Journal articles on the topic 'Computer networks Computer security. Computers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Computer networks Computer security. Computers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ming, Xiaobo, Ying Chen, and Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy." MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.
Full textHewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.
Full textZhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.
Full textAisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.
Full textMoore, G. "Security for Computer Networks." Electronics and Power 31, no. 1 (1985): 85. http://dx.doi.org/10.1049/ep.1985.0059.
Full textWood, Charles Cresson. "Security for computer networks." Computers & Security 4, no. 3 (1985): 248–49. http://dx.doi.org/10.1016/0167-4048(85)90039-2.
Full textCERNOV, Ana-Maria. "Security in Computer Networks." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 45–52. http://dx.doi.org/10.19107/ijisc.2018.01.05.
Full textAkhriana, Asmah, and Andi Irmayana. "WEB APP PENDETEKSI JENIS SERANGAN JARINGAN KOMPUTER DENGAN MEMANFAATKAN SNORT DAN LOG HONEYPOT." CCIT Journal 12, no. 1 (2019): 85–96. http://dx.doi.org/10.33050/ccit.v12i1.604.
Full textZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Full textWang, Qiao Ling. "On the Maintenance Management and Network Security of Local Area Network." Applied Mechanics and Materials 484-485 (January 2014): 842–46. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.842.
Full textAndrews, M., and J. A. Whittaker. "Computer security." IEEE Security & Privacy Magazine 2, no. 5 (2004): 68–71. http://dx.doi.org/10.1109/msp.2004.66.
Full textChurchill, Elizabeth, Les Nelson, and Diana K. Smetters. "Useful Computer Security." IEEE Internet Computing 12, no. 3 (2008): 10–12. http://dx.doi.org/10.1109/mic.2008.67.
Full textJackson, Keith. "Security mechanisms for computer networks." Computer Fraud & Security Bulletin 12, no. 1 (1989): 19. http://dx.doi.org/10.1016/0142-0496(89)90108-2.
Full textPiper, Fred. "Security mechanisms for computer networks." Computer Communications 12, no. 3 (1989): 171. http://dx.doi.org/10.1016/0140-3664(89)90115-1.
Full textMiddleton, R. A. J. "Computer security." Computer Law & Security Review 3, no. 2 (1987): 23–24. http://dx.doi.org/10.1016/0267-3649(87)90040-9.
Full textSaxby, S. "Computer security." Computer Law & Security Review 22, no. 4 (2006): 338–39. http://dx.doi.org/10.1016/j.clsr.2005.12.007.
Full textShang, Yilun. "Optimal Control Strategies for Virus Spreading in Inhomogeneous Epidemic Dynamics." Canadian Mathematical Bulletin 56, no. 3 (2013): 621–29. http://dx.doi.org/10.4153/cmb-2012-007-2.
Full textLandwehr, Carl E. "Computer security." International Journal of Information Security 1, no. 1 (2001): 3–13. http://dx.doi.org/10.1007/s102070100003.
Full textHoendarto, Genrawan, and Vicni Iskandar. "RANCANG BANGUN APLIKASI PENGENALAN WAJAH UNTUK PASSWORD FILE DENGAN METODE JARINGAN SYARAF TIRUAN." Jurnal Ilmiah Matrik 21, no. 1 (2019): 11–21. http://dx.doi.org/10.33557/jurnalmatrik.v21i1.521.
Full textSuharyanto, Cosmas Eko, and Viriyadharma Gopama. "PEMANFAATAN MINI KOMPUTER RASPBERRY SEBAGAI NETWORK MONITORING TOOL PORTABLE." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 5, no. 1 (2019): 133–38. http://dx.doi.org/10.33480/jitk.v5i1.707.
Full textGoni, Osman. "Design, Deployment and Implementation of Local Area Network (LAN) at BAEC Head Quarter." International Journal of Computer Science and Mobile Computing 10, no. 5 (2021): 15–23. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.003.
Full textPiper, Fred. "Computer and communications security." Computer Communications 13, no. 1 (1990): 54. http://dx.doi.org/10.1016/0140-3664(90)90038-i.
Full textShikhaliyev, Ramiz. "SECURITY TRENDS IN MODERN COMPUTER NETWORKS." Problems of Information Society 06, no. 2 (2015): 71–74. http://dx.doi.org/10.25045/jpis.v06.i2.09.
Full textTutanescu, I., E. Sofron, and M. Ali. "Security of internet-connected computer networks." International Journal of Internet Technology and Secured Transactions 2, no. 1/2 (2010): 109. http://dx.doi.org/10.1504/ijitst.2010.031474.
Full textPierson, Lyndon G., and Edward L. Witzke. "A Security Methodology for Computer Networks." AT&T Technical Journal 67, no. 3 (1988): 28–36. http://dx.doi.org/10.1002/j.1538-7305.1988.tb00628.x.
Full textJittawiriyanukoon, Chanintorn. "Evaluation of computer network security using attack undirected geography." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 3 (2019): 1508. http://dx.doi.org/10.11591/ijeecs.v16.i3.pp1508-1514.
