To see the other types of publications on this topic, follow the link: Computer networks Computers Computer security.

Journal articles on the topic 'Computer networks Computers Computer security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer networks Computers Computer security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ming, Xiaobo, Ying Chen, and Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy." MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.

Full text
Abstract:
Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer. However, computers are not absolutely safe, and cases of information theft occur from time to time. Most people usually keep information confidential in the form of encryption. How to avoid the problem of computer information security. Computer network security involves all aspects. To solve these problems, there are many levels of technology, such as cryptography technology, network security technology and so on. Our country has also done a lot of research on the security protection of computer network technology, and these research results have also achieved certain results in the actual construction of computer network. In order to ensure the normal operation of computer networks, ensure information security and prevent information leakage and theft, a special protection system has been established to ensure the security of computer network information by setting up computer detection, security assessment and other links. However, with the rapid development of science and technology, the updating of electronic products is faster and faster, and the challenge of Wechat for network security information is more severe. How to protect computer network information security needs to be solved urgently, this paper discusses this.
APA, Harvard, Vancouver, ISO, and other styles
2

Hewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (July 2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.

Full text
Abstract:
Organizations expect their employees to connect securely to the organization's computer systems. Often these employees use their personal computers to access the organization's networks. This research explores whether these same employees apply protective security measures to their personal computers. Perhaps these employees behave riskily based on their optimistic bias. Results indicate that while cyber optimistic bias and perceived vulnerability influence individuals to apply more protective security measures, the users still experienced security incidents. Thus, organization are vulnerable to cyber-attacks if they are allowing employees to use personal computers to access these databases.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.

Full text
Abstract:
In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. Here we assume that there exists a threshold value which determines when countermeasures should be taken to level up the security of a fraction of computers with low security level. And in some specific realistic environments the propagation network can be regarded as fully interconnected. Inspired by these facts, this paper presents a novel computer virus dynamics model considering the impact brought by security classification in full interconnection network. By using the theory of dynamic stability, the existence of equilibria and stability conditions is analysed and proved. And the above optimal threshold value is given analytically. Then, some numerical experiments are made to justify the model. Besides, some discussions and antivirus measures are given.
APA, Harvard, Vancouver, ISO, and other styles
4

Aisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (July 1, 2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.

Full text
Abstract:
Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this case. A good firewall configuration and optimized to reduce these threats. Firewall configuration there are 3 types of them are screened host firewall system (Single- homed bastion), screened host firewall system (Dual-homed bastion), and screened subnet firewall. And also configure the firewall to open the ports Port right to engage connect to the Internet, because the ports to configure a firewall that can filter packets incoming data in accordance with the policy or policies. This firewall architecture that will be used to optimize a firewall on the network.
APA, Harvard, Vancouver, ISO, and other styles
5

Moore, G. "Security for Computer Networks." Electronics and Power 31, no. 1 (1985): 85. http://dx.doi.org/10.1049/ep.1985.0059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wood, Charles Cresson. "Security for computer networks." Computers & Security 4, no. 3 (September 1985): 248–49. http://dx.doi.org/10.1016/0167-4048(85)90039-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

CERNOV, Ana-Maria. "Security in Computer Networks." International Journal of Information Security and Cybercrime 7, no. 1 (June 29, 2018): 45–52. http://dx.doi.org/10.19107/ijisc.2018.01.05.

Full text
Abstract:
Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. This paper presents the main issues regarding the network security issues and solutions to fight back the cyber-attacks.
APA, Harvard, Vancouver, ISO, and other styles
8

Akhriana, Asmah, and Andi Irmayana. "WEB APP PENDETEKSI JENIS SERANGAN JARINGAN KOMPUTER DENGAN MEMANFAATKAN SNORT DAN LOG HONEYPOT." CCIT Journal 12, no. 1 (February 6, 2019): 85–96. http://dx.doi.org/10.33050/ccit.v12i1.604.

