To see the other types of publications on this topic, follow the link: Computer networks Computer security. Computers.

Journal articles on the topic 'Computer networks Computer security. Computers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer networks Computer security. Computers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ming, Xiaobo, Ying Chen, and Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy." MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.

Full text
Abstract:
Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer. However, computers are not absolutely safe, and cases of information theft occur from time to time. Most people usually keep information confidential in the form of encryption. How to avoid the problem of computer information security. Computer network security involves all aspects. To solve these problems, there are many levels of technology, such
APA, Harvard, Vancouver, ISO, and other styles
2

Hewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.

Full text
Abstract:
Organizations expect their employees to connect securely to the organization's computer systems. Often these employees use their personal computers to access the organization's networks. This research explores whether these same employees apply protective security measures to their personal computers. Perhaps these employees behave riskily based on their optimistic bias. Results indicate that while cyber optimistic bias and perceived vulnerability influence individuals to apply more protective security measures, the users still experienced security incidents. Thus, organization are vulnerable
APA, Harvard, Vancouver, ISO, and other styles
3

Zhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.

Full text
Abstract:
In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. Here we assume that there exists a threshold value which determines when countermeasures should be taken to level up the security of a fraction of computers with low security level. And in some specific realistic environments the propagation network can be regarded as fully interconnected. Inspired by these facts, this paper presents a novel computer virus dynamics model considering the impact brought by secu
APA, Harvard, Vancouver, ISO, and other styles
4

Aisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.

Full text
Abstract:
Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this c
APA, Harvard, Vancouver, ISO, and other styles
5

Moore, G. "Security for Computer Networks." Electronics and Power 31, no. 1 (1985): 85. http://dx.doi.org/10.1049/ep.1985.0059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wood, Charles Cresson. "Security for computer networks." Computers & Security 4, no. 3 (1985): 248–49. http://dx.doi.org/10.1016/0167-4048(85)90039-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

CERNOV, Ana-Maria. "Security in Computer Networks." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 45–52. http://dx.doi.org/10.19107/ijisc.2018.01.05.

Full text
Abstract:
Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. This paper presents the main issues regarding the network security issues and solutions to fight back the cyber-attacks.
APA, Harvard, Vancouver, ISO, and other styles
8

Akhriana, Asmah, and Andi Irmayana. "WEB APP PENDETEKSI JENIS SERANGAN JARINGAN KOMPUTER DENGAN MEMANFAATKAN SNORT DAN LOG HONEYPOT." CCIT Journal 12, no. 1 (2019): 85–96. http://dx.doi.org/10.33050/ccit.v12i1.604.

Full text
Abstract:
Along with the current development of Information Technology is always changing to make the security of an information is very important, especially on a network connected to the internet. But what is unfortunate is that the imbalance between each development of a technology is not accompanied by developments in the security system itself, so that there are quite a lot of systems that are still weak and have to be increased by the security wall. This study aims to design a Web-based App interface to facilitate users or administrators in securing network computers from various types of attacks.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Full text
Abstract:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are looph
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Qiao Ling. "On the Maintenance Management and Network Security of Local Area Network." Applied Mechanics and Materials 484-485 (January 2014): 842–46. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.842.

Full text
Abstract:
With the development of the science and technology of the computer application, the maintenance management and the security of the computers is an important problem. In this paper the author presents his own opinions on these issues. Therefore, the maintenance management of the computer local area network is very important to guarantee the security and stability of the network and to the use of the cyber sources to a maximum.
APA, Harvard, Vancouver, ISO, and other styles
11

Andrews, M., and J. A. Whittaker. "Computer security." IEEE Security & Privacy Magazine 2, no. 5 (2004): 68–71. http://dx.doi.org/10.1109/msp.2004.66.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Churchill, Elizabeth, Les Nelson, and Diana K. Smetters. "Useful Computer Security." IEEE Internet Computing 12, no. 3 (2008): 10–12. http://dx.doi.org/10.1109/mic.2008.67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Jackson, Keith. "Security mechanisms for computer networks." Computer Fraud & Security Bulletin 12, no. 1 (1989): 19. http://dx.doi.org/10.1016/0142-0496(89)90108-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Piper, Fred. "Security mechanisms for computer networks." Computer Communications 12, no. 3 (1989): 171. http://dx.doi.org/10.1016/0140-3664(89)90115-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Middleton, R. A. J. "Computer security." Computer Law & Security Review 3, no. 2 (1987): 23–24. http://dx.doi.org/10.1016/0267-3649(87)90040-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Saxby, S. "Computer security." Computer Law & Security Review 22, no. 4 (2006): 338–39. http://dx.doi.org/10.1016/j.clsr.2005.12.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Shang, Yilun. "Optimal Control Strategies for Virus Spreading in Inhomogeneous Epidemic Dynamics." Canadian Mathematical Bulletin 56, no. 3 (2013): 621–29. http://dx.doi.org/10.4153/cmb-2012-007-2.

