Zobrazeno 1 - 10
of 717
pro vyhledávání: '"Network infrastructure"'
Publikováno v:
Journal of Big Data, Vol 11, Iss 1, Pp 1-23 (2024)
Abstract Threats on computer networks have been increasing rapidly, and irresponsible parties are always trying to exploit vulnerabilities in the network to do various dangerous things. One way to exploit vulnerabilities in a computer network is by e
Externí odkaz:
https://doaj.org/article/c4cbe7e46a994c87a469c49ad21c2048
Publikováno v:
Array, Vol 22, Iss , Pp 100353- (2024)
Steganalysis, a field devoted to detecting concealed information in various forms of digital media, including text, images, audio, and video files, has evolved significantly over time. This evolution aims to improve the accuracy of revealing potentia
Externí odkaz:
https://doaj.org/article/5c6944bab18a48929ca00cb96586e11f
Publikováno v:
International Journal of Pervasive Computing and Communications, 2023, Vol. 20, Issue 1, pp. 147-167.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/IJPCC-08-2022-0305
Publikováno v:
Jurnal Teknologi Pendidikan, Vol 26, Iss 1 (2024)
This research aims to develop learning media for class The research method used is the R&D method using the four-D development model. The four-D development model consists of Define, Design, Development, and Disseminate. The results obtained from thi
Externí odkaz:
https://doaj.org/article/06fec59f14b34a6dadc33ee17c402850
Autor:
Muhammad Aidiel Rachman Putra, Tohari Ahmad, Dandy Pramana Hostiadi, Royyana Muslim Ijtihadie
Publikováno v:
Egyptian Informatics Journal, Vol 25, Iss , Pp 100440- (2024)
Botnet is one type of malware that infects devices to carry out illegal activities controlled by a botmaster. Many previous studies detected botnets as a single activity while botnet activities were related. This paper focused on detecting host botne
Externí odkaz:
https://doaj.org/article/68e5490cfc6949959b2d14b684a6e6d3
Publikováno v:
Jordanian Journal of Computers and Information Technology, Vol 9, Iss 2, Pp 175-186 (2023)
Drones are one of devices that are used in many different activities. There is a time when drones have accidents, and authorities need to find the cause. Drone forensics is used to determine the cause of an accident. The analysis phase of drone foren
Externí odkaz:
https://doaj.org/article/43d33f3d83bd47a892d1e17a6ea5f9d6
Autor:
Anastasia D. Shilova
Publikováno v:
Naučno-tehničeskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki, Vol 23, Iss 3, Pp 530-537 (2023)
The problem of assessing the security of a network infrastructure is considered. The aim of the work is to formalize a fast computable network security metric intended for use in optimization problems aimed at rebuilding the network according to se
Externí odkaz:
https://doaj.org/article/16ad7df779a845b2bab9e9a6092d556e
Publikováno v:
Cybersecurity, Vol 6, Iss 1, Pp 1-14 (2023)
Abstract With the advancement of communication technology, a large number of data are constantly transmitted through the internet for various purposes, which are prone to be illegally accessed by third parties. Therefore, securing such data is crucia
Externí odkaz:
https://doaj.org/article/9728fd366c7147d5879d2aaeb98f4492
Publikováno v:
Вестник СибАДИ, Vol 20, Iss 1, Pp 76-91 (2023)
Introduction. Reducing the operating costs of motor fuel for cars is possible through the use of cheaper and at the same time less environmentally harmful alternative energy sources. The main problem with the use of these energy sources, especially f
Externí odkaz:
https://doaj.org/article/fca3c9d54e324b28a9270445018f54a3
Publikováno v:
IEEE Access, Vol 11, Pp 131001-131016 (2023)
Progress in Deep Learning (DL) has introduced alternative methods for tackling complex challenges, such as the steganalysis of spatial domain images, where Convolutional Neural Networks (CNNs) are employed. In recent years, various CNN architectures
Externí odkaz:
https://doaj.org/article/1f561bae68ff44668ace6e2af8f47fa1