Results 331 to 340 of about 3,331,180 (402)
Some of the next articles are maybe not open access.

Information security risk assessment and management method in computer networks

International Siberian Conference on Control and Communications, 2015
We suggested a method for quantitative information security risk assessment and management in computer networks. We used questionnaires, expert judgments, fuzzy logic and analytic hierarchy process to evaluate an impact and possibility values for ...
I. Anikin
semanticscholar   +1 more source

COMPUTING BY COMMUNICATION IN NETWORKS OF MEMBRANES

International Journal of Foundations of Computer Science, 2002
In this paper we consider networks of membranes which compute by communication only, using symport/antiport rules. Such rules are used both for communication with the environment and for direct communication among membranes. It turns out that, rather surprisingly, networks with a small number of membranes are computationally universal.
Gheorghe Păun   +3 more
openaire   +1 more source

Computer network intrusion detection using sequential LSTM Neural Networks autoencoders

Signal Processing and Communications Applications Conference, 2018
In this paper, we introduce a sequential autoencoder framework using long short term memory (LSTM) neural network for computer network intrusion detection.
A. Mirza, Selin Cosan
semanticscholar   +1 more source

DIGITAL COMPUTER CONTROL OF COMMUNICATION NETWORKS

IFAC Proceedings Volumes, 1982
Abstract This paper uses the theory of hierarchical control to arrive at routing algorithms for messages in computer communication networks, some aspects of implementation are also considered.
J. Warrior, K.S.P. Kumar
openaire   +2 more sources

An availability evaluation for computer communication networks

Microelectronics Reliability, 1980
Abstract Among the various availability criteria for computer communication networks, based on strictly topological considerations or taking into account also the traffic characteristics, we propose, as a network performance measure, the probability that an assigned fraction of the stability throughput can be carried out with average packet and ...
CORSI, Francesco, DE LEO R.
openaire   +3 more sources

An energy-efficient MAC protocol for wireless sensor networks

Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, 2002
This paper proposes S-MAC, a medium-access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks use battery-operated computing and sensing devices.
W. Ye, J. Heidemann, D. Estrin
semanticscholar   +1 more source

The Network As a Computer: A Framework for Distributed Computing Over IoT Mesh Networks

IEEE Internet of Things Journal, 2018
Ultradense Internet of Things (IoT) mesh networks and machine-to-machine communications herald an enormous opportunity for new computing paradigms and are serving as a catalyst for profound change in the evolution of the Internet.
Emanuele Di Pascale   +4 more
semanticscholar   +1 more source

Securing computer networks communication by modifying computer network communication protocols

2011 11th International Conference on ITS Telecommunications, 2011
This research presents a technique to protect computer networks communication by modifying communication protocol identifier. The main advantage of this technique is preventing "man in the middle" meddling from reconstructing sessions from collected data.
openaire   +2 more sources

Covert computer and network communications

Proceedings of the 4th annual conference on Information security curriculum development, 2007
The ex-filtration of confidential information across communication networks is a challenging problem. It is possible for transmissions to be hidden or masked in such a way to circumvent the security policies of an organization. An objective might be to make contacts "invisible" to all parties except designates.
openaire   +2 more sources

The Communications Computer Hardware of the MERIT Computer Network

IEEE Transactions on Communications, 1972
Three Michigan universities are currently working on a project to evolve a network that will link their educational and research computing centers. This project requires the concurrent development of several interrelated technical activities, the most important of which are the network's specialized hardware, software for the network's communications ...
E. Aupperle, W. Becher
openaire   +2 more sources

Home - About - Disclaimer - Privacy