Full text
Abstract:
Abstract.In this paper, we study the spread of virus/worm in computer networks with a view to addressing cyber security problems. Epidemic models have been applied extensively to model the propagation of computer viruses, which characterize the fact that infected machines may spread malware to other hosts connected to the network. In our framework, the dynamics of hosts evolves according to a modified inhomogeneous Susceptible-Infectious-Susceptible (SIS) epidemic model with time-varying transmission rate and recovery rate. The infection of computers is subject to direct attack as well as prop
APA, Harvard, Vancouver, ISO, and other styles
18

Landwehr, Carl E. "Computer security." International Journal of Information Security 1, no. 1 (2001): 3–13. http://dx.doi.org/10.1007/s102070100003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Hoendarto, Genrawan, and Vicni Iskandar. "RANCANG BANGUN APLIKASI PENGENALAN WAJAH UNTUK PASSWORD FILE DENGAN METODE JARINGAN SYARAF TIRUAN." Jurnal Ilmiah Matrik 21, no. 1 (2019): 11–21. http://dx.doi.org/10.33557/jurnalmatrik.v21i1.521.

Full text
Abstract:
Data security for computer users is increasingly becoming a concern because it is increasingly vulnerable to illegal access even though the file has been protected with a password. This is possible with the increasing number of applications aimed at hacking owner protection. Artificial neural network that was appointed in this study is one part of computer vision, which in this study is intended to make computers able to "see" through a webcam and recognize that face has access rights to the selected file. So that computers can distinguish facial images, it needs to be trained by applying the
APA, Harvard, Vancouver, ISO, and other styles
20

Suharyanto, Cosmas Eko, and Viriyadharma Gopama. "PEMANFAATAN MINI KOMPUTER RASPBERRY SEBAGAI NETWORK MONITORING TOOL PORTABLE." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 5, no. 1 (2019): 133–38. http://dx.doi.org/10.33480/jitk.v5i1.707.

Full text
Abstract:
This study aims to design a portable monitoring system using the Raspberry mini computer. As a case study, we conducted this research at Credit Union Tunas Harapan, which is based in Batam, Indonesia. We implemented the system with additional tools to monitor networks, namely Wireshark and Nagios. On the local network, we managed to monitor broadcasting from the switch. We have also analyzed several issues on network security. The use of architectural Raspberry mini computers is a very flexible tool.
APA, Harvard, Vancouver, ISO, and other styles
21

Goni, Osman. "Design, Deployment and Implementation of Local Area Network (LAN) at BAEC Head Quarter." International Journal of Computer Science and Mobile Computing 10, no. 5 (2021): 15–23. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.003.

Full text
Abstract:
A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, invo
APA, Harvard, Vancouver, ISO, and other styles
22

Piper, Fred. "Computer and communications security." Computer Communications 13, no. 1 (1990): 54. http://dx.doi.org/10.1016/0140-3664(90)90038-i.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Shikhaliyev, Ramiz. "SECURITY TRENDS IN MODERN COMPUTER NETWORKS." Problems of Information Society 06, no. 2 (2015): 71–74. http://dx.doi.org/10.25045/jpis.v06.i2.09.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Tutanescu, I., E. Sofron, and M. Ali. "Security of internet-connected computer networks." International Journal of Internet Technology and Secured Transactions 2, no. 1/2 (2010): 109. http://dx.doi.org/10.1504/ijitst.2010.031474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Pierson, Lyndon G., and Edward L. Witzke. "A Security Methodology for Computer Networks." AT&T Technical Journal 67, no. 3 (1988): 28–36. http://dx.doi.org/10.1002/j.1538-7305.1988.tb00628.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Jittawiriyanukoon, Chanintorn. "Evaluation of computer network security using attack undirected geography." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 3 (2019): 1508. http://dx.doi.org/10.11591/ijeecs.v16.i3.pp1508-1514.

