Search Results - Computer network response
-
1
Performance analysis of open-source network monitoring software in wireless network / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…It is because network monitoring software can monitor behaviours, provide alertness for any failing component of a computer network, and measure performance such as CPU usage, bandwidth, throughput, response time, and packet loss. …”
Get full text
Get full text
Get full text
Article -
2
Performance analysis of network monitoring software in wireless network / Mohd Firdaus Mohd Mahdzir
Published 2019“…Network monitoring software is a tools that are able to monitor the behaviours and provide alertness for any failing component of computer network. …”
Get full text
Get full text
Research Reports -
3
-
4
Intelligent responses through network-based answer discovery with advanced reasoning
Published 2005Get full text
Get full text
Conference or Workshop Item -
5
Immune Inspired Approach for Securing Wireless Ad hoc Networks
Published 2009“…Moreover, mobile ad hoc networks (MANETs) have no clear line of defense and no fixed infrastructure; therefore, the known security techniques used for cabled networks might not work perfectly. …”
Get full text
Get full text
Article -
6
Immune Inspired Approach for Securing Wireless Ad hoc Networks
Published 2009“…Moreover, mobile ad hoc networks (MANETs) have no clear line of defense and no fixed infrastructure; therefore, the known security techniques used for cabled networks might not work perfectly. …”
Get full text
Get full text
Article -
7
Face-voice association towards multimodal-based authentication using modulated spike-time dependent learning
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Optimizing workload allocation in a network of heterogeneous computers
Published 2011“…The allocation of workload to a network of computers is investigated.A new workload allocation model based on Generalized Exponential (GE) distribution is proposed for user level performance measures.The criterion used for effective workload allocation is the one that minimizes the expected response time in systems to which jobs are routed. …”
Get full text
Get full text
Get full text
Article -
10
Intrusion Response Systems: Foundations, Design, and Challenges
Published 2016Get full text
Get full text
Article -
11
Learning anticipation through priming in spatio-temporal neural networks
Published 2012Get full text
Get full text
Book Section -
12
Position Responsive Routing Protocol (PRRP)
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Intelligent responses through network-based answer discovery with advanced reasoning
Published 2005Get full text
Get full text
Get full text
Conference or Workshop Item -
15
CAD and fabrication of low-pass filter / Norazam Mohd Amin
Published 2004“…The filter was designed, simulated and optimized with the aid of a CAD package HP-Eesof and Genesys V8 with different typ of network. In Libra, the type of network used for the filter is 7t-network while T-network type is used in Genesys. …”
Get full text
Get full text
Thesis -
16
Response Option for Attacks Detected by Intrusion Detection System
Published 2015“…In past decades, we have seen that the increasing speed of the network attacks compromising computer system functionality and degrading network performance. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
A Divide-and-Distribute Approach to Single-Cycle Learning HGN Network for Pattern Recognition
Published 2010“…This paper investigates an effect of dividing and distributing simple pattern recognition processes within a computational network. Our approach extends the single-cycle pattern recognition capability of Hierarchical Graph Neuron (HGN) for wireless sensor networks into the more generic framework of computational grids. …”
Get full text
Get full text
Conference or Workshop Item -
18
Spiking neural network with lateral inhibition for reward-based associative learning
Published 2014Get full text
Get full text
Book Section -
19
-
20
Ranking network security threats of academic administrative local area networks at the institution of higher learning in Malaysia
Published 1996“…The advancement and proliferation of computer networks nowadays have prompted for a concern on the issue of security of the whole network operation. …”
Get full text
Get full text
Get full text
Monograph
