Results 331 to 340 of about 3,331,180 (402)
Some of the next articles are maybe not open access.
Information security risk assessment and management method in computer networks
International Siberian Conference on Control and Communications, 2015We suggested a method for quantitative information security risk assessment and management in computer networks. We used questionnaires, expert judgments, fuzzy logic and analytic hierarchy process to evaluate an impact and possibility values for ...
I. Anikin
semanticscholar +1 more source
COMPUTING BY COMMUNICATION IN NETWORKS OF MEMBRANES
International Journal of Foundations of Computer Science, 2002In this paper we consider networks of membranes which compute by communication only, using symport/antiport rules. Such rules are used both for communication with the environment and for direct communication among membranes. It turns out that, rather surprisingly, networks with a small number of membranes are computationally universal.
Gheorghe Păun+3 more
openaire +1 more source
Computer network intrusion detection using sequential LSTM Neural Networks autoencoders
Signal Processing and Communications Applications Conference, 2018In this paper, we introduce a sequential autoencoder framework using long short term memory (LSTM) neural network for computer network intrusion detection.
A. Mirza, Selin Cosan
semanticscholar +1 more source
DIGITAL COMPUTER CONTROL OF COMMUNICATION NETWORKS
IFAC Proceedings Volumes, 1982Abstract This paper uses the theory of hierarchical control to arrive at routing algorithms for messages in computer communication networks, some aspects of implementation are also considered.
J. Warrior, K.S.P. Kumar
openaire +2 more sources
An availability evaluation for computer communication networks
Microelectronics Reliability, 1980Abstract Among the various availability criteria for computer communication networks, based on strictly topological considerations or taking into account also the traffic characteristics, we propose, as a network performance measure, the probability that an assigned fraction of the stability throughput can be carried out with average packet and ...
CORSI, Francesco, DE LEO R.
openaire +3 more sources
An energy-efficient MAC protocol for wireless sensor networks
Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, 2002This paper proposes S-MAC, a medium-access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks use battery-operated computing and sensing devices.
W. Ye, J. Heidemann, D. Estrin
semanticscholar +1 more source
The Network As a Computer: A Framework for Distributed Computing Over IoT Mesh Networks
IEEE Internet of Things Journal, 2018Ultradense Internet of Things (IoT) mesh networks and machine-to-machine communications herald an enormous opportunity for new computing paradigms and are serving as a catalyst for profound change in the evolution of the Internet.
Emanuele Di Pascale+4 more
semanticscholar +1 more source
Securing computer networks communication by modifying computer network communication protocols
2011 11th International Conference on ITS Telecommunications, 2011This research presents a technique to protect computer networks communication by modifying communication protocol identifier. The main advantage of this technique is preventing "man in the middle" meddling from reconstructing sessions from collected data.
openaire +2 more sources
Covert computer and network communications
Proceedings of the 4th annual conference on Information security curriculum development, 2007The ex-filtration of confidential information across communication networks is a challenging problem. It is possible for transmissions to be hidden or masked in such a way to circumvent the security policies of an organization. An objective might be to make contacts "invisible" to all parties except designates.
openaire +2 more sources
The Communications Computer Hardware of the MERIT Computer Network
IEEE Transactions on Communications, 1972Three Michigan universities are currently working on a project to evolve a network that will link their educational and research computing centers. This project requires the concurrent development of several interrelated technical activities, the most important of which are the network's specialized hardware, software for the network's communications ...
E. Aupperle, W. Becher
openaire +2 more sources