Full text
Abstract:
<span>To secure a wealth of data traversing the computer network at your fingertips is compulsory. But when attack arises at various parts of the network it is difficult to protect, especially when each incident is investigated separately. Geography is a necessary construct in computer networks. The analytics of geography algorithms and metrics to curate insight from a security problem are a critical method of analysis for computer systems. A geography based representation is employed to highlight aspects (on a local and global level) of a security problem which are Eigenvalue, eccentric
APA, Harvard, Vancouver, ISO, and other styles
27

Cortesi, Agostino, and Riccardo Focardi. "Computer languages and security." Computer Languages, Systems & Structures 28, no. 1 (2002): 1–2. http://dx.doi.org/10.1016/s0096-0551(02)00005-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Klevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.

Full text
Abstract:
The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs). The authors specified the main areas of assessing the computer security of NPP I&C systems, especially the assessment of cyber threats, vulnerabilities of I&C computer security, sufficiency of applied measures for ensuring I&C systems computer security, risks of I&C system computer security as well as periodic reassessment of I&C computer security. The paper considers the assessment of I&C computer security vulnerabi
APA, Harvard, Vancouver, ISO, and other styles
29

VASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.

Full text
Abstract:
Today, most businesses are based on a computer system, more or less developed. For daily activities the organization needs to be able to connect to the Internet, possibly from a local area network (LAN). But, once with the benefits of the Internet, there are also security risks that the organization must minimize by measures and appropriate controls. Among security issues arising from using the Internet include hacker attacks, computers infection with viruses, malware and spyware. In theory, hackers can enter inside the organization network and steal confidential data, damaging computers or th
APA, Harvard, Vancouver, ISO, and other styles
30

Konyeha, Susan, and Emmanuel A. Onibere. "Computer Immunity Using an Intrusion Detection System (IDS)." Advanced Materials Research 824 (September 2013): 200–205. http://dx.doi.org/10.4028/www.scientific.net/amr.824.200.

Full text
Abstract:
Computers are involved in every aspect of modern society and have become an essential part of our lives, but their vulnerability is of increasing concern to us. Security flaws are inherent in the operation of computers Most flaws are caused by errors in the process of software engineering or unforeseen mishaps and it is difficult to solve these problems by conventional methods. A radical way of constantly monitoring the system for newly disclosed vulnerabilities is required. In order to devise such a system, this work draws an analogy between computer immune systems and the human immune system
APA, Harvard, Vancouver, ISO, and other styles
31

Wong, Ken. "Effective Computer Security Management." EDPACS 14, no. 1 (1986): 7–10. http://dx.doi.org/10.1080/07366988609452212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Hash, Cindy. "The Computer Security Officer." EDPACS 19, no. 3 (1991): 1–5. http://dx.doi.org/10.1080/07366989109451266.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

White, Gregory B., Eric A. Fisch, and Udo W. Pooch. "Computer System and Network Security." EDPACS 25, no. 8 (1998): 12–13. http://dx.doi.org/10.1201/1079/43236.25.8.19980201/30188.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Middleton, R. "Computer security: the evidence." Computer Bulletin 37, no. 6 (1995): 2–4. http://dx.doi.org/10.1093/combul/37.6.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Van Duyn, Julia. "Security in computer installations." Data Processing 27, no. 6 (1985): 19–22. http://dx.doi.org/10.1016/0011-684x(85)90264-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Alese, Boniface Kayode, Iwasokun Gabriel Babatunde, and Haruna Danjuma Israel. "DSGM-Based Analysis of Computer Networks Security." International Journal for Information Security Research 3, no. 4 (2013): 374–82. http://dx.doi.org/10.20533/ijisr.2042.4639.2013.0043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Igor, Halenar, Juhasova Bohuslava, Juhas Martin, and Nesticky Martin. "Application of Neural Networks in Computer Security." Procedia Engineering 69 (2014): 1209–15. http://dx.doi.org/10.1016/j.proeng.2014.03.111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Sun, Hung-Min. "Security of broadcasting cryptosystem in computer networks." Electronics Letters 35, no. 24 (1999): 2108. http://dx.doi.org/10.1049/el:19991431.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Prabhu, Mukesh M., and S. V. Raghavan. "Security in computer networks and distributed systems." Computer Communications 19, no. 5 (1996): 379–88. http://dx.doi.org/10.1016/0140-3664(95)01031-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Atmadja, Martono Dwi. "Single Board Computer Applications as Multi-Server VoIP." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 1023–28. http://dx.doi.org/10.22214/ijraset.2021.36512.

Full text
Abstract:
Telecommunication technology is developing along with information technology and several innovations in several audio and data transmission and reception techniques. Innovation and communication technology are hoped to be able to create efficiencies in regards to time, equipment, and cost. The Public Switched Telephone Network (PSTN) telephone technology has experienced integration towards communication using Internet Protocol (IP) networks, better known as Voice over Internet Protocol (VoIP). VoIP Technology transmits conversations digitally through IP-based networks, such as internet network
APA, Harvard, Vancouver, ISO, and other styles
41

Smith, Martin R. "Computer versus security staff?" Computer Law & Security Review 5, no. 3 (1989): 14–16. http://dx.doi.org/10.1016/0267-3649(89)90032-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

BloomBecker, J. J. Buck. "US computer security legislation H.R. 145: A step toward greater computer security?" Computer Law & Security Review 3, no. 5 (1988): 30–31. http://dx.doi.org/10.1016/0267-3649(88)90115-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Novokhrestov, Aleksey, Anton Konev, and Alexander Shelupanov. "Model of Threats to Computer Network Software." Symmetry 11, no. 12 (2019): 1506. http://dx.doi.org/10.3390/sym11121506.

Full text
Abstract:
This article highlights the issue of identifying information security threats to computer networks. The aim of the study is to increase the number of identified threats. Firstly, it was carried out the analysis of computer network models used to identify threats, as well as in approaches to building computer network threat models. The shortcomings that need to be corrected are highlighted. On the basis of the mathematical apparatus of attributive metagraphs, a computer network model is developed that allows to describe the software components of computer networks and all possible connections b
APA, Harvard, Vancouver, ISO, and other styles
44

Branstad, D. "Guest editorial - Computer security." IEEE Communications Magazine 23, no. 7 (1985): 10–11. http://dx.doi.org/10.1109/mcom.1985.1092611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Guo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.

Full text
Abstract:
with the rapid development and wide application of wireless networking technology, Information security issues are increasingly prominent manifested by more and more attention. The article describes the schema of the data monitoring platform separate from the data layer, network layer and presentation layer three levels,focuses on platform of intelligent back-end database structure, and proposed specific measures to ensure platform security,to ensure the information security of computer networks, so as to give full play role of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
46

Wasik, Martin. "CBI Conference on combating computer crime - increasing computer security." Computer Law & Security Review 4, no. 5 (1989): 4. http://dx.doi.org/10.1016/0267-3649(89)90132-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Rahneva, Darina, Vanya Stoykova, Angelina Cherneva, and Krum Videnov. "VIRTUAL LABORATORY for NETWORK AND COMPUTER SECURITY." International Conference on Technics, Technologies and Education, no. 1 (2018): 315–22. http://dx.doi.org/10.15547/ictte.2018.08.003.

Full text
Abstract:
We live in the digital era and our daily lives are constantly connected with information and communication technologies. But this new world of digital information has inevitably raised the issue of data security, stored on electronic media or transmitted over the Networks. An important part in the field of computer and network security is cryptography and its study is an indispensable element in the preparation of all future specialists in the field of computer and communication technologies. The purpose of this report is to present a new way to conduct practical training in the field of Netwo
APA, Harvard, Vancouver, ISO, and other styles
48

Gercek, Gokhan, Naveed Saleem, and Douglas Steel. "Implementing Cloud Based Virtual Computer Network Labs for Online Education: Experiences from a Phased Approach." International Journal of Online Engineering (iJOE) 12, no. 03 (2016): 70. http://dx.doi.org/10.3991/ijoe.v12i03.5564.

Full text
Abstract:
On-line instruction rather easily accommodates courses in some fields such as history, sociology, business administration and political sciences. However, it poses significant challenges for courses in technical fields that require hands-on experimentation. Courses in computer networking area constitute such an example. Given the demand for on-line courses and the trend for migration to online mode, there is a need to devise strategies that would allow students to conduct computing experiments remotely. Virtualization is a rapidly evolving technology that provides opportunities for online comp
APA, Harvard, Vancouver, ISO, and other styles
49

Bella, Giampaolo, and Ronaldo Menezes. "Special Issue: Computer Security." Concurrency and Computation: Practice and Experience 16, no. 11 (2004): 1061. http://dx.doi.org/10.1002/cpe.803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Tosun, Nilgün. "Social Networks as a Learning and Teaching Environment and Security in Social Networks." Journal of Education and Training Studies 6, no. 11a (2018): 194. http://dx.doi.org/10.11114/jets.v6i11a.3817.

Full text
Abstract:
Technology is in a constantly evolving and changing structure since the existence of mankind. Because of this dynamic structure, technology fulfills a number of functions such as facilitating people's lives, time, profit from work, profit from cost, making life more enjoyable. At the same time, technology is used in all areas of life, and it also causes changes and transformations in these areas. Education is one of these areas, perhaps the most important, that technology affects. The hunter society, written with nails, made an important step with the paper's invention, and the written documen
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!