Full text
Abstract:
Along with the current development of Information Technology is always changing to make the security of an information is very important, especially on a network connected to the internet. But what is unfortunate is that the imbalance between each development of a technology is not accompanied by developments in the security system itself, so that there are quite a lot of systems that are still weak and have to be increased by the security wall. This study aims to design a Web-based App interface to facilitate users or administrators in securing network computers from various types of attacks. The Instrusion detection system (IDS) method is used to detect suspicious activity in a system or network using snort and honeypot. Honeypot is built on a computer along with Apache, MySQL, and Snort. Honeypot will act as a target to attract attackers and log information from the attacker and snort to apply the rules made from the web. The functional system will then be tested using the black box testing method. The results of this study concluded that Web App-based interfaces that are created can be used to help users and administrators in maintaining data and information on server computers from various types of attacks on computer networks
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Full text
Abstract:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are loopholes in our network deeper understanding of network vulnerability and protection so that we have a new breakthrough for the network to provide a good environment for development.
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Qiao Ling. "On the Maintenance Management and Network Security of Local Area Network." Applied Mechanics and Materials 484-485 (January 2014): 842–46. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.842.

Full text
Abstract:
With the development of the science and technology of the computer application, the maintenance management and the security of the computers is an important problem. In this paper the author presents his own opinions on these issues. Therefore, the maintenance management of the computer local area network is very important to guarantee the security and stability of the network and to the use of the cyber sources to a maximum.
APA, Harvard, Vancouver, ISO, and other styles
11

Andrews, M., and J. A. Whittaker. "Computer security." IEEE Security & Privacy Magazine 2, no. 5 (September 2004): 68–71. http://dx.doi.org/10.1109/msp.2004.66.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Churchill, Elizabeth, Les Nelson, and Diana K. Smetters. "Useful Computer Security." IEEE Internet Computing 12, no. 3 (May 2008): 10–12. http://dx.doi.org/10.1109/mic.2008.67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Jackson, Keith. "Security mechanisms for computer networks." Computer Fraud & Security Bulletin 12, no. 1 (November 1989): 19. http://dx.doi.org/10.1016/0142-0496(89)90108-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Piper, Fred. "Security mechanisms for computer networks." Computer Communications 12, no. 3 (June 1989): 171. http://dx.doi.org/10.1016/0140-3664(89)90115-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Middleton, R. A. J. "Computer security." Computer Law & Security Review 3, no. 2 (July 1987): 23–24. http://dx.doi.org/10.1016/0267-3649(87)90040-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Saxby, S. "Computer security." Computer Law & Security Review 22, no. 4 (January 2006): 338–39. http://dx.doi.org/10.1016/j.clsr.2005.12.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Shang, Yilun. "Optimal Control Strategies for Virus Spreading in Inhomogeneous Epidemic Dynamics." Canadian Mathematical Bulletin 56, no. 3 (September 1, 2013): 621–29. http://dx.doi.org/10.4153/cmb-2012-007-2.

Full text
Abstract:
Abstract.In this paper, we study the spread of virus/worm in computer networks with a view to addressing cyber security problems. Epidemic models have been applied extensively to model the propagation of computer viruses, which characterize the fact that infected machines may spread malware to other hosts connected to the network. In our framework, the dynamics of hosts evolves according to a modified inhomogeneous Susceptible-Infectious-Susceptible (SIS) epidemic model with time-varying transmission rate and recovery rate. The infection of computers is subject to direct attack as well as propagation among hosts. Based on optimal control theory, optimal attack strategies are provided by minimizing the cost (equivalently maximizing the profit) of the attacker. We present a threshold function of the fraction of infectious hosts, which captures the dynamically evolving strategies of the attacker and reflects the persistence of virus spreading. Moreover, our results indicate that if the infectivity of a computer worm is low and the computers are installed with antivirus software with high reliability, the intensity of attacks incurred will likely be low. This agrees with our intuition.
APA, Harvard, Vancouver, ISO, and other styles
18

Landwehr, Carl E. "Computer security." International Journal of Information Security 1, no. 1 (August 2001): 3–13. http://dx.doi.org/10.1007/s102070100003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Hoendarto, Genrawan, and Vicni Iskandar. "RANCANG BANGUN APLIKASI PENGENALAN WAJAH UNTUK PASSWORD FILE DENGAN METODE JARINGAN SYARAF TIRUAN." Jurnal Ilmiah Matrik 21, no. 1 (July 29, 2019): 11–21. http://dx.doi.org/10.33557/jurnalmatrik.v21i1.521.

Full text
Abstract:
Data security for computer users is increasingly becoming a concern because it is increasingly vulnerable to illegal access even though the file has been protected with a password. This is possible with the increasing number of applications aimed at hacking owner protection. Artificial neural network that was appointed in this study is one part of computer vision, which in this study is intended to make computers able to "see" through a webcam and recognize that face has access rights to the selected file. So that computers can distinguish facial images, it needs to be trained by applying the back propagation method. The reason for choosing facial recognition is because each person has a different face, so that it can be a more effective security key than conventional methods of making or accessing files that are on a computer.
APA, Harvard, Vancouver, ISO, and other styles
20

Suharyanto, Cosmas Eko, and Viriyadharma Gopama. "PEMANFAATAN MINI KOMPUTER RASPBERRY SEBAGAI NETWORK MONITORING TOOL PORTABLE." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 5, no. 1 (August 15, 2019): 133–38. http://dx.doi.org/10.33480/jitk.v5i1.707.

Full text
Abstract:
This study aims to design a portable monitoring system using the Raspberry mini computer. As a case study, we conducted this research at Credit Union Tunas Harapan, which is based in Batam, Indonesia. We implemented the system with additional tools to monitor networks, namely Wireshark and Nagios. On the local network, we managed to monitor broadcasting from the switch. We have also analyzed several issues on network security. The use of architectural Raspberry mini computers is a very flexible tool.
APA, Harvard, Vancouver, ISO, and other styles
21

Goni, Osman. "Design, Deployment and Implementation of Local Area Network (LAN) at BAEC Head Quarter." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 15–23. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.003.

Full text
Abstract:
A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, involving the connection of computers, media and networking devices. When we talk about networks, we need to keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy Commission) Head Quarter and implement security measures to protect network resources and system services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.
APA, Harvard, Vancouver, ISO, and other styles
22

Piper, Fred. "Computer and communications security." Computer Communications 13, no. 1 (January 1990): 54. http://dx.doi.org/10.1016/0140-3664(90)90038-i.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Shikhaliyev, Ramiz. "SECURITY TRENDS IN MODERN COMPUTER NETWORKS." Problems of Information Society 06, no. 2 (July 22, 2015): 71–74. http://dx.doi.org/10.25045/jpis.v06.i2.09.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Tutanescu, I., E. Sofron, and M. Ali. "Security of internet-connected computer networks." International Journal of Internet Technology and Secured Transactions 2, no. 1/2 (2010): 109. http://dx.doi.org/10.1504/ijitst.2010.031474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Pierson, Lyndon G., and Edward L. Witzke. "A Security Methodology for Computer Networks." AT&T Technical Journal 67, no. 3 (May 6, 1988): 28–36. http://dx.doi.org/10.1002/j.1538-7305.1988.tb00628.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Jittawiriyanukoon, Chanintorn. "Evaluation of computer network security using attack undirected geography." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 3 (December 1, 2019): 1508. http://dx.doi.org/10.11591/ijeecs.v16.i3.pp1508-1514.

Full text
Abstract:
<span>To secure a wealth of data traversing the computer network at your fingertips is compulsory. But when attack arises at various parts of the network it is difficult to protect, especially when each incident is investigated separately. Geography is a necessary construct in computer networks. The analytics of geography algorithms and metrics to curate insight from a security problem are a critical method of analysis for computer systems. A geography based representation is employed to highlight aspects (on a local and global level) of a security problem which are Eigenvalue, eccentricity, clustering coefficient and cliques. Network security model based on attack undirected geography (AUG) is familiarized. First, analysis based upon association rules is presented then the attack threshold value is set from AUG. The probability of an individual attack edge and associated network nodes are computed in order to quantify the security threat. The simulation is exploited to validate that results are effective.</span>
APA, Harvard, Vancouver, ISO, and other styles
27

Cortesi, Agostino, and Riccardo Focardi. "Computer languages and security." Computer Languages, Systems & Structures 28, no. 1 (April 2002): 1–2. http://dx.doi.org/10.1016/s0096-0551(02)00005-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Klevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.

Full text
Abstract:
The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs). The authors specified the main areas of assessing the computer security of NPP I&C systems, especially the assessment of cyber threats, vulnerabilities of I&C computer security, sufficiency of applied measures for ensuring I&C systems computer security, risks of I&C system computer security as well as periodic reassessment of I&C computer security. The paper considers the assessment of I&C computer security vulnerabilities, sufficiency of applied measures for ensuring I&C computer security (assessment of cyber threats and the risks of I&C computer security are discussed in detail in other publications from the series “Computer Security of NPP Instrumentation and Control Systems”). Approaches to assessing the computer security vulnerabilities of I&C systems and software at each stage of I&C life cycle are considered. The recommendations for assessing vulnerabilities regarding technical and software protection against unauthorized access or connection to I&C, protection of local networks, implementation of organizational measures and procedures for computer security are provided. The paper describes the scope and procedures for the initial assessment and periodic reassessment of NPP I&C computer security. Recommendations for the formation of an appropriate evaluation team are provided. Methods of assessing I&C computer security are considered, namely: analysis of documents (computer security policy, program, plan, reports, etc.), survey of staff (administrative, operational, service and computer security experts), direct review of I&C systems, their components and local networks. The evaluation stages (collection of information, detailed analysis, reporting) and the scope of work at each stage are described. General information about the possibility and necessity of assessing the computer security risks of I&C systems in the case of using risk-informed approaches is provided. The need to document the results of the assessment is noted separately and specific proposals about the procedure for developing relevant reports are made.
APA, Harvard, Vancouver, ISO, and other styles
29

VASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (June 29, 2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.

Full text
Abstract:
Today, most businesses are based on a computer system, more or less developed. For daily activities the organization needs to be able to connect to the Internet, possibly from a local area network (LAN). But, once with the benefits of the Internet, there are also security risks that the organization must minimize by measures and appropriate controls. Among security issues arising from using the Internet include hacker attacks, computers infection with viruses, malware and spyware. In theory, hackers can enter inside the organization network and steal confidential data, damaging computers or the entire organization's local area network. In this sense, firewall implementation is a security measure needed to any organization. This paper presents firewall types and technologies, attacks on firewalls and some security measures on the internal network.
APA, Harvard, Vancouver, ISO, and other styles
30

Konyeha, Susan, and Emmanuel A. Onibere. "Computer Immunity Using an Intrusion Detection System (IDS)." Advanced Materials Research 824 (September 2013): 200–205. http://dx.doi.org/10.4028/www.scientific.net/amr.824.200.

Full text
Abstract:
Computers are involved in every aspect of modern society and have become an essential part of our lives, but their vulnerability is of increasing concern to us. Security flaws are inherent in the operation of computers Most flaws are caused by errors in the process of software engineering or unforeseen mishaps and it is difficult to solve these problems by conventional methods. A radical way of constantly monitoring the system for newly disclosed vulnerabilities is required. In order to devise such a system, this work draws an analogy between computer immune systems and the human immune system. The computer immune system is the equivalent of the human immune system. The primary objective of this paper is to use an intrusion detection system in the design and implementation of a computer immune system that would be built on the framework of the human immune system. This objective is successfully realized and in addition a prevention mechanism using the windows IP Firewall feature has been incorporated. Hence the system is able to perform intrusion detection and prevention. Data was collected about events occurring in a computer network that violate predefined security policy, such as attempts to affect the confidentiality, integrity or its availability using Snort rules for known attacks and adaptive detection for the unknown attacks. The system was tested using real-time data and Intrusion Detection evaluation (IDEVAL) Department of Defense Advanced Research Projects Agency (DARPA) data set. The results were quite encouraging as few false positive were recorded.
APA, Harvard, Vancouver, ISO, and other styles
31

Wong, Ken. "Effective Computer Security Management." EDPACS 14, no. 1 (July 1986): 7–10. http://dx.doi.org/10.1080/07366988609452212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Hash, Cindy. "The Computer Security Officer." EDPACS 19, no. 3 (September 1991): 1–5. http://dx.doi.org/10.1080/07366989109451266.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

White, Gregory B., Eric A. Fisch, and Udo W. Pooch. "Computer System and Network Security." EDPACS 25, no. 8 (February 1998): 12–13. http://dx.doi.org/10.1201/1079/43236.25.8.19980201/30188.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Middleton, R. "Computer security: the evidence." Computer Bulletin 37, no. 6 (December 1, 1995): 2–4. http://dx.doi.org/10.1093/combul/37.6.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Van Duyn, Julia. "Security in computer installations." Data Processing 27, no. 6 (July 1985): 19–22. http://dx.doi.org/10.1016/0011-684x(85)90264-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Alese, Boniface Kayode, Iwasokun Gabriel Babatunde, and Haruna Danjuma Israel. "DSGM-Based Analysis of Computer Networks Security." International Journal for Information Security Research 3, no. 4 (December 1, 2013): 374–82. http://dx.doi.org/10.20533/ijisr.2042.4639.2013.0043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Igor, Halenar, Juhasova Bohuslava, Juhas Martin, and Nesticky Martin. "Application of Neural Networks in Computer Security." Procedia Engineering 69 (2014): 1209–15. http://dx.doi.org/10.1016/j.proeng.2014.03.111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Sun, Hung-Min. "Security of broadcasting cryptosystem in computer networks." Electronics Letters 35, no. 24 (1999): 2108. http://dx.doi.org/10.1049/el:19991431.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Prabhu, Mukesh M., and S. V. Raghavan. "Security in computer networks and distributed systems." Computer Communications 19, no. 5 (May 1996): 379–88. http://dx.doi.org/10.1016/0140-3664(95)01031-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Atmadja, Martono Dwi. "Single Board Computer Applications as Multi-Server VoIP." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 15, 2021): 1023–28. http://dx.doi.org/10.22214/ijraset.2021.36512.

Full text
Abstract:
Telecommunication technology is developing along with information technology and several innovations in several audio and data transmission and reception techniques. Innovation and communication technology are hoped to be able to create efficiencies in regards to time, equipment, and cost. The Public Switched Telephone Network (PSTN) telephone technology has experienced integration towards communication using Internet Protocol (IP) networks, better known as Voice over Internet Protocol (VoIP). VoIP Technology transmits conversations digitally through IP-based networks, such as internet networks, Wide Area Networks (WAN), and Local Area Networks (LAN). However, the VoIP cannot fully replace PSTN due to several weaknesses, such as delay, jitter, packet loss, as well as security and echo. Telephones calls using VoIP technology are executed using terminals in the form of computer devices or existing analogue telephones. The benefit of VoIP is that it can be set in all ethernet and IP addresses. Prefixes can be applied for inter-server placements as inter-building telephone networks without the addition of inefficient new cables on single board computers with Elastix installed. Prefix and non-prefix analysis on servers from single board computers can be tested using QoS for bandwidth, jitter, and packet loss codec. The installation of 6 clients, or 3 simultaneous calls resulted in a packet loss value in the prefix Speex codex of 2.34%. The bandwidth in the prefix PCMU codec has an average value of 82.3Kbps, and a non-prefix value of 79.3Kbps, in accordance to the codec standards in the VoIP. The lowest jitter was found in the non-prefix PCMU codec with an average of 51.05ms, with the highest jitter for the prefix Speex codec being 314.65ms.
APA, Harvard, Vancouver, ISO, and other styles
41

Smith, Martin R. "Computer versus security staff?" Computer Law & Security Review 5, no. 3 (September 1989): 14–16. http://dx.doi.org/10.1016/0267-3649(89)90032-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

BloomBecker, J. J. Buck. "US computer security legislation H.R. 145: A step toward greater computer security?" Computer Law & Security Review 3, no. 5 (January 1988): 30–31. http://dx.doi.org/10.1016/0267-3649(88)90115-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Novokhrestov, Aleksey, Anton Konev, and Alexander Shelupanov. "Model of Threats to Computer Network Software." Symmetry 11, no. 12 (December 11, 2019): 1506. http://dx.doi.org/10.3390/sym11121506.

Full text
Abstract:
This article highlights the issue of identifying information security threats to computer networks. The aim of the study is to increase the number of identified threats. Firstly, it was carried out the analysis of computer network models used to identify threats, as well as in approaches to building computer network threat models. The shortcomings that need to be corrected are highlighted. On the basis of the mathematical apparatus of attributive metagraphs, a computer network model is developed that allows to describe the software components of computer networks and all possible connections between them. On the basis of elementary operations on metagraphs, a model of threats to the security of computer network software is developed, which allows compiling lists of threats to the integrity and confidentiality of computer network software. These lists include more threats in comparison with the considered analogues.
APA, Harvard, Vancouver, ISO, and other styles
44

Branstad, D. "Guest editorial - Computer security." IEEE Communications Magazine 23, no. 7 (July 1985): 10–11. http://dx.doi.org/10.1109/mcom.1985.1092611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Guo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.

Full text
Abstract:
with the rapid development and wide application of wireless networking technology, Information security issues are increasingly prominent manifested by more and more attention. The article describes the schema of the data monitoring platform separate from the data layer, network layer and presentation layer three levels,focuses on platform of intelligent back-end database structure, and proposed specific measures to ensure platform security,to ensure the information security of computer networks, so as to give full play role of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
46

Wasik, Martin. "CBI Conference on combating computer crime - increasing computer security." Computer Law & Security Review 4, no. 5 (January 1989): 4. http://dx.doi.org/10.1016/0267-3649(89)90132-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Rahneva, Darina, Vanya Stoykova, Angelina Cherneva, and Krum Videnov. "VIRTUAL LABORATORY for NETWORK AND COMPUTER SECURITY." International Conference on Technics, Technologies and Education, no. 1 (2018): 315–22. http://dx.doi.org/10.15547/ictte.2018.08.003.

Full text
Abstract:
We live in the digital era and our daily lives are constantly connected with information and communication technologies. But this new world of digital information has inevitably raised the issue of data security, stored on electronic media or transmitted over the Networks. An important part in the field of computer and network security is cryptography and its study is an indispensable element in the preparation of all future specialists in the field of computer and communication technologies. The purpose of this report is to present a new way to conduct practical training in the field of Network and Computer Security using a Virtual Lab in which the basic cryptographic algorithms are presented using programming modules developed in language familiar to the students.
APA, Harvard, Vancouver, ISO, and other styles
48

Gercek, Gokhan, Naveed Saleem, and Douglas Steel. "Implementing Cloud Based Virtual Computer Network Labs for Online Education: Experiences from a Phased Approach." International Journal of Online Engineering (iJOE) 12, no. 03 (March 31, 2016): 70. http://dx.doi.org/10.3991/ijoe.v12i03.5564.

Full text
Abstract:
On-line instruction rather easily accommodates courses in some fields such as history, sociology, business administration and political sciences. However, it poses significant challenges for courses in technical fields that require hands-on experimentation. Courses in computer networking area constitute such an example. Given the demand for on-line courses and the trend for migration to online mode, there is a need to devise strategies that would allow students to conduct computing experiments remotely. Virtualization is a rapidly evolving technology that provides opportunities for online computer education. Through virtualization tools, it is possible to convert brick-and-mortar labs into virtual network labs. Using online virtual network lab tools, students may build, troubleshoot and test networks using their personal computers and, thereby, eliminate the commute to the labs. Cloud technology, another rapidly growing field, can help an organization achieve significant savings in IT services and infrastructure costs, as well as enhance IT support for organizational operations. Confluence of cloud and virtualization technologies present new opportunities for online education. However, there are significant issues to surmount in order to apply these technologies to computing-related courses and in particular to online computer networking courses. This paper presents experiences gained from transforming a traditional computer lab into an online virtual domain at the authors' university. The network lab described in this paper is utilized mostly for graduate computer networking, network security and wireless networking courses. The phased approach depicted in this paper should help academic institutions gain insights into technical and operational challenges in building and operating an online virtual lab.
APA, Harvard, Vancouver, ISO, and other styles
49

Bella, Giampaolo, and Ronaldo Menezes. "Special Issue: Computer Security." Concurrency and Computation: Practice and Experience 16, no. 11 (August 6, 2004): 1061. http://dx.doi.org/10.1002/cpe.803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Tosun, Nilgün. "Social Networks as a Learning and Teaching Environment and Security in Social Networks." Journal of Education and Training Studies 6, no. 11a (November 29, 2018): 194. http://dx.doi.org/10.11114/jets.v6i11a.3817.

Full text
Abstract:
Technology is in a constantly evolving and changing structure since the existence of mankind. Because of this dynamic structure, technology fulfills a number of functions such as facilitating people's lives, time, profit from work, profit from cost, making life more enjoyable. At the same time, technology is used in all areas of life, and it also causes changes and transformations in these areas. Education is one of these areas, perhaps the most important, that technology affects. The hunter society, written with nails, made an important step with the paper's invention, and the written documents were moved from the stones to the books. The invention of computers and the internet has also opened an important milestone in human history and education. In the beginning, the course contents loaded on storage units such as floppy disks, CDs, DVDs were used by the students and teachers, computers were included in the education systems. During periods when we have not yet met with the internet, computer-assisted education has found a large place in many educational institutions and in the curriculum of education level. The development of information Technologies led to widespread use of the internet over time, and shortly thereafter examples of use in education began to increase. Computer-assisted education has also led to the rapid transition of education through internet-supported education, along with the different demands of the network society's individuals. Users are not satisfied with the internet environments where only reading authority is available, and more and more active and interacting requests have come to the agenda. Beyond reading, social networks that make it possible to comment, create content, upload/share/view images, upload video/audio files, and make video, text and voice calls have become popular for users. Social networking platforms where users interact with the environment or with other users in the environment have been attracted by the diversity of user profiles, the usage rates and durations, and the easy and versatility of accessibility. Because of these features, studies on the use of social networks in the field of education to support learning and teaching have also been accelerated and diversified. Social networks can also contain some security issues because they are huge platforms where billions of users are together. Having information about security issues as little as possible, what to do when they are encountered is important for the continuity of learning and teaching. The aim of this study is to demonstrate the importance of social networks, education, learning and teaching influences, possible security threats to be encountered in social networks, and measures to be taken. It is hoped that working in this context will shed light on the work of learners, teachers and decision makers on the subject.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography