ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Computing
Geology
Computing
Technology
Pure sciences
Research
Mining Engineering
Biology
Environment
Industrial engineer
all records (61)

Languages
English
Spanish
Portuguese

Countries
Indonesia
USA
Chile
Brazil
Switzerland
Denmark
South Africa
Colombia
Italy
Argelia
all records (56)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
742  Articles
1 of 75 pages  |  10  records  |  more records»
Temon Sub Districts is an administrative area of Kulon Progo Regency, which borders the South Sea (Indian Ocean). The Temon Sub District is directly adjacent to the waters, so it potentially experiences intrusion like other coastal areas in Indonesia. The... see more

Server security is an important thing that must be considered so that the server can work well and serve users. Attacks on servers can threaten server performance and data security in it. According to the National Cyber and Crypto Agency 2020 report, port... see more

Server is a center for providing services and storing data in a computer network. A server is managed by server administrator who has a duty of monitoring security server. While on duty, there are deficiencies in detecting attacks, the slow information ab... see more

Security in computer networks can be vulnerable, this is because we have weaknesses in making security policies, weak computer system configurations, or software bugs. Intrusion detection is a mechanism for securing computer networks by detecting, prevent... see more

It is inevitable for networks to be invaded during operation. The intrusion tolerance technology comes into being to enable invaded networks to provide the necessary network services. This paper introduces an automatic learning mechanism of the intrusion ... see more

Intrusion detection is very essential for providing security to different network domains and is mostly used for locating and tracing the intruders. There are many problems with traditional intrusion detection models (IDS) such as low detection capability... see more

The security issues of Wireless Sensor Network (WSN) are significant, among which intrusion detection can improve the defense detection performance of WSN, and also balance the security and energy-saving accurately and efficiently. In this paper, we focus... see more

Teaching network intrusion detection, or NID (the identification of violations of a security policy in a computer network) is a challenging task, because students need to analyze many data from network logs and in real time to identify patterns of network... see more

Computer network systems have been designing to share resources. Sharing resources process, data security, and confidentiality are main issues in anticipating misuse of the access to information by unauthorized parties. The solution to anticipating these ... see more

1 of 75 pages  |  10  records  |  more records»