Results 301 to 310 of about 11,841,471 (334)
Some of the next articles are maybe not open access.

Modeling and analysis of the effects of antivirus software on an infected computer network

Applied Mathematics and Computation, 2014
J. Shukla   +3 more
semanticscholar   +1 more source

Network Anomaly Detection: Methods, Systems and Tools

IEEE Communications Surveys and Tutorials, 2014
Dhruba K Bhattacharyya
exaly  

A Study on Topology in Computer Network

International Conference on Intelligent Computation Technology and Automation, 2014
Qing Liu, Qiuping Liu
semanticscholar   +1 more source

How to keep members using the information in a computer-supported social network

Computers in Human Behavior, 2009
Xiao-Ling Jin, Christy M K Cheung
exaly  

The interface message processor for the ARPA computer network

AFIPS '70 (Spring), 1899
F. E. Heart   +4 more
semanticscholar   +1 more source

The terminal IMP for the ARPA computer network

AFIPS '72 (Spring), 1899
S. Ornstein   +5 more
semanticscholar   +1 more source

SEIQRS model for the transmission of malicious objects in computer network

Applied Mathematical Modelling, 2010
Bimal Kumar Bkm Mishra, Navnit Jha
exaly  

Home - About - Disclaimer - Privacy