Articles with "computer network" as a keyword



Photo by homajob from unsplash

Advance system and model to predict malicious files prorogation inside computer network

Sign Up to like & get
recommendations!
Published in 2019 at "IET Networks"

DOI: 10.1049/iet-net.2018.5105

Abstract: A new model for malicious file propagation and transmission in a computer network is formulated. This model introduced a cure rate ΞΎ ( E -cure rate) which is calculated after the regular running of anti-virus… read more here.

Keywords: model; computer network; system; file ... See more keywords
Photo from wikipedia

Research on the Construction of English Autonomous Learning Model Based on Computer Network-Assisted Instruction

Sign Up to like & get
recommendations!
Published in 2022 at "Computational Intelligence and Neuroscience"

DOI: 10.1155/2022/8646463

Abstract: As a supplement to traditional teaching methods, computer-assisted teaching methods can reflect modern educational concepts, such as creating student-led, teacher-led environments. The goal of college English education is to enable them to communicate effectively in… read more here.

Keywords: learning model; computer; computer network; model based ... See more keywords
Photo from wikipedia

Analysis of computer network attack based on the virus propagation model

Sign Up to like & get
recommendations!
Published in 2020 at "EURASIP Journal on Wireless Communications and Networking"

DOI: 10.1186/s13638-020-1660-5

Abstract: The conventional method can make a reasonable analysis of common network attacks, but the reliability of the analysis is low under the virus propagation model. This paper proposes a new research method of computer network… read more here.

Keywords: network attack; analysis; computer network; network ... See more keywords
Photo from wikipedia

Sunrays Microcomputer FDDI Optical Fiber Computer Network Security System Design

Sign Up to like & get
recommendations!
Published in 2020 at "Advances in Electrical and Electronic Engineering"

DOI: 10.2174/2352096513999200710140204

Abstract: In order to solve the safety hazard of computer network security, a special congestion control strategy is adopted. This strategy is used to discuss the design and implementation technology of a network adapter, a bridge,… read more here.

Keywords: network security; network; computer network; fddi optical ... See more keywords