Results 31 to 40 of about 11,841,471 (334)
Application of Data Encryption Technology in Computer Network Security
With the development of information technology, the problem of computer network security is becoming more and more prominent. Illegal invasion, information disclosure, virus impact and network vulnerability are all factors that affect computer network ...
Weilian. Chu
semanticscholar +1 more source
Application of Quality of Service on Internet Network using Hierarchical Token Bucket Method
One of the problems frequently encountered by internet users is slow internet access. In particular, when there are many users share the internet bandwidth. This problem may occur as there is no bandwidth management system employed.
Claudi Priambodo Antodi +2 more
doaj +1 more source
Pentesting using Ethical Hacking techniques in IPv6 networks
Through this article the results of a research project are shown, carrying out a pentesting using ethical hacking techniques in networks implemented in the IP Protocol version 6 (IPv6), through a GNU / Linux security distribution tool IT, BackTrack ...
Jorge Armando Rojas Osorio +2 more
doaj +1 more source
A METHOD FOR IMPROVING THE QUALITY INDICATORS OF A DISTRIBUTED FORENSIC INFORMATION SYSTEM
Subject of research: the process of monitoring the quality indicators of a computer network of a forensic information system using methods for increasing the frequency resolution of acousto-optic spectrum analyzers.
Mykhailo Mozhaiev, Pavlo Buslov
doaj +1 more source
Vojnomedicinska akademija (VMA) u Beogradu danas se ne može zamisliti bez kvalitetnog informacionog sistema, koji se najčešće razvija u sistemu računarske mreže.
Miroslav Stojanović +2 more
doaj +1 more source
Internet of medical things (IoMT) communication has become an increasingly important component of 5G wireless communication networks in healthcare as a result of the rapid proliferation of IoMT devices.
Jaaz Zahraa A. +3 more
doaj +1 more source
Modern distributed computing frameworks and domain-specific languages provide a convenient and robust way to structure large distributed applications and deploy them on either data center or edge computing environments. The current systems suffer however from the need for a complex underlay of services to allow them to run effectively on existing ...
Krol, Michal +4 more
openaire +2 more sources
Model of Threats to Computer Network Software
This article highlights the issue of identifying information security threats to computer networks. The aim of the study is to increase the number of identified threats. Firstly, it was carried out the analysis of computer network models used to identify
A. Novokhrestov, A. Konev, A. Shelupanov
semanticscholar +1 more source
Digitalni multimedijalni sadržaj postaje zastupljeniji i sve više se razmenjuje putem računarskih mreža i javnih kanala (satelitske komunikacije, bežične mreže, internet, itd.) koji predstavljaju nebezbedne medijume za prenos informacija osetljive ...
Boriša Ž. Jovanović
doaj +1 more source
The one-way quantum computer - a non-network model of quantum computation
A one-way quantum computer works by only performing a sequence of one-qubit measurements on a particular entangled multi-qubit state, the cluster state. No non-local operations are required in the process of computation.
Briegel, Hans J. +2 more
core +1 more source

