Journal articles on the topic 'Computer networks – Security measures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Computer networks – Security measures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Full textNIKLEKAJ, Malvina. "Security in Computer Networks: Threats, Challenges, and Protection." Ingenious 3, no. 1 (2023): 51–60. http://dx.doi.org/10.58944/mcne2043.
Full textHewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (July 2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.
Full textMo, Xin Ju. "Study on Information Security of Network-Based Manufacturing Environment." Applied Mechanics and Materials 484-485 (January 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.
Full textSavytska, Liudmyla, Tetiana Korobeinikova, Ihor Leontiev, and Serhii Bohomolov. "METHODS AND MEANS OF PROTECTING RESOURCES IN COMPUTER SDN NETWORK." Information technology and computer engineering 58, no. 3 (December 29, 2023): 41–52. http://dx.doi.org/10.31649/1999-9941-2023-58-3-41-52.
Full textLittlewood, Bev, Sarah Brocklehurst, Norman Fenton, Peter Mellor, Stella Page, David Wright, John Dobson, John McDermid, and Dieter Gollmann. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (April 1, 1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.
Full textGuo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.
Full textZhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.
Full textZhang, Kai, Liang Zhao, and Hai Qing Cao. "Research on the Computer Network Crime and Information Security." Applied Mechanics and Materials 687-691 (November 2014): 1806–9. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1806.
Full textKlevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.
Full textWang, Hongqiao. "On Computer Communication Network Security Maintenance Measures." Studies in Social Science Research 4, no. 3 (July 24, 2023): p134. http://dx.doi.org/10.22158/sssr.v4n3p134.
Full textXing, Kongduo. "A Practical Study of Big Data Technology in Computer Network Information Security Processing." Journal of Electronic Research and Application 7, no. 6 (November 29, 2023): 36–41. http://dx.doi.org/10.26689/jera.v7i6.5667.
Full textAghaei, John, and Morgan Beren. "An In-Depth Study on Privacy Law, Computer Viruses and Their Prevention." Mathematical Modeling and Algorithm Application 2, no. 1 (May 8, 2024): 20–22. http://dx.doi.org/10.54097/dva59m48.
Full textWang, Xi, and Lei Shi. "Design of computer network security storage system based on cloud computing technology." Journal of Physics: Conference Series 2083, no. 4 (November 1, 2021): 042084. http://dx.doi.org/10.1088/1742-6596/2083/4/042084.
Full textSlamet, Slamet. "Pelatihan jaringan komputer dan keamanannya bagi dosen dan mahasiswa Dili Institute of Technology (DIT) di Undika Surabaya." TEKMULOGI: Jurnal Pengabdian Masyarakat 3, no. 1 (June 20, 2023): 59–66. http://dx.doi.org/10.17509/tmg.v3i1.58074.
Full textKuprashvili, Henri. "Cyberspace and Terms: “kiberushishroeba” (Cyber Security) and “kiberusaprtkhoeba” (Computer Security)." Works of Georgian Technical University, no. 2(524) (June 6, 2022): 167–77. http://dx.doi.org/10.36073/1512-0996-2022-2-167-177.
Full textKumar, Indrajeet. "Machine Learning for Network Security: An Analysis of Intrusion Detection Systems." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, no. 2 (September 10, 2019): 1075–80. http://dx.doi.org/10.17762/turcomat.v10i2.13628.
Full textSafavi-Naini, Reihaneh, Alireza Poostindouz, and Viliam Lisy. "Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication." Security and Communication Networks 2018 (May 7, 2018): 1–15. http://dx.doi.org/10.1155/2018/8475818.
Full textZhu, Qingyi, Yuhang Liu, Xuhang Luo, and Kefei Cheng. "A Malware Propagation Model Considering Conformity Psychology in Social Networks." Axioms 11, no. 11 (November 10, 2022): 632. http://dx.doi.org/10.3390/axioms11110632.
Full textZhang, Ke. "A wormhole attack detection method for tactical wireless sensor networks." PeerJ Computer Science 9 (August 29, 2023): e1449. http://dx.doi.org/10.7717/peerj-cs.1449.
Full textYang, Wenfu. "Research on Computer Information Network Security Technology and Security Precaution Measures Based on Computer." Journal of Physics: Conference Series 1744, no. 4 (February 1, 2021): 042008. http://dx.doi.org/10.1088/1742-6596/1744/4/042008.
Full textКобцев, О. Е., А. И. Шеншин, В. М. Питолин, Л. В. Паринова, Ю. Г. Пастернак, and Ю. В. Макаров. "NETWORK ATTACKS BY COMPUTER VIRUSES: SPECIFIC INFORMATION SECURITY POLICY." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 27, no. 1(-) (March 29, 2024): 67–80. http://dx.doi.org/10.36622/1682-7813.2024.27.1.004.
Full textFeng, Liping, Ruifeng Han, Hongbin Wang, Qingshan Zhao, Chengli Fu, and Qi Han. "A Virus Propagation Model and Optimal Control Strategy in the Point-to-Group Network to Information Security Investment." Complexity 2021 (June 3, 2021): 1–7. http://dx.doi.org/10.1155/2021/6612451.
Full textSmith, Martin. "Part 2 Personnel security measures within a computer installation." Computer Law & Security Review 6, no. 2 (July 1990): 23–26. http://dx.doi.org/10.1016/0267-3649(90)90109-o.
Full textCourtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (March 1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.
Full textDr. Kashyap C. Patel, Dr. Sachin A. Goswami, Dr. Saurabh A. Dave, and Ajaykumar Patel. "Crippling Connectivity : Unveiling the Network Disruption Potential of Vehicular Rogue Access Points." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 3 (June 24, 2024): 632–43. http://dx.doi.org/10.32628/cseit241036.
Full textZhou, Zhengchun, and Wenyao Shen. "HoneyPot : Enhancing Cybersecurity through a computer simulation technology." Highlights in Science, Engineering and Technology 105 (June 30, 2024): 97–101. http://dx.doi.org/10.54097/0q8h9k30.
Full textSheikh, Yelena Mujibur, and Yash B. Dobhal. "Cybersecurity and Web of Things: A review on Ad hoc issues." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1–9. http://dx.doi.org/10.22214/ijraset.2022.40529.
Full textAlisultanova, Iman A., Galina A. Ovseenko, and Bella Kh Visaitova. "ANALYSIS OF NETWORK INFORMATION SECURITY STRATEGIES IN HIGHER EDUCATION INSTITUTIONS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 5/5, no. 146 (2024): 30–35. http://dx.doi.org/10.36871/ek.up.p.r.2024.05.05.005.
Full textJiang, Jianfeng. "Computer Network Security Threats and Treatment Measures Based on Host Security Protection." Journal of Physics: Conference Series 1992, no. 3 (August 1, 2021): 032049. http://dx.doi.org/10.1088/1742-6596/1992/3/032049.
Full textShi, Zi-xin. "Research on Computer Security Guarantee Measures in Network Environment." Journal of Physics: Conference Series 1550 (May 2020): 022033. http://dx.doi.org/10.1088/1742-6596/1550/2/022033.
Full textКобцев, О. Е., А. И. Шеншин, В. М. Питолин, В. И. Белоножкин, К. А. Разинкин, and А. С. Кривошеин. "NETWORK ATTACKS BY COMPUTER VIRUSES: SPECIFIC INFORMATION SECURITY INSTRUCTIONS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 27, no. 1(-) (March 29, 2024): 81–90. http://dx.doi.org/10.36622/1682-7813.2024.27.1.005.
Full textDong, Ya Hui, Wei Li, and Xu Wen Guo. "Analysis on Network Security and Solution of Computer." Advanced Materials Research 219-220 (March 2011): 1305–8. http://dx.doi.org/10.4028/www.scientific.net/amr.219-220.1305.
Full textHider, Nuria Mohamed. "Analysis of the Main Problems in Computer Network Security and Some Suggestions and Measures to Prevent Them." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1183–86. http://dx.doi.org/10.22214/ijraset.2022.40821.
Full textSun, Xiao Ru. "Research on the Computer Network Security." Applied Mechanics and Materials 687-691 (November 2014): 2007–10. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2007.
Full textHeinrich, Markus, Tsvetoslava Vateva-Gurova, Tolga Arul, Stefan Katzenbeisser, Neeraj Suri, Henk Birkholz, Andreas Fuchs, et al. "Security Requirements Engineering in Safety-Critical Railway Signalling Networks." Security and Communication Networks 2019 (July 14, 2019): 1–14. http://dx.doi.org/10.1155/2019/8348925.
Full textBaranenko, R. "Cyber crime, computer crime or cyber offense? The analysis of the features of a terminology application." National Technical University of Ukraine Journal. Political science. Sociology. Law, no. 1(49) (June 8, 2021): 85–90. http://dx.doi.org/10.20535/2308-5053.2021.1(49).233023.
Full textSun, Ning Ning, and Li Hua Ma. "Research and Maintenance of Computer Network Security." Applied Mechanics and Materials 687-691 (November 2014): 2431–34. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2431.
Full textAlfonsi, B. J. "Hacker study: aiding security measures development?" IEEE Security & Privacy 1, no. 6 (November 2003): 11. http://dx.doi.org/10.1109/msecp.2003.1253562.
Full textBadzeliuk, P. "On the issue of cybersecurity of advocacy activity." Analytical and Comparative Jurisprudence, no. 2 (July 24, 2022): 302–5. http://dx.doi.org/10.24144/2788-6018.2022.02.56.
Full textWang, Jian Hang, and Hai Bo Wang. "Computer Local Area Network Security and Management." Advanced Materials Research 1079-1080 (December 2014): 595–97. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.595.
Full textLabinsky, Alexander. "ON THE ISSUE OF NETWORK SECURITY." NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS) 2024, no. 2 (July 13, 2024): 39–46. http://dx.doi.org/10.61260/2307-7476-2024-2-39-46.
Full textDolente, Filippo, Rosario Giuseppe Garroppo, and Michele Pagano. "A Vulnerability Assessment of Open-Source Implementations of Fifth-Generation Core Network Functions." Future Internet 16, no. 1 (December 19, 2023): 1. http://dx.doi.org/10.3390/fi16010001.
Full textSun, Xiu Juan. "Personal Computer Network Security Prevention Research." Advanced Materials Research 971-973 (June 2014): 1684–87. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1684.
Full textIbaisi, Thaer AL, Stefan Kuhn, Mustafa Kaiiali, and Muhammad Kazim. "Network Intrusion Detection Based on Amino Acid Sequence Structure Using Machine Learning." Electronics 12, no. 20 (October 17, 2023): 4294. http://dx.doi.org/10.3390/electronics12204294.
Full textKocharla, Laxmaiah, and B. Veeramallu. "Secure Energy-Efficient Load Balancing and Routing in Wireless Sensor Networks With Mediative Micro-ANN Fuzzy Logic." International Journal of Fuzzy System Applications 11, no. 3 (July 1, 2022): 1–16. http://dx.doi.org/10.4018/ijfsa.306277.
Full textWei Jia, Cuiping Shi, Xuan Zhou,. "Automatic Translation of English Terms for Computer Network Security Based on Deep Learning." Journal of Electrical Systems 20, no. 3s (April 4, 2024): 598–609. http://dx.doi.org/10.52783/jes.1335.
Full textDong, Li Na. "Design of Computer Information Network Security System." Applied Mechanics and Materials 539 (July 2014): 305–9. http://dx.doi.org/10.4028/www.scientific.net/amm.539.305.
Full textYang, Xiao Hong, and Yue Feng Chen. "A Study of Vulnerability Detection and Prevention on Computer Network Security." Applied Mechanics and Materials 321-324 (June 2013): 2630–34. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2630.
Full textVASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (June 29, 2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.
Full text