Full textCortesi, Agostino, and Riccardo Focardi. "Computer languages and security." Computer Languages, Systems & Structures 28, no. 1 (2002): 1–2. http://dx.doi.org/10.1016/s0096-0551(02)00005-x.
Full textKlevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.
Full textVASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.
Full textKonyeha, Susan, and Emmanuel A. Onibere. "Computer Immunity Using an Intrusion Detection System (IDS)." Advanced Materials Research 824 (September 2013): 200–205. http://dx.doi.org/10.4028/www.scientific.net/amr.824.200.
Full textWong, Ken. "Effective Computer Security Management." EDPACS 14, no. 1 (1986): 7–10. http://dx.doi.org/10.1080/07366988609452212.
Full textHash, Cindy. "The Computer Security Officer." EDPACS 19, no. 3 (1991): 1–5. http://dx.doi.org/10.1080/07366989109451266.
Full textWhite, Gregory B., Eric A. Fisch, and Udo W. Pooch. "Computer System and Network Security." EDPACS 25, no. 8 (1998): 12–13. http://dx.doi.org/10.1201/1079/43236.25.8.19980201/30188.4.
Full textMiddleton, R. "Computer security: the evidence." Computer Bulletin 37, no. 6 (1995): 2–4. http://dx.doi.org/10.1093/combul/37.6.2.
Full textVan Duyn, Julia. "Security in computer installations." Data Processing 27, no. 6 (1985): 19–22. http://dx.doi.org/10.1016/0011-684x(85)90264-3.
Full textAlese, Boniface Kayode, Iwasokun Gabriel Babatunde, and Haruna Danjuma Israel. "DSGM-Based Analysis of Computer Networks Security." International Journal for Information Security Research 3, no. 4 (2013): 374–82. http://dx.doi.org/10.20533/ijisr.2042.4639.2013.0043.
Full textIgor, Halenar, Juhasova Bohuslava, Juhas Martin, and Nesticky Martin. "Application of Neural Networks in Computer Security." Procedia Engineering 69 (2014): 1209–15. http://dx.doi.org/10.1016/j.proeng.2014.03.111.
Full textSun, Hung-Min. "Security of broadcasting cryptosystem in computer networks." Electronics Letters 35, no. 24 (1999): 2108. http://dx.doi.org/10.1049/el:19991431.
Full textPrabhu, Mukesh M., and S. V. Raghavan. "Security in computer networks and distributed systems." Computer Communications 19, no. 5 (1996): 379–88. http://dx.doi.org/10.1016/0140-3664(95)01031-9.
Full textAtmadja, Martono Dwi. "Single Board Computer Applications as Multi-Server VoIP." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 1023–28. http://dx.doi.org/10.22214/ijraset.2021.36512.
Full textSmith, Martin R. "Computer versus security staff?" Computer Law & Security Review 5, no. 3 (1989): 14–16. http://dx.doi.org/10.1016/0267-3649(89)90032-0.
Full textBloomBecker, J. J. Buck. "US computer security legislation H.R. 145: A step toward greater computer security?" Computer Law & Security Review 3, no. 5 (1988): 30–31. http://dx.doi.org/10.1016/0267-3649(88)90115-x.
Full textNovokhrestov, Aleksey, Anton Konev, and Alexander Shelupanov. "Model of Threats to Computer Network Software." Symmetry 11, no. 12 (2019): 1506. http://dx.doi.org/10.3390/sym11121506.
Full textBranstad, D. "Guest editorial - Computer security." IEEE Communications Magazine 23, no. 7 (1985): 10–11. http://dx.doi.org/10.1109/mcom.1985.1092611.
Full textGuo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.
Full textWasik, Martin. "CBI Conference on combating computer crime - increasing computer security." Computer Law & Security Review 4, no. 5 (1989): 4. http://dx.doi.org/10.1016/0267-3649(89)90132-5.
Full textRahneva, Darina, Vanya Stoykova, Angelina Cherneva, and Krum Videnov. "VIRTUAL LABORATORY for NETWORK AND COMPUTER SECURITY." International Conference on Technics, Technologies and Education, no. 1 (2018): 315–22. http://dx.doi.org/10.15547/ictte.2018.08.003.
Full textGercek, Gokhan, Naveed Saleem, and Douglas Steel. "Implementing Cloud Based Virtual Computer Network Labs for Online Education: Experiences from a Phased Approach." International Journal of Online Engineering (iJOE) 12, no. 03 (2016): 70. http://dx.doi.org/10.3991/ijoe.v12i03.5564.
Full textBella, Giampaolo, and Ronaldo Menezes. "Special Issue: Computer Security." Concurrency and Computation: Practice and Experience 16, no. 11 (2004): 1061. http://dx.doi.org/10.1002/cpe.803.
Full textTosun, Nilgün. "Social Networks as a Learning and Teaching Environment and Security in Social Networks." Journal of Education and Training Studies 6, no. 11a (2018): 194. http://dx.doi.org/10.11114/jets.v6i11a.3817.
Full text