-
1
A deep‐learning‐ and reinforcement‐learning‐based system for encrypted network malicious traffic detection
Published 2021-04-01Subjects: Get full text
Article -
2
PERAMALAN TOTAL PENARIKAN UANG TUNAI ATM MENGGUNAKAN TRIPLE EXPONENTIAL SMOOTHING
Published 2016Subjects: “…Computer Communications Networks…”
Thesis -
3
A multi-level framework for efficient sensitive data transmission in cloud computing
Published 2019Subjects: Get full text
Thesis -
4
DOMESTIKASI TEKNOLOGI INTERNET: STUDI DI “KAMPOENG CYBER” RT 36 TAMAN, YOGYAKARTA
Published 2014Subjects:Thesis -
5
Maximising robustness and diversity for improving the deep neural network safety
Published 2021-02-01Subjects: Get full text
Article -
6
Measurement and causal modelling of twisted pair copper cables
Published 2021-10-01Subjects: “…Computer communications…”
Get full text
Article -
7
Sistem Informasi Penerimaan Siswa Baru Berbasis Web Dengan Fasilitas SMS Gateway SMA Negeri 1 Pajangan
Published 2014Subjects:Thesis -
8
Joint optimization based satellite handover strategy for low earth orbit satellite networks
Published 2021-07-01Subjects: “…Computer communications…”
Get full text
Article -
9
Exploiting user preferences to reduce bandwidth requirements for VoD services with client caching
Published 2021-04-01Subjects: “…Computer communications…”
Get full text
Article -
10
MalDroid: Secure DL‐enabled intelligent malware detection framework
Published 2022-06-01Subjects: “…Computer communications…”
Get full text
Article -
11
Dual channel transmission for reliable V2X broadcasting messages
Published 2021-11-01Subjects: Get full text
Article -
12
Optimal edge gateway deployment in internet of things based on simulated annealing with adaptive external penalty
Published 2021-10-01Subjects: Get full text
Article -
13
Towards fully domain‐independent gesture recognition using COTS WiFi device
Published 2021-03-01Subjects: Get full text
Article -
14
Enhancing traffic capacity of multilayer networks with two logical layers by link deletion
Published 2022-01-01Subjects: Get full text
Article -
15
Method for providing background traffic using IP random assigning in cyber range
Published 2021-03-01Subjects: “…Computer communications…”
Get full text
Article -
16
Channel covariance matrix based secret key generation for low‐power terminals in frequency division duplex systems
Published 2021-04-01Subjects: Get full text
Article -
17
Modelling of the packet delivery rate in an actual LoRaWAN network
Published 2021-05-01Subjects: “…Computer communications…”
Get full text
Article -
18
Anti‐collision algorithm based on slotted random regressive‐style binary search tree in RFID technology
Published 2022-06-01Subjects: Get full text
Article -
19
C‐CNNLoc: Constrained CNN for robust indoor localization with building boundary
Published 2021-05-01Subjects: “…Computer communications…”
Get full text
Article -
20
A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things
Published 2022-03-01Subjects: Get full text
Article