Academic literature on the topic 'Computer network security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer network security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer network security"

1

Ming, Xiaobo, Ying Chen, and Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy." MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.

Full text
Abstract:
Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer. However, computers are not absolutely safe, and cases of information theft occur from time to time. Most people usually keep information confidential in the form of encryption. How to avoid the problem of computer information security. Computer network security involves all aspects. To solve these problems, there are many levels of technology, such as cryptography technology, network security technology and so on. Our country has also done a lot of research on the security protection of computer network technology, and these research results have also achieved certain results in the actual construction of computer network. In order to ensure the normal operation of computer networks, ensure information security and prevent information leakage and theft, a special protection system has been established to ensure the security of computer network information by setting up computer detection, security assessment and other links. However, with the rapid development of science and technology, the updating of electronic products is faster and faster, and the challenge of Wechat for network security information is more severe. How to protect computer network information security needs to be solved urgently, this paper discusses this.
APA, Harvard, Vancouver, ISO, and other styles
2

Shkilniak, S. S., and Yu Yu Yurchenko. "Methods of ensuring the security of computer network." Mathematical machines and systems 2 (2022): 102–10. http://dx.doi.org/10.34121/1028-9763-2022-2-102-110.

Full text
Abstract:
The aim of the article is to analyze the security of modern computer networks for the develop-ment of technical solutions used in the creation of corporate networks and to present practical applications for information security in the enterprise. One of the most important parts of the information infrastructure of modern enterprises and many government organizations are corporate networks. Since the operation of corporate systems can take place in an open environment, the failure of such a system or distortion of the subsystem of access to information resources actually means the cessation of the enterprise. The article considers the issues of methodological and technical aspects of information protection it the enterprise. The issues of application of network technologies for the implementation of security policy and levels of access to information are considered. Issues of security and access to information at different levels are considered and analyzed, taking into account technical and personnel support. The principles of construction used in network planning and decision-making are defined. The structure of the corporate network and the methodology of its creation are considered. The methods of realization of the corporate network of the enterprise taking into account the issues of security and protection of information are given. Theoretical and methodological bases for designing a corporate network for the information security of the enterprise are proposed. The article presents the technologies used in the creation of corporate networks. The methodology of creating a corporate network is considered, namely, what are the requirements for the corporate network and the technical objectives of the corporate computer network. As a result of the research, an updated scheme of the corporate computer network (for the implementation of computer security) was developed and the security system of the corporate computer network was presented.
APA, Harvard, Vancouver, ISO, and other styles
3

Setyantoro, Dwipo, Vivi Afifah, Rika Astuti Hasibuan, Novi Aprilia, and Novi Permata Sari. "The WIRELESS COMPUTER NETWORK MANAGEMENT SECURITY ANALYSIS." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 7, no. 2 (February 18, 2022): 105–10. http://dx.doi.org/10.33480/jitk.v7i2.2786.

Full text
Abstract:
The use of a wireless computer network in some institutions has become a very flexible option to connect all users of the existing computer network in the institution. This flexibility also has the disadvantage that anyone with a network password can take advantage of the wireless network. The possibility of threats to information security is very large, such as the presence of intruders on the network. Therefore, it is necessary to manage wireless networks that pay attention to information security issues on the network. The Directorate General of New, Renewable Energy and Energy Conservation at the Ministry of Energy and the Human Resources Republic of Indonesia was chosen as the research location given that computer network users in this institution are diverse and have also used The Dude MikroTik application to manage wireless computer networks, which are instruments to analyze information security. in this institution. The analysis was conducted to identify the activities and effectiveness of information security management in this institution. This study concludes that the use of The Dude MikroTik application is quite helpful in analyzing information security on wireless computer networks in this institution.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Full text
Abstract:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are loopholes in our network deeper understanding of network vulnerability and protection so that we have a new breakthrough for the network to provide a good environment for development.
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Hong Zhu. "Discussion on Computer Network Security." Applied Mechanics and Materials 427-429 (September 2013): 2359–63. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2359.

Full text
Abstract:
Abstract. As the development of informatization process and the rapid development of Internet, network security problems are highlighted gradually.College is a unity that requires large quantity and high quality of knowledge and information, and the network provides college students more opportunities to learn and communicate, but it also poses a serious crisis of Internet security.This paper has a deep analysis of present situation and necessity of college students' computer network security, and suggest that network information security education should be attatched great importance as a preventive measure and important countermeasures.Twenty-first Century is the era of information and technology, as an important channel of acquiring knowledge and information and a wide platform of all kinds of cultural dissemination and communication, network has played a positive role in promoting the exchange of social information, making personal interaction convenient, promoting social and economic development. Along with the rapid development and maturity of the campus network, network activity has become one of college students’ daily activities, and made a profound effect on students in all aspects.
APA, Harvard, Vancouver, ISO, and other styles
6

Wan, Xue Yong, Liang Zhang, Wei Xu, and Hong Hui Gong. "Computer Network Security Strategy Research." Applied Mechanics and Materials 599-601 (August 2014): 1457–60. http://dx.doi.org/10.4028/www.scientific.net/amm.599-601.1457.

Full text
Abstract:
Internet technology in the life to people bring convenient while, also is facing increasingly serious security threat from the network, many invaders one thousand ways to want to "see" to some concerned data or information, computer network information security is more and more attention. This article, from the perspective of the system vulnerability and network own existence safe hidden trouble, put forward to realize protection methods and strategies of network security.
APA, Harvard, Vancouver, ISO, and other styles
7

Niu, Yiming, Wenyong Du, and Zhenying Tang. "Computer Network Security Defense Model." Journal of Physics: Conference Series 2146, no. 1 (January 1, 2022): 012041. http://dx.doi.org/10.1088/1742-6596/2146/1/012041.

Full text
Abstract:
Abstract With the rapid development of the Internet industry, hundreds of millions of online resources are also booming. In the information space with huge and complex resources, it is necessary to quickly help users find the resources they are interested in and save users time. At this stage, the content industry’s application of the recommendation model in the content distribution process has become the mainstream. The content recommendation model provides users with a highly efficient and highly satisfying reading experience, and solves the problem of information redundancy to a certain extent. Knowledge tag personalized dynamic recommendation technology is currently widely used in the field of e-commerce. The purpose of this article is to study the optimization of the knowledge tag personalized dynamic recommendation system based on artificial intelligence algorithms. This article first proposes a hybrid recommendation algorithm based on the comparison between content-based filtering and collaborative filtering algorithms. It mainly introduces user browsing behavior analysis and design, KNN-based item similarity algorithm design, and hybrid recommendation algorithm implementation. Finally, through algorithm simulation experiments, the effectiveness of the algorithm in this paper is verified, and the accuracy of the recommendation has been improved.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Kun, Hai Feng Wang, Jian Feng Zhu, and Zhuang Li. "Computer Network Security Several Strategies." Key Engineering Materials 474-476 (April 2011): 75–78. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.75.

Full text
Abstract:
With the continuous development of the Internet, it while brings each kind of beneficial information to the people , the hacker, viral as well as the malicious destruction and so on bad factor also multiplies along with it the spread, the network security and the reliability have become the focal point which various countries pay attention together .
APA, Harvard, Vancouver, ISO, and other styles
9

Courtney, M., J. Hayes, and P. Hunter. "The protectors [Computer network security]." Engineering & Technology 9, no. 5 (June 1, 2014): 54–8. http://dx.doi.org/10.1049/et.2014.0520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

White, Gregory B., Eric A. Fisch, and Udo W. Pooch. "Computer System and Network Security." EDPACS 25, no. 8 (February 1998): 12–13. http://dx.doi.org/10.1201/1079/43236.25.8.19980201/30188.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer network security"

1

Burchett, Ian. "Quantifying Computer Network Security." TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.

Full text
Abstract:
Simplifying network security data to the point that it is readily accessible and usable by a wider audience is increasingly becoming important, as networks become larger and security conditions and threats become more dynamic and complex, requiring a broader and more varied security staff makeup. With the need for a simple metric to quantify the security level on a network, this thesis proposes: simplify a network’s security risk level into a simple metric. Methods for this simplification of an entire network’s security level are conducted on several characteristic networks. Identification of computer network port vulnerabilities from NIST’s Network Vulnerability Database (NVD) are conducted, and via utilization of NVD’s Common Vulnerability Scoring System values, composite scores are created for each computer on the network, and then collectively a composite score is computed for the entire network, which accurately represents the health of the entire network. Special concerns about small numbers of highly vulnerable computers or especially critical members of the network are confronted.
APA, Harvard, Vancouver, ISO, and other styles
2

Skaria, Sherin, and Fazely Hamedani Amir Reza. "Network Security Issues, Tools for Testing Security in Computer Network and Development Solution for Improving Security in Computer Network." Thesis, Halmstad University, Halmstad University, Halmstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lomas, Thomas Mark Angus. "Aspects of computer network security." Thesis, University of Cambridge, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Holtje, Carl. "Security in serverless network environments /." Link to online version, 2004. https://ritdml.rit.edu/dspace/handle/1850/439.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Deccio, Casey T. "Network-layer Selective Security." Diss., CLICK HERE for online access, 2004. http://contentdm.lib.byu.edu/ETD/image/etd560.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ali, Dana, and Goran Kap. "Statistical Analysis of Computer Network Security." Thesis, KTH, Matematisk statistik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-129948.

