Computer Networks

  1. Milena Didic, Bernd Wolfinger. (May 1982). “Simulation of a local computer network architecture applying a unified modeling system”. Computer Networks (1976), vol 6, Issue 2, pp 75-91. Retrieved July 8, 2013, from ScienceDirect.
    https://www.sciencedirect.com/science/article/pii/0376507582900307
  2. Mcafee, L.C., Jr.(16-18 Aug 1993). "Models and simulation for analysis of a computer network," Circuits and Systems, 1993., Proceedings of the 36th Midwest Symposium on, vol.2, pp.1316,. Retrieved July 8, 2013, from IEEE Xplore.
    https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=343344&isnumber=8013
  3. Press, L. (1996). “The role of computer networks in development”. Association for Computing Machinery.Communications of the ACM, 39(2), 23. Retrieved July 8, 2013, from Prioquest.
    https://search.proquest.com/docview/237047167?accountid=141617
  4. O Spaniol. (Nov 1979). “Modelling of local computer networks”. Computer Networks (1976). vol 3, Issue 5, pp 315-326. Retrieved July 8, 2013, from ScienceDirect.
    https://www.sciencedirect.com/science/article/pii/0376507579900023
  5. Linda S. Rutledge, Lance J. Hoffman. (Dec1986). “A survey of issues in computer network security”. I, vol 5, Issue 4, pp 296-308. Retrieved July 8, 2013, from ScienceDirect.
    https://www.sciencedirect.com/science/article/pii/0167404886900507
  6. Fuguo Li. (24-26 Aug 2012)."Study on security and prevention strategies of computer network," Computer Science and Information Processing (CSIP), 2012 International Conference on, pp.645,647. Retrieved July 9, 2013, from IEEE Xplore.
    https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6308936&isnumber=6308775
  7. Sun Xiaoling. (24-26 Dec 2011)."The study on computer network security and precaution, " Computer Science and Network Technology (ICCSNT), 2011 International Conference on, vol.3, pp.1695,1698. Retrieved July 9, 2013, from IEEE Xplore.
    https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6182293&isnumber=6182210
  8. Zhihu Wang. (27-29 May 2011)."Design and realization of computer network security perception control system," Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on, vol., no., pp.163,166. Retrieved July 9, 2013, from IEEE Xplore.
    https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6014242&isnumber=6013532
  9. Jinhua Wang; Xiaodong Liu. (27-29 May 2011)."Computer network security of university and preventive strategy," Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on, pp.143,145. Retrieved July 9, 2013, from IEEE Xplore.
    https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6014237&isnumber=6013532
  10. Liu Chunli; Liu Donghui,. (3-5 June 2012). "Computer network security issues and countermeasures," Robotics and Applications (ISRA), 2012 IEEE Symposium on, vol., no., pp.328,331. Retrieved July 9, 2013, from IEEE Xplore.
    https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6219190&isnumber=6219100
  11. Jun Fei; Huan Xu. (27-29 Mar 2010)."Assessing computer network security with fuzzy analytic hierarchy process," Advanced Computer Control (ICACC), 2010 2nd International Conference on, vol.5, pp.204,208. Retrieved July 9, 2013, from IEEE Xplore.
    https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5487259&isnumber=5486785
  12. Morgan, D.E.; Banks, Walter; Goodspeed, D.P.; Kolanko, R. (Sept 1975). "A computer network monitoring system," Software Engineering, IEEE Transactions on, vol.SE-1, no.3, pp.299,311. Retrieved July 9, 2013, from IEEE Xplore.
    https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6312855&isnumber=6312847
  13. Cai-Feng Du. (10-11 July 2009)."High Clustering Coefficient of Computer Networks, " Information Engineering, 2009. ICIE '09. WASE International Conference on, vol.1, pp.371,374. Retrieved July 9, 2013, from IEEE Xplore.
    https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5211102&isnumber=5210824
  14. Chunmiao Yuan. (6-7 Mar 2010)."Learning Computer Network with Auxiliary Software, " Education Technology and Computer Science (ETCS), 2010 Second International Workshop on, vol.3, pp.427,430. Retrieved July 9, 2013, from IEEE Xplore.
    https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5459619&isnumber=5458491
  15. Lin Wang; Mander, T.; Cheung, H.; Nabhani, F.; Cheung, R. (24-28 June 2007)."Security Operation Modes for Enhancement of Utility Computer Network Cyber-Security," Power Engineering Society General Meeting, 2007. IEEE, pp.1,8. Retrieved July 9, 2013, from IEEE Xplore.
    https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4275951&isnumber=4275199
  16. Ahuja, S.P. (12-14 Apr 1997)."Performance based reliability optimization for computer networks," Southeastcon '97. Engineering new New Century., Proceedings. IEEE, pp.121,125. Retrieved July 9, 2013, from IEEE Xplore.
    https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=598624&isnumber=13182
  17. El-Barr, M.A.; Zakir, A.; Sait, S.M.; Almulhem, A. (28-30 Aug 2008). "Reliability and fault tolerance based topological optimization of computer networks - part I: enumerative techniques," Communications, Computers and signal Processing, 2003. PACRIM. 2003 IEEE Pacific Rim Conference on, vol.2, pp.732,735. Retrieved July 9, 2013, from IEEE Xplore.
    https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1235885&isnumber=27701
  18. Junshun Hu; Xiaoyan Liang; Yang Bo; Chunhe Xia. (Oct 30, 2012-Nov 2, 2012)."The consistency verification of Computer Network Defense Policy and measures, " Information and Communication Technologies (WICT), 2012 World Congress on, pp.1052,1055. Retrieved July 9, 2013, from IEEE Xplore.
    https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6409230&isnumber=6409038
  19. Zhang Jie; Zhang Jianwei; Dou Yaxing. (23-25 Mar 2012)."Research and Realization of Computer Network Complex Practical Teaching Platform of Virtual Reality," Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, vol.1, pp.383. Retrieved July 9, 2013, from IEEE Xplore.
    https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6188073&isnumber=6187799
  20. Hamlyn, A.; Cheung, H.; Mander, T.; Lin Wang; Cungang Yang; Cheung, R. (20-24 July 2008). "Computer network security management and authentication of smart grids operations, " Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, 2008 IEEE, pp.1,7. Retrieved July 9, 2013, from IEEE Xplore.
    https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4596900&isnumber=4595968
Back to Top