Search

Showing total 103 results

Search Constraints

Start Over You searched for: Topic computer networks Remove constraint Topic: computer networks Publication Type Academic Journals Remove constraint Publication Type: Academic Journals Publisher tech science press Remove constraint Publisher: tech science press
103 results

Search Results

1. An Enhanced Intelligent Intrusion Detection System to Secure E-Commerce Communication Systems.

2. Network Security Enhanced with Deep Neural Network-Based Intrusion Detection System.

3. Multi-Target Tracking of Person Based on Deep Learning.

4. Enhancing PDF Malware Detection through Logistic Model Trees.

5. Topological Evaluation of Certain Computer Networks by Contraharmonic-Quadratic Indices.

6. HDLIDP: A Hybrid Deep Learning Intrusion Detection and Prevention Framework.

7. K-Banhatti Sombor Invariants of Certain Computer Networks.

8. Floyd-Warshall Algorithm Based on Picture Fuzzy Information.

9. Improved Hybrid Swarm Intelligence for Optimizing the Energy in WSN.

10. Hybridizing Artificial Bee Colony with Bat Algorithm for Web Service Composition.

11. Optimized Tuning of LOADng Routing Protocol Parameters for IoT.

12. Modified Garden Balsan Optimization Based Machine Learning for Intrusion Detection.

13. Wrapper Based Linear Discriminant Analysis (LDA) for Intrusion Detection in IIoT.

14. Building the concept semantic space for large text database.

15. K-Banhatti Invariants Empowered Topological Investigation of Bridge Networks.

16. Wireless Intrusion Detection Based on Optimized LSTM with Stacked Auto Encoder Network.

17. A Genetic Algorithm Optimization for Multi-Objective Multicast Routing.

18. Signature-Based Intrusion Detection System in Wireless 6G IoT Networks.

19. Ant Colony Optimization for Multi-Objective Multicast Routing.

20. An Intrusion Detection Algorithm Based on Feature Graph.

21. Implementation and Validation of the Optimized Deduplication Strategy in Federated Cloud Environment.

22. A CPK-Based Identity Authentication Scheme for IoT.

23. A Cooperative Dynamic Cluster in Multitasking Mobile Networks.

24. Availability modeling for multi-tier cloud environment.

25. An extensive empirical evaluation of classifier ensembles for intrusion detection task.

26. THE RESEARCH OF A NEW STREAMING MEDIA NETWORK ARCHITECTURE BASED ON THE FUSION OF P2P AND CDN.

27. Reduced Differential Transform Method for Solving Nonlinear Biomathematics Models.

28. Mitigating Content Caching Attack in NDN.

29. AN EFFECTIVE NETWORK CODING STRATEGY WITH SCALABLE VIDEO CODING FOR PEER-TO-PEER STREAMING.

31. A New Malicious Code Classification Method for the Security of Financial Software.

32. Unknown DDoS Attack Detection with Fuzzy C-Means Clustering and Spatial Location Constraint Prototype Loss.

33. Energy-efficient power allocation for MIMO two-way cognitive relay networks.

34. A Genetic Algorithm to Solve Capacity Assignment Problem in a Flow Network.

35. Computation of PoA for Selfish Node Detection and Resource Allocation Using Game Theory.

36. A Hierarchal Clustered Based Proactive Caching in NDN-Based Vehicular Network.

37. APPLICATION OF FAHP FOR STONE ARCH BRIDGE STRENGTHENING SCHEME OPTIMIZATION.

38. Numerical Treatment for Stochastic Computer Virus Mode.

39. Scheduling algorithms for concurrently streaming multimedia objects in P2P overlay networks.

40. DESIGN OF A TESTCHIP FOR LOW COST IC TESTING.

41. Object and process migration in .NET.

42. Multi-agent technologies for computer network security: Attack simulation, intrusion detection and intrusion detection learning.

43. An Improved Steganographic Scheme Using the Contour Principle to Ensure the Privacy of Medical Data on Digital Images.

44. Modified Buffalo Optimization with Big Data Analytics Assisted Intrusion Detection Model.

45. Sensor Network Structure Recognition Based on P-law.

46. Small-World Networks with Unitary Cayley Graphs for Various Energy Generation.

47. Differential Evolution with Arithmetic Optimization Algorithm Enabled Multi-Hop Routing Protocol.

48. Energy-Efficient Routing Using Novel Optimization with Tabu Techniques for Wireless Sensor Network.

49. Wireless Sensor Security Issues on Data Link Layer: A Survey.

50. Group-based fast data packet attribute authentication in the reconfigurable networks.