1 more source
Network Anomaly Detection: Methods, Systems and Tools
IEEE Communications Surveys and Tutorials, 2014Dhruba K Bhattacharyya
exaly
A Study on Topology in Computer Network
International Conference on Intelligent Computation Technology and Automation, 2014Qing Liu, Qiuping Liu
semanticscholar +1 more source
How to keep members using the information in a computer-supported social network
Computers in Human Behavior, 2009Xiao-Ling Jin, Christy M K Cheung
exaly
The interface message processor for the ARPA computer network
AFIPS '70 (Spring), 1899F. E. Heart +4 more
semanticscholar +1 more source
The terminal IMP for the ARPA computer network
AFIPS '72 (Spring), 1899S. Ornstein +5 more
semanticscholar +1 more source
SEIQRS model for the transmission of malicious objects in computer network
Applied Mathematical Modelling, 2010Bimal Kumar Bkm Mishra, Navnit Jha
exaly

