Journal articles on the topic 'Computer networks Computers Computer security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Computer networks Computers Computer security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ming, Xiaobo, Ying Chen, and Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy." MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.
Full textHewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (July 2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.
Full textZhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.
Full textAisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (July 1, 2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.
Full textMoore, G. "Security for Computer Networks." Electronics and Power 31, no. 1 (1985): 85. http://dx.doi.org/10.1049/ep.1985.0059.
Full textWood, Charles Cresson. "Security for computer networks." Computers & Security 4, no. 3 (September 1985): 248–49. http://dx.doi.org/10.1016/0167-4048(85)90039-2.
Full textCERNOV, Ana-Maria. "Security in Computer Networks." International Journal of Information Security and Cybercrime 7, no. 1 (June 29, 2018): 45–52. http://dx.doi.org/10.19107/ijisc.2018.01.05.
Full textAkhriana, Asmah, and Andi Irmayana. "WEB APP PENDETEKSI JENIS SERANGAN JARINGAN KOMPUTER DENGAN MEMANFAATKAN SNORT DAN LOG HONEYPOT." CCIT Journal 12, no. 1 (February 6, 2019): 85–96. http://dx.doi.org/10.33050/ccit.v12i1.604.
Full textZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Full textWang, Qiao Ling. "On the Maintenance Management and Network Security of Local Area Network." Applied Mechanics and Materials 484-485 (January 2014): 842–46. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.842.
Full textAndrews, M., and J. A. Whittaker. "Computer security." IEEE Security & Privacy Magazine 2, no. 5 (September 2004): 68–71. http://dx.doi.org/10.1109/msp.2004.66.
Full textChurchill, Elizabeth, Les Nelson, and Diana K. Smetters. "Useful Computer Security." IEEE Internet Computing 12, no. 3 (May 2008): 10–12. http://dx.doi.org/10.1109/mic.2008.67.
Full textJackson, Keith. "Security mechanisms for computer networks." Computer Fraud & Security Bulletin 12, no. 1 (November 1989): 19. http://dx.doi.org/10.1016/0142-0496(89)90108-2.
Full textPiper, Fred. "Security mechanisms for computer networks." Computer Communications 12, no. 3 (June 1989): 171. http://dx.doi.org/10.1016/0140-3664(89)90115-1.
Full textMiddleton, R. A. J. "Computer security." Computer Law & Security Review 3, no. 2 (July 1987): 23–24. http://dx.doi.org/10.1016/0267-3649(87)90040-9.
Full textSaxby, S. "Computer security." Computer Law & Security Review 22, no. 4 (January 2006): 338–39. http://dx.doi.org/10.1016/j.clsr.2005.12.007.
Full textShang, Yilun. "Optimal Control Strategies for Virus Spreading in Inhomogeneous Epidemic Dynamics." Canadian Mathematical Bulletin 56, no. 3 (September 1, 2013): 621–29. http://dx.doi.org/10.4153/cmb-2012-007-2.
Full textLandwehr, Carl E. "Computer security." International Journal of Information Security 1, no. 1 (August 2001): 3–13. http://dx.doi.org/10.1007/s102070100003.
Full textHoendarto, Genrawan, and Vicni Iskandar. "RANCANG BANGUN APLIKASI PENGENALAN WAJAH UNTUK PASSWORD FILE DENGAN METODE JARINGAN SYARAF TIRUAN." Jurnal Ilmiah Matrik 21, no. 1 (July 29, 2019): 11–21. http://dx.doi.org/10.33557/jurnalmatrik.v21i1.521.
Full textSuharyanto, Cosmas Eko, and Viriyadharma Gopama. "PEMANFAATAN MINI KOMPUTER RASPBERRY SEBAGAI NETWORK MONITORING TOOL PORTABLE." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 5, no. 1 (August 15, 2019): 133–38. http://dx.doi.org/10.33480/jitk.v5i1.707.
Full textGoni, Osman. "Design, Deployment and Implementation of Local Area Network (LAN) at BAEC Head Quarter." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 15–23. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.003.
Full textPiper, Fred. "Computer and communications security." Computer Communications 13, no. 1 (January 1990): 54. http://dx.doi.org/10.1016/0140-3664(90)90038-i.
Full textShikhaliyev, Ramiz. "SECURITY TRENDS IN MODERN COMPUTER NETWORKS." Problems of Information Society 06, no. 2 (July 22, 2015): 71–74. http://dx.doi.org/10.25045/jpis.v06.i2.09.
Full textTutanescu, I., E. Sofron, and M. Ali. "Security of internet-connected computer networks." International Journal of Internet Technology and Secured Transactions 2, no. 1/2 (2010): 109. http://dx.doi.org/10.1504/ijitst.2010.031474.
Full textPierson, Lyndon G., and Edward L. Witzke. "A Security Methodology for Computer Networks." AT&T Technical Journal 67, no. 3 (May 6, 1988): 28–36. http://dx.doi.org/10.1002/j.1538-7305.1988.tb00628.x.
Full textJittawiriyanukoon, Chanintorn. "Evaluation of computer network security using attack undirected geography." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 3 (December 1, 2019): 1508. http://dx.doi.org/10.11591/ijeecs.v16.i3.pp1508-1514.
Full textCortesi, Agostino, and Riccardo Focardi. "Computer languages and security." Computer Languages, Systems & Structures 28, no. 1 (April 2002): 1–2. http://dx.doi.org/10.1016/s0096-0551(02)00005-x.
Full textKlevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.
Full textVASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (June 29, 2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.
Full textKonyeha, Susan, and Emmanuel A. Onibere. "Computer Immunity Using an Intrusion Detection System (IDS)." Advanced Materials Research 824 (September 2013): 200–205. http://dx.doi.org/10.4028/www.scientific.net/amr.824.200.
Full textWong, Ken. "Effective Computer Security Management." EDPACS 14, no. 1 (July 1986): 7–10. http://dx.doi.org/10.1080/07366988609452212.
Full textHash, Cindy. "The Computer Security Officer." EDPACS 19, no. 3 (September 1991): 1–5. http://dx.doi.org/10.1080/07366989109451266.
Full textWhite, Gregory B., Eric A. Fisch, and Udo W. Pooch. "Computer System and Network Security." EDPACS 25, no. 8 (February 1998): 12–13. http://dx.doi.org/10.1201/1079/43236.25.8.19980201/30188.4.
Full textMiddleton, R. "Computer security: the evidence." Computer Bulletin 37, no. 6 (December 1, 1995): 2–4. http://dx.doi.org/10.1093/combul/37.6.2.
Full textVan Duyn, Julia. "Security in computer installations." Data Processing 27, no. 6 (July 1985): 19–22. http://dx.doi.org/10.1016/0011-684x(85)90264-3.
Full textAlese, Boniface Kayode, Iwasokun Gabriel Babatunde, and Haruna Danjuma Israel. "DSGM-Based Analysis of Computer Networks Security." International Journal for Information Security Research 3, no. 4 (December 1, 2013): 374–82. http://dx.doi.org/10.20533/ijisr.2042.4639.2013.0043.
Full textIgor, Halenar, Juhasova Bohuslava, Juhas Martin, and Nesticky Martin. "Application of Neural Networks in Computer Security." Procedia Engineering 69 (2014): 1209–15. http://dx.doi.org/10.1016/j.proeng.2014.03.111.
Full textSun, Hung-Min. "Security of broadcasting cryptosystem in computer networks." Electronics Letters 35, no. 24 (1999): 2108. http://dx.doi.org/10.1049/el:19991431.
Full textPrabhu, Mukesh M., and S. V. Raghavan. "Security in computer networks and distributed systems." Computer Communications 19, no. 5 (May 1996): 379–88. http://dx.doi.org/10.1016/0140-3664(95)01031-9.
Full textAtmadja, Martono Dwi. "Single Board Computer Applications as Multi-Server VoIP." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 15, 2021): 1023–28. http://dx.doi.org/10.22214/ijraset.2021.36512.
Full textSmith, Martin R. "Computer versus security staff?" Computer Law & Security Review 5, no. 3 (September 1989): 14–16. http://dx.doi.org/10.1016/0267-3649(89)90032-0.
Full textBloomBecker, J. J. Buck. "US computer security legislation H.R. 145: A step toward greater computer security?" Computer Law & Security Review 3, no. 5 (January 1988): 30–31. http://dx.doi.org/10.1016/0267-3649(88)90115-x.
Full textNovokhrestov, Aleksey, Anton Konev, and Alexander Shelupanov. "Model of Threats to Computer Network Software." Symmetry 11, no. 12 (December 11, 2019): 1506. http://dx.doi.org/10.3390/sym11121506.
Full textBranstad, D. "Guest editorial - Computer security." IEEE Communications Magazine 23, no. 7 (July 1985): 10–11. http://dx.doi.org/10.1109/mcom.1985.1092611.
Full textGuo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.
Full textWasik, Martin. "CBI Conference on combating computer crime - increasing computer security." Computer Law & Security Review 4, no. 5 (January 1989): 4. http://dx.doi.org/10.1016/0267-3649(89)90132-5.
Full textRahneva, Darina, Vanya Stoykova, Angelina Cherneva, and Krum Videnov. "VIRTUAL LABORATORY for NETWORK AND COMPUTER SECURITY." International Conference on Technics, Technologies and Education, no. 1 (2018): 315–22. http://dx.doi.org/10.15547/ictte.2018.08.003.
Full textGercek, Gokhan, Naveed Saleem, and Douglas Steel. "Implementing Cloud Based Virtual Computer Network Labs for Online Education: Experiences from a Phased Approach." International Journal of Online Engineering (iJOE) 12, no. 03 (March 31, 2016): 70. http://dx.doi.org/10.3991/ijoe.v12i03.5564.
Full textBella, Giampaolo, and Ronaldo Menezes. "Special Issue: Computer Security." Concurrency and Computation: Practice and Experience 16, no. 11 (August 6, 2004): 1061. http://dx.doi.org/10.1002/cpe.803.
Full textTosun, Nilgün. "Social Networks as a Learning and Teaching Environment and Security in Social Networks." Journal of Education and Training Studies 6, no. 11a (November 29, 2018): 194. http://dx.doi.org/10.11114/jets.v6i11a.3817.
Full text