Journal articles on the topic 'Computer network security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Computer network security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ming, Xiaobo, Ying Chen, and Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy." MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.
Full textShkilniak, S. S., and Yu Yu Yurchenko. "Methods of ensuring the security of computer network." Mathematical machines and systems 2 (2022): 102–10. http://dx.doi.org/10.34121/1028-9763-2022-2-102-110.
Full textSetyantoro, Dwipo, Vivi Afifah, Rika Astuti Hasibuan, Novi Aprilia, and Novi Permata Sari. "The WIRELESS COMPUTER NETWORK MANAGEMENT SECURITY ANALYSIS." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 7, no. 2 (February 18, 2022): 105–10. http://dx.doi.org/10.33480/jitk.v7i2.2786.
Full textZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Full textChen, Hong Zhu. "Discussion on Computer Network Security." Applied Mechanics and Materials 427-429 (September 2013): 2359–63. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2359.
Full textWan, Xue Yong, Liang Zhang, Wei Xu, and Hong Hui Gong. "Computer Network Security Strategy Research." Applied Mechanics and Materials 599-601 (August 2014): 1457–60. http://dx.doi.org/10.4028/www.scientific.net/amm.599-601.1457.
Full textNiu, Yiming, Wenyong Du, and Zhenying Tang. "Computer Network Security Defense Model." Journal of Physics: Conference Series 2146, no. 1 (January 1, 2022): 012041. http://dx.doi.org/10.1088/1742-6596/2146/1/012041.
Full textZhang, Kun, Hai Feng Wang, Jian Feng Zhu, and Zhuang Li. "Computer Network Security Several Strategies." Key Engineering Materials 474-476 (April 2011): 75–78. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.75.
Full textCourtney, M., J. Hayes, and P. Hunter. "The protectors [Computer network security]." Engineering & Technology 9, no. 5 (June 1, 2014): 54–8. http://dx.doi.org/10.1049/et.2014.0520.
Full textWhite, Gregory B., Eric A. Fisch, and Udo W. Pooch. "Computer System and Network Security." EDPACS 25, no. 8 (February 1998): 12–13. http://dx.doi.org/10.1201/1079/43236.25.8.19980201/30188.4.
Full textJackson, Keith M. "Tutorial: Computer and network security." Computer Fraud & Security Bulletin 9, no. 8 (June 1987): 15–16. http://dx.doi.org/10.1016/0142-0496(87)90122-6.
Full textCoronado, Adolfo S. "Corporate Computer and Network Security." Journal of Information Privacy and Security 8, no. 4 (October 2012): 81–84. http://dx.doi.org/10.1080/15536548.2012.10845668.
Full text周, 宏达. "Analysis of Computer Network Security." Computer Science and Application 03, no. 04 (2013): 202–7. http://dx.doi.org/10.12677/csa.2013.34035.
Full textJittawiriyanukoon, Chanintorn. "Evaluation of computer network security using attack undirected geography." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 3 (December 1, 2019): 1508. http://dx.doi.org/10.11591/ijeecs.v16.i3.pp1508-1514.
Full textZhang, Yan Kun. "Computer Network Security Threats and Security Technology Research." Advanced Materials Research 971-973 (June 2014): 1440–43. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1440.
Full textCohen, Fred. "Managing network security — Part 6: Computer games and network security management." Network Security 1997, no. 5 (May 1997): 14–18. http://dx.doi.org/10.1016/s1353-4858(97)90053-2.
Full textWang, Qiao Ling. "On the Maintenance Management and Network Security of Local Area Network." Applied Mechanics and Materials 484-485 (January 2014): 842–46. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.842.
Full textCERNOV, Ana-Maria. "Security in Computer Networks." International Journal of Information Security and Cybercrime 7, no. 1 (June 29, 2018): 45–52. http://dx.doi.org/10.19107/ijisc.2018.01.05.
Full textWidodo, Tri, and Adam Sekti Aji. "Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 1 (January 25, 2022): 46–55. http://dx.doi.org/10.14421/jiska.2022.7.1.46-55.
Full textShihab, Khalil. "A Backpropagation Neural Network for Computer Network Security." Journal of Computer Science 2, no. 9 (September 1, 2006): 710–15. http://dx.doi.org/10.3844/jcssp.2006.710.715.
Full textMo, Xin Ju. "Study on Information Security of Network-Based Manufacturing Environment." Applied Mechanics and Materials 484-485 (January 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.
Full textZhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.
Full textSun, Xiu Juan. "Personal Computer Network Security Prevention Research." Advanced Materials Research 971-973 (June 2014): 1684–87. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1684.
Full textSales Monteiro, Gisele, Wicaro Italo Cordovil Da Silva, Jean Mark Lobo De Oliveira, and Paulo Roberto Freitas Rodrigues. "TARGETING A COMPUTER NETWORK IN A UNIVERSITY CENTER." International Journal of Advanced Research 10, no. 11 (November 30, 2022): 435–39. http://dx.doi.org/10.21474/ijar01/15687.
Full textSun, Xiao Ru. "Research on the Computer Network Security." Applied Mechanics and Materials 687-691 (November 2014): 2007–10. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2007.
Full textBeker, HJ, and CJP Hale. "Network security." Data Processing 28, no. 4 (May 1986): 191–94. http://dx.doi.org/10.1016/0011-684x(86)90360-6.
Full textRahneva, Darina, Vanya Stoykova, Angelina Cherneva, and Krum Videnov. "VIRTUAL LABORATORY for NETWORK AND COMPUTER SECURITY." International Conference on Technics, Technologies and Education, no. 1 (2018): 315–22. http://dx.doi.org/10.15547/ictte.2018.08.003.
Full textYassir, Ammar, and Alaa A. "Current Computer Network Security Issues/Threats." International Journal of Computer Applications 155, no. 1 (December 15, 2016): 1–5. http://dx.doi.org/10.5120/ijca2016912255.
Full textBORMAN, STU. "Computer virus boosts network security efforts." Chemical & Engineering News 66, no. 46 (November 14, 1988): 8. http://dx.doi.org/10.1021/cen-v066n046.p008.
Full textEdwards, C. "Paranoid and adroit [computer network security]." Information Professional 2, no. 2 (April 1, 2005): 20–27. http://dx.doi.org/10.1049/inp:20050204.
Full textDeng, Robert H. "Network security." Computer Communications 18, no. 1 (January 1995): 55–56. http://dx.doi.org/10.1016/0140-3664(95)90074-8.
Full textQin, Yuan. "Computer Network Attack Modeling and Network Attack Graph Study." Advanced Materials Research 1079-1080 (December 2014): 816–19. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.816.
Full textWang, Xi, and Lei Shi. "Design of computer network security storage system based on cloud computing technology." Journal of Physics: Conference Series 2083, no. 4 (November 1, 2021): 042084. http://dx.doi.org/10.1088/1742-6596/2083/4/042084.
Full textDong, Li Na. "Design of Computer Information Network Security System." Applied Mechanics and Materials 539 (July 2014): 305–9. http://dx.doi.org/10.4028/www.scientific.net/amm.539.305.
Full textBorate, Madhur Anil, Ajay Narayan Panhale, Vijay Narayan Panhale, Pranjali Gade, and Dr Sunita Jadhav. "Cryptography & Network Security." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 819–26. http://dx.doi.org/10.22214/ijraset.2022.48057.
Full textGuo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.
Full textSun, Ling, and Dali Gao. "Security Attitude Prediction Model of Secret-Related Computer Information System Based on Distributed Parallel Computing Programming." Mathematical Problems in Engineering 2022 (March 25, 2022): 1–13. http://dx.doi.org/10.1155/2022/3141568.
Full textJin, Shujuan. "Research on Application of Neural Network in Computer Network Security Evaluation." Open Electrical & Electronic Engineering Journal 8, no. 1 (December 31, 2014): 766–71. http://dx.doi.org/10.2174/1874129001408010766.
Full textBoyanov, Petar. "USING THE SECURITY NETWORK SCANNER GFI LANGUARD TO DISCOVER AND IMPROVE THE VULNERABILITIES IN THE COMPUTER NETWORK SYSTEMS." Journal scientific and applied research 4, no. 1 (October 10, 2013): 74–79. http://dx.doi.org/10.46687/jsar.v4i1.83.
Full textNovokhrestov, Aleksey, Anton Konev, and Alexander Shelupanov. "Model of Threats to Computer Network Software." Symmetry 11, no. 12 (December 11, 2019): 1506. http://dx.doi.org/10.3390/sym11121506.
Full textSheikh, Yelena Mujibur, and Yash B. Dobhal. "Cybersecurity and Web of Things: A review on Ad hoc issues." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1–9. http://dx.doi.org/10.22214/ijraset.2022.40529.
Full textWang, Jian Hang, and Hai Bo Wang. "Computer Local Area Network Security and Management." Advanced Materials Research 1079-1080 (December 2014): 595–97. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.595.
Full text纪, 汉杰. "Computer Network Information Security and Protection Strategy Based on Computer Network Technology." Computer Science and Application 09, no. 09 (2019): 1703–7. http://dx.doi.org/10.12677/csa.2019.99190.
Full textLi, Xinwei, Hui Chen, and Bryan Ariann. "Computer network security evaluation model based on neural network." Journal of Intelligent & Fuzzy Systems 37, no. 1 (July 9, 2019): 71–78. http://dx.doi.org/10.3233/jifs-179065.
Full textMa, Jie, and Shuanbao Li. "The Construction Method of Computer Network Security Defense System Based on Multisource Big Data." Scientific Programming 2022 (May 12, 2022): 1–13. http://dx.doi.org/10.1155/2022/7300977.
Full textZhang, Kai, Liang Zhao, and Hai Qing Cao. "Research on the Computer Network Crime and Information Security." Applied Mechanics and Materials 687-691 (November 2014): 1806–9. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1806.
Full textDong, Ya Hui, Wei Li, and Xu Wen Guo. "Analysis on Network Security and Solution of Computer." Advanced Materials Research 219-220 (March 2011): 1305–8. http://dx.doi.org/10.4028/www.scientific.net/amr.219-220.1305.
Full textSun, Ning Ning, and Li Hua Ma. "Research and Maintenance of Computer Network Security." Applied Mechanics and Materials 687-691 (November 2014): 2431–34. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2431.
Full textAkhriana, Asmah, and Andi Irmayana. "WEB APP PENDETEKSI JENIS SERANGAN JARINGAN KOMPUTER DENGAN MEMANFAATKAN SNORT DAN LOG HONEYPOT." CCIT Journal 12, no. 1 (February 6, 2019): 85–96. http://dx.doi.org/10.33050/ccit.v12i1.604.
Full textWang, Xu. "Research on Security Management of Library Computer Network System." Applied Mechanics and Materials 687-691 (November 2014): 1720–23. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1720.
Full text