Full text
Abstract:
In this thesis it isshown how to measure the annual loss expectancy of computer networks due to therisk of cyber attacks. With the development of metrics for measuring theexploitation difficulty of identified software vulnerabilities, it is possibleto make a measurement of the annual loss expectancy for computer networks usingBayesian networks. To enable the computations, computer net-work vulnerabilitydata in the form of vulnerability model descriptions, vulnerable dataconnectivity relations and intrusion detection system measurements aretransformed into vector based numerical form. This data is then used to generatea probabilistic attack graph which is a Bayesian network of an attack graph.The probabilistic attack graph forms the basis for computing the annualizedloss expectancy of a computer network. Further, it is shown how to compute anoptimized order of vulnerability patching to mitigate the annual lossexpectancy. An example of computation of the annual loss expectancy is providedfor a small invented example network
APA, Harvard, Vancouver, ISO, and other styles
7

Dalwadi, Chintan. "Network and data security." Birmingham, Ala. : University of Alabama at Birmingham, 2006. http://www.mhsl.uab.edu/dt/2006m/dalwadi.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hausrath, Nathaniel L. "Methods for Hospital Network and Computer Security." University of Cincinnati / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mohammed, Ali, Sachin Sama, and Majeed Mohammed. "Enhancing Network Security in Linux Environment." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-17144.

Full text
Abstract:
Designing a secured network is the most important task in any enterprise or organization development. Securing a network mainly involves applying policies and procedures to protect different network devices from unauthorized access. Servers such as web servers, file servers, mail servers, etc., are the important devices in a network. Therefore, securing these servers is the first and foremost step followed in every security implementation mechanism. To implement this, it is very important to analyse and study the security mechanisms provided by the operating system. This makes it easier for security implementation in a network. This thesis work demonstrates the tasks needed to enhance the network security in Linux environment. The various security modules existing in Linux makes it different from other operating systems. The security measures which are mainly needed to enhance the system security are documented as a baseline for practical implementation. After analysing the security measures for implementing network security, it is important to understand the role of network monitoring tools and Linux inbuilt log management in maintaining the security of a network. This is accomplished by presenting a detailed discussion on network monitoring tools and log management in Linux. In order to test the network security, a network is designed using Linux systems by configuring different servers and application firewall for packet filtering. The security measures configured on each server to enhance its security are presented as part of the implementation. The results obtained while an unauthorized user accessing the servers from the external network are also documented along with attack information retrieved by different network monitoring tools and Linux inbuilt log messages.
APA, Harvard, Vancouver, ISO, and other styles
10

Dobson, Lucas E. "Security analysis of session initiation protocol." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDobson.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2010.
Thesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer network security"

1

Kotenko, Igor, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14706-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rak, Jacek, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, and Krzysztof Szczypiorski, eds. Computer Network Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65127-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gorodetsky, Vladimir, Igor Kotenko, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11560326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gorodetsky, Vladimir, Igor Kotenko, and Victor A. Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73986-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Jie. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-79698-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kotenko, Igor, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33704-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kizza, Joseph Migga. Computer Network Security. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/b106962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gorodetsky, Vladimir, Leonard Popyack, and Victor Skormin, eds. Computer Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/b12005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Network security. Manchester, Eng: NCC Blackwell, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Network Security. New York: McGraw-Hill, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer network security"

1

Lefebvre, E. "Computer Network Security." In Multisensor Fusion, 765–78. Dordrecht: Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-010-0556-2_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Duffany, Jeffrey L. "Computer Security." In Computer and Network Security Essentials, 3–20. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pieprzyk, Josef, Thomas Hardjono, and Jennifer Seberry. "Network Security." In Fundamentals of Computer Security, 591–629. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-662-07324-7_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barksdale, William J. "Network Security." In Practical Computer Data Communications, 419–36. Boston, MA: Springer US, 1986. http://dx.doi.org/10.1007/978-1-4684-5164-1_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Salomon, David. "Network Security." In Elements of Computer Security, 179–208. London: Springer London, 2010. http://dx.doi.org/10.1007/978-0-85729-006-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sadiku, Matthew N. O., and Cajetan M. Akujuobi. "Network Security." In Fundamentals of Computer Networks, 137–48. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09417-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Weik, Martin H. "network security." In Computer Science and Communications Dictionary, 1089. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_12266.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

de Alencar, Marcelo Sampaio. "Computer Networks." In Cryptography and Network Security, 91–121. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003337768-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kizza, Joseph Migga. "Computer Network Security Protocols." In Guide to Computer Network Security, 359–89. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kizza, Joseph Migga. "Computer Network Security Fundamentals." In Guide to Computer Network Security, 41–57. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer network security"

1

Nanda, Priyadarsi, and Stefan Kraxberger. "Session details: Computer and network security (computer and network security symposium)." In IWCMC '10: 2010 International Wireless Communications and Mobile Computing Conference. New York, NY, USA: ACM, 2010. http://dx.doi.org/10.1145/3258155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Guizani, M., and Hsiao-Hwa Chen. "Computer & network security." In GLOBECOM '05. IEEE Global Telecommunications Conference, 2005. IEEE, 2005. http://dx.doi.org/10.1109/glocom.2005.1578354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Das, Divyajyoti, and Somesh Nanda. "Securing computer networks by networking multiple OS kernels. Revisting network security: Protecting computer networks from malwares." In 2013 World Congress on Internet Security (WorldCIS). IEEE, 2013. http://dx.doi.org/10.1109/worldcis.2013.6751025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zheng, Xiaoxia. "Computer network security and measures." In Mechanical Engineering and Information Technology (EMEIT). IEEE, 2011. http://dx.doi.org/10.1109/emeit.2011.6023622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Su, Xu. "Session details: Computer and network security symposium: security in wireless networks." In IWCMC07: International Wireless Communications and Mobile Computing Conference. New York, NY, USA: ACM, 2007. http://dx.doi.org/10.1145/3259075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Khanna, Rahul. "Session details: Computer and network security symposium: systems and network security." In IWCMC07: International Wireless Communications and Mobile Computing Conference. New York, NY, USA: ACM, 2007. http://dx.doi.org/10.1145/3259071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cambazoglu, V., and N. Thota. "Computer Science Students' Perception of Computer Network Security." In 2013 Learning and Teaching in Computing and Enginering (LaTiCE). IEEE, 2013. http://dx.doi.org/10.1109/latice.2013.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"Computer architecture/network security [session events]." In 2012 Fourth International Conference on Advanced Computing (ICoAC). IEEE, 2012. http://dx.doi.org/10.1109/icoac.2012.6416878.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chunli, Liu, and Liu DongHui. "Computer network security issues and countermeasures." In 2012 IEEE Symposium on Robotics and Applications (ISRA). IEEE, 2012. http://dx.doi.org/10.1109/isra.2012.6219190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tan, Juan. "Research of Computer Network Security Technology." In 2015 International Conference on Management, Education, Information and Control. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/meici-15.2015.129.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer network security"

1

Johannes, James D., Andrew Fanning, Kyle Hoover, Tim Lewis, and Marsha Robinson. Computer Network Security and Directory Services Architecture. Fort Belvoir, VA: Defense Technical Information Center, March 2000. http://dx.doi.org/10.21236/ada392366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Semerikov, Serhiy, Illia Teplytskyi, Yuliia Yechkalo, Oksana Markova, Vladimir Soloviev, and Arnold Kiv. Computer Simulation of Neural Networks Using Spreadsheets: Dr. Anderson, Welcome Back. [б. в.], June 2019. http://dx.doi.org/10.31812/123456789/3178.

Full text
Abstract:
The authors of the given article continue the series presented by the 2018 paper “Computer Simulation of Neural Networks Using Spreadsheets: The Dawn of the Age of Camelot”. This time, they consider mathematical informatics as the basis of higher engineering education fundamentalization. Mathematical informatics deals with smart simulation, information security, long-term data storage and big data management, artificial intelligence systems, etc. The authors suggest studying basic principles of mathematical informatics by applying cloud-oriented means of various levels including those traditionally considered supplementary – spreadsheets. The article considers ways of building neural network models in cloud-oriented spreadsheets, Google Sheets. The model is based on the problem of classifying multi-dimensional data provided in “The Use of Multiple Measurements in Taxonomic Problems” by R. A. Fisher. Edgar Anderson’s role in collecting and preparing the data in the 1920s-1930s is discussed as well as some peculiarities of data selection. There are presented data on the method of multi-dimensional data presentation in the form of an ideograph developed by Anderson and considered one of the first efficient ways of data visualization.
APA, Harvard, Vancouver, ISO, and other styles
3

Data Encryption Standard. Gaithersburg, MD: National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.

Full text
Abstract:
The selective application of technological and related procedural safeguards is an important responsibility of every Federal organization in providing adequate security to its ADP systems. This publication provides a standard to be used by Federal organizations when these organizations specify that cryptographic protection ia to be used for 11emitive or valuable computer data. Protection of computer data during transmission between electronic components or while in storage may be necessary to maintain the confidentiality and integrity of the Information represented by that data. The standard specifies an encryption algorithm which is to be implemented in an el.ectronJc device for use in Federal ADP systems and networks. The algorithm uniquely defines the mathematical steps required to transform computer data into a cryptographic cipher. It also specifies the steps required to transform the cipher back to its original form. A device performing this algorithm may be used in many applications areas where cryptographic data protection is needed. Within the context of a total security program comprising physical security procedures, good information management practices and computer system/network access controls, the Data Encryption Standard is being made available for use by Federal agencies. This revision supersedes FIPS 46.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography