Academic literature on the topic 'Internet (computer network)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Internet (computer network).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Internet (computer network)"
Vishvakarma, Tanmya. "A Review of Modern Computer Networks." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 368–76. http://dx.doi.org/10.22214/ijraset.2022.46637.
Full textAyu tiara sunja, Sunja, and Meilyana Winda Perdana. "Development of local area network (LAN) at SMK 1 belitang madang raya." International Journal Cister 1, no. 02 (August 1, 2022): 63–66. http://dx.doi.org/10.56481/cister.v1i02.150.
Full textSakur. "Manajemen Jaringan Internet Menggunakan Mikrotik Router di SMA Negeri 2 Bojonegoro." Jurnal Pendidikan Madrasah 7, no. 2 (November 22, 2022): 117–34. http://dx.doi.org/10.14421/jpm.2022.72.03.
Full textNemkova, N. V. "What is the Internet?" Kazan medical journal 78, no. 3 (June 15, 1997): 227–29. http://dx.doi.org/10.17816/kazmj81522.
Full textAisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (July 1, 2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.
Full textM.J, Dr Kurian, and Dr Sreekanth D. "Thwart and Safeguard of Cyber Crime & Cyber Attack in Computer Networks." International Journal of Innovative Technology and Exploring Engineering 12, no. 3 (February 28, 2023): 25–32. http://dx.doi.org/10.35940/ijitee.c9452.0212323.
Full textDasmen, Rahmat Novrianda, Abdur Rohman Syarif, Heru Saputra, and Rahmat Amrullah. "Perancangan Keamanan Internet Jaringan Hotspot Mikrotik pada Winbox dan Wireshark." DoubleClick: Journal of Computer and Information Technology 5, no. 2 (February 27, 2022): 71. http://dx.doi.org/10.25273/doubleclick.v5i2.11751.
Full textAndhika, Maulana Hafidz, Arip Solehudin, Didi Juardi, and Garno. "MANAJEMEN BANDWIDTH MENGGUNAKAN METODE HIERARCHICAL TOKEN BUCKET (HTB) DENGAN PENAMBAHAN BUCKET SIZE USAHA AJ COMP." Elkom : Jurnal Elektronika dan Komputer 15, no. 1 (June 30, 2022): 9–15. http://dx.doi.org/10.51903/elkom.v15i1.626.
Full textSaddam RA, Angga Pranata, Sugiono, Rizki Zulanggara, Nur Halimah, Sri Nur H, Rosdiana SM, Nurhalim, and Aprina Handayani. "Sniffing and Spoofing in Computer Security." International Journal of Integrative Sciences 2, no. 6 (June 30, 2023): 881–86. http://dx.doi.org/10.55927/ijis.v2i6.4528.
Full textZulfa, Ira, Hendri Syahputra, M. Abdul Rahim, and Fajrillah. "Sistem Jaringan Small Office Home Office (Soho) Menggunakan Mikrotik." Bulletin of Information Technology (BIT) 4, no. 2 (June 27, 2023): 218–25. http://dx.doi.org/10.47065/bit.v4i2.676.
Full textDissertations / Theses on the topic "Internet (computer network)"
Post, David L. "Network Management: Assessing Internet Network-Element Fault Status Using Neural Networks." Ohio : Ohio University, 2008. http://www.ohiolink.edu/etd/view.cgi?ohiou1220632155.
Full textWells, Daniel David. "Network management for community networks." Thesis, Rhodes University, 2010. http://hdl.handle.net/10962/d1006587.
Full textPezaros, D. "Network traffic measurement for the next generation Internet." Thesis, Lancaster University, 2005. http://eprints.lancs.ac.uk/12698/.
Full textYang, Yang. "Network congestion control." Access restricted to users with UT Austin EID, 2001. http://wwwlib.umi.com/cr/utexas/fullcit?p3037028.
Full textRichter, John Peter Frank. "An investigation into the design and implementation of an internet-scale network simulator." Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1004840.
Full textSpring, Neil Timothy. "Efficient discovery of network topology and routing policy in the Internet /." Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/6985.
Full textZhang, Zaichen, and 張在琛. "Network-supported internet multicast congestion and error control." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31243915.
Full textSung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.
Full textXu, Jun, Committee Chair ; Ahamad, Mustaque, Committee Member ; Ammar, Mostafa, Committee Member ; Bing, Benny, Committee Member ; Zegura, Ellen, Committee Member.
Wen, Zhihua. "SIMPLIFYING END POINT NETWORK MEASUREMENT ON INTERNET." Case Western Reserve University School of Graduate Studies / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1244041965.
Full textGummadi, Krishna Phani. "Measurement-driven modeling and design of internet-scale systems /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/6964.
Full textBooks on the topic "Internet (computer network)"
Halabi, Bassam. Internet routing architectures. Indianapolis, IN: Cisco Press, 1997.
Find full textHare, Chris. Internet firewallsand network security. 2nd ed. Indianapolis, Ind: New Riders Publishing, 1996.
Find full textDanny, McPherson, and Cisco Systems Inc, eds. Internet routing architectures. 2nd ed. Indianapolis, Ind: Cisco, 2000.
Find full textMiller, Mark A. Internet Technologies Handbook. New York: John Wiley & Sons, Ltd., 2005.
Find full text"Internet yong hu ci dian" bian yi zu., ed. Internet yung hu ci dian =: Internet user's dictionary. Guangzhou: Ji nan da xue chu ban she, 1997.
Find full textMaloff, Joel. Mecklermedia's official Internet World net.profit: Expanding your business using the Internet. London: Internet World, 1995.
Find full textHare, Chris. Internet firewalls and network security. 2nd ed. Indianapolis, Ind: New Riders Pub., 1996.
Find full textHansgeorg, Schmidt-Bergmann, Liesegang Torsten, and Museum für Literatur am Oberrhein., eds. Liter@tur: Computer-Literatur-Internet. Bielefeld: Aisthesis, 2001.
Find full textWilliam, Stallings. Mecklermedia's official Internet World internet security handbook. London: Internet World, 1996.
Find full textWilliam, Stallings. Mecklermedia's official Internet world Internet security handbook. Foster City, CA: IDG Books, 1995.
Find full textBook chapters on the topic "Internet (computer network)"
Howser, Gerry. "The Network Layer." In Computer Networks and the Internet, 55–87. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_5.
Full textHowser, Gerry. "The Laboratory Network." In Computer Networks and the Internet, 151–68. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_9.
Full textWei, Zhao, Yanli Lv, Chunhe Xia, Yang Luo, and Qing Wei. "A Computer Network Defense Policy Refinement Method." In Frontiers in Internet Technologies, 122–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-53959-6_12.
Full textAhmad, Muhammad Aminu, and Steve Woodhead. "Containment of Fast Scanning Computer Network Worms." In Internet and Distributed Computing Systems, 235–47. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23237-9_21.
Full textHowser, Gerry. "Shortest Path Through the Network." In Computer Networks and the Internet, 205–15. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34496-2_13.
Full textGoertzel, Ben. "The Network is the Computer is the Mind (is the World)." In Creating Internet Intelligence, 97–113. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-0561-7_6.
Full textCao, Huan, Lili Wu, Yue Chen, Yongtao Su, Zhengchao Lei, and Chunping Zhao. "Analysis on the Security of Satellite Internet." In Communications in Computer and Information Science, 193–205. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_14.
Full textKizza, Joseph Migga. "Internet of Things (IoT): Growth, Challenges, and Security." In Guide to Computer Network Security, 517–31. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_24.
Full textWarren, Christopher, Eman El-Sheikh, and Nhien-An Le-Khac. "Privacy Preserving Internet Browsers: Forensic Analysis of Browzar." In Computer and Network Security Essentials, 369–88. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_21.
Full textMaillé, Patrick, Peter Reichl, and Bruno Tuffin. "Internet Governance and Economics of Network Neutrality." In Lecture Notes in Computer Science, 108–16. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30382-1_15.
Full textConference papers on the topic "Internet (computer network)"
Das, Divyajyoti, and Somesh Nanda. "Securing computer networks by networking multiple OS kernels. Revisting network security: Protecting computer networks from malwares." In 2013 World Congress on Internet Security (WorldCIS). IEEE, 2013. http://dx.doi.org/10.1109/worldcis.2013.6751025.
Full textGarsva, Eimantas, Nerijus Paulauskas, Gediminas Grazulevicius, and Lech Gulbinovic. "Academic computer network traffic statistical analysis." In 2012 2nd Baltic Congress on Future Internet Communications (BCFIC). IEEE, 2012. http://dx.doi.org/10.1109/bcfic.2012.6217987.
Full textZhou, Yun-xia, Yue-long Zhao, and Xi Yang. "The Computer Network with Intelligent Disks." In 2010 International Conference on Internet Technology and Applications (iTAP). IEEE, 2010. http://dx.doi.org/10.1109/itapp.2010.5566576.
Full textZhang, Zehao, Lin Peng, He Wang, Jin Sun, Tao Chang, and Ling Zhuo. "A wearable computer wireless sensor network." In 2017 IEEE Conference on Energy Internet and Energy System Integration (EI2). IEEE, 2017. http://dx.doi.org/10.1109/ei2.2017.8245389.
Full textKotenko, Igor, and Alexander Ulanov. "Antagonistic Agents in the Internet: Computer Network Warfare Simulation." In 2006 9th International Conference on Information Fusion. IEEE, 2006. http://dx.doi.org/10.1109/icif.2006.301705.
Full textBulira, Damian, and Krzysztof Walkowiak. "Voice and video streaming in wireless computer networks - evaluation of network delays." In 2012 2nd Baltic Congress on Future Internet Communications (BCFIC). IEEE, 2012. http://dx.doi.org/10.1109/bcfic.2012.6217996.
Full textXianglong, Liu, Lou Yihua, Liang Yuan, and Shan Baosong. "Predicting Internet Network Distance Using ISOMAP." In 2010 Second International Workshop on Education Technology and Computer Science. IEEE, 2010. http://dx.doi.org/10.1109/etcs.2010.245.
Full textMatray, Peter, Peter Haga, Sandor Laki, Istvan Csabai, and Gabor Vattay. "On the network geography of the Internet." In IEEE INFOCOM 2011 - IEEE Conference on Computer Communications. IEEE, 2011. http://dx.doi.org/10.1109/infcom.2011.5934909.
Full textXiong, Sha. "The Application of “Internet+” Artificial Intelligence in Computer Network Technology." In 2023 2nd International Conference on Data Analytics, Computing and Artificial Intelligence (ICDACAI). IEEE, 2023. http://dx.doi.org/10.1109/icdacai59742.2023.00068.
Full textLiu, Qiming, and Changsong Deng. "An Computer Virus Spreading Model with Delayed Quarantine in Internet." In ICCNS '16: 6th International Conference on Communication and Network Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/3017971.3017972.
Full textReports on the topic "Internet (computer network)"
Vasilenko, L. A., and A. I. Mitin. Global computer network INTERNET (history, organization, access, prospects). Educational edition, 1996. http://dx.doi.org/10.18411/vasilenko-2-9.
Full textVEDESHKINA, NATALIA A., and VALENTINA A. MAXIMENKO. COMPUTER GAME "THE WAY TO A SECURE INTERNET". SIB-Expertise, November 2023. http://dx.doi.org/10.12731/er0743.18112023.
Full textNechaev, V., Володимир Миколайович Соловйов, and A. Nagibas. Complex economic systems structural organization modelling. Politecnico di Torino, 2006. http://dx.doi.org/10.31812/0564/1118.
Full textSokolovsky, Dmitry, Sergey Sokolov, and Alexey Rezaykin. e-learning course "Informatics". SIB-Expertise, January 2024. http://dx.doi.org/10.12731/er0785.29012024.
Full textAllende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003313.
Full textBragdon, Sophia, Vuong Truong, and Jay Clausen. Environmentally informed buried object recognition. Engineer Research and Development Center (U.S.), November 2022. http://dx.doi.org/10.21079/11681/45902.
Full textModlo, Yevhenii O., Serhiy O. Semerikov, Ruslan P. Shajda, Stanislav T. Tolmachev, and Oksana M. Markova. Methods of using mobile Internet devices in the formation of the general professional component of bachelor in electromechanics competency in modeling of technical objects. [б. в.], July 2020. http://dx.doi.org/10.31812/123456789/3878.
Full textPatel, Reena. Complex network analysis for early detection of failure mechanisms in resilient bio-structures. Engineer Research and Development Center (U.S.), June 2021. http://dx.doi.org/10.21079/11681/41042.
Full textVarina, Hanna B., Viacheslav V. Osadchyi, Kateryna P. Osadcha, Svetlana V. Shevchenko, and Svitlana H. Lytvynova. Peculiarities of cloud computing use in the process of the first-year students' adaptive potential development. [б. в.], June 2021. http://dx.doi.org/10.31812/123456789/4453.
Full textGoncharenko, Tatiana, Nataliia Yermakova-Cherchenko, and Yelyzaveta Anedchenko. Experience in the Use of Mobile Technologies as a Physics Learning Method. [б. в.], November 2020. http://dx.doi.org/10.31812/123456789/4468.
Full text