The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The problem of research is that there are challenges and obstacles that have emerged in distance education. It is an electronic system that allows the interaction between the teacher and the learner through a full presentation of the educational content of the courses. The modern means of computers 'networks and media are used. Education seeks to develop 'and develop it has faced some obstacles and...
Fault identification and fault isolation, are the significant aspects in fault management in the network. It is method of identifying the faults in the given network and determining where exactly has the fault occurred. Over the years, the techniques of identifying and isolating faults in computer networks have evolved and grown better. This paper explains few of the fault identification and fault...
Moving Target Defense (MTD) has received significant focus in technical publications. The publications describe MTD approaches that periodically change some attribute of the computer network system. The attribute that is changed, in most cases, is one that an adversary attempts to gain knowledge of through reconnaissance and may use its knowledge of the attribute to exploit the system. The fundamental...
The article presents an eye tracking analysis based study in context of learning IT skills. The goal of eye tracking analysis is to determine the gaze movement differences between students with different prior knowledge during answering a question in the topic of computer networks. The gaze movement was tracked by cost-effective Eye Tribe tracker, and the eye movement data was evaluated by Ogama software...
Network data is ubiquitous in cyber-security applications. Accurately modelling such data allows discovery of anomalous edges, subgraphs or paths, and is key to many signature-free cyber-security analytics. We present a recurring property of graphs originating from cyber-security applications, often considered a ‘corner case’ in the main literature on network data analysis, that greatly affects the...
Statistical anomaly detection techniques provide the next layer of cyber-security defences below traditional signature-based approaches. This article presents a scalable, principled, probability-based technique for detecting outlying connectivity behaviour within a directed interaction network such as a computer network. Independent Bayesian statistical models are fit to each message recipient in...
The possibility for theft or misuse of legitimate user credentials is a potential cyber-security weakness in any enterprise computer network which is almost impossible to eradicate. However, by monitoring the network traffic patterns, it can be possible to detect misuse of credentials. This article presents an initial investigation into deconvolving the mixture behaviour of several individuals within...
Computer networks are complex and the analysis of their structure in search for anomalous behaviour is both a challenging and important task for cyber security. For instance, new edges, i.e. connections from a host or user to a computer that has not been connected to before, provide potentially strong statistical evidence for detecting anomalies. Unusual new edges can sometimes be indicative of both...
Finding quantitative measures for describing and characterizing the structural properties of networks is a research topic with ongoing interest. These measures are called graph invariants and are usually referred to as topological indices. The oldest topological index is the Wiener index, it has been extensively studied in many applications such as chemical graph theory, complex network, social networks,...
IoT based traffic congestion control unit design increases the service efficiency of the police personnel. Careful investigation is done to develop a work flow process for a real time traffic monitoring unit. Enhanced functionality in the design is provided using multitasking design capability in term design of both. Sensing traffic and alert service providing unit. A knowledge eco system is developed...
Computer Networks, an undergraduate computer science course, is taught through a variety of new technological tools but more attention on assessment strategies using those technological tools is desirable. Research studies have shown that assessment methods also influence students' learning. Current assessment techniques, even those which include technology, focus more on summative assessment rather...
Recently, the quarantine approach, which has been applied to infectious disease control, is widely regarded as an effective measure to suppress viral spread in computer networks. Hence, in order to prevent the spread of computer virus in network, and consider the latent period of a latent computer, a new delayed epidemic model of computer virus with hybrid quarantine strategies is presented. By regarding...
The significance of cyber security resilience beyond organizational borders is increasingly recognized with regard to maintaining individual cybersecurity manageability. The limitations and complexity of each cyber security technology combined with the growth and distribution of cyber attacks impact the efficiency of cyber security management and increase the activities to be performed by computer...
STEM education can enormously benefit from cloud technology. The cloud can offer instructors and students (whether local or remote) on-demand, dedicated, isolated, unlimited, and easily configurable compute and storage resources. The cloud can significantly reduce cost and expenditure on lab construction and maintenance. Due to these features, the cloud has been widely adopted by many universities...
Divergent thinking is the process of generating multiple solutions for a given problem, while convergent thinking is evaluating and selecting accurate solution based on constraints, assumptions, and pros and cons analysis. Divergent and convergent thinking is an important thinking skill needed to generate novel or innovative solutions to a given problem. According to ABET guidelines, it is also one...
Computer network in work and life bring convenience for people at the same time, also inevitable has brought some safe hidden trouble. To bring the positive role of efficient use of computer network, you need to effectively safeguard the security of computer network information. This article mainly analyzes the present situation of computer network security problems, analyzes the main source of computer...
Computer networks serve as critical infrastructure to services in business, health care, and education. Targeted attacks and random failures may cause link or node removals, which in turn can cause significant disruption to the availability of network services. Designing a network topology to provide acceptable levels of service in the face of these challenges can save both lives and money. A number...
In this paper based on the developed information technology, computer network traffic monitoring was implemented. The developed software for traffic monitoring was described. Traffic trend forecasting based on the Ateb-functions theory was realized. Based on the results of prediction of traffic and maximum permissible load of network node for providing of quality of service the redistribution of network...
Modern students are not motivated to study lessons with Traditional teaching methods. Computers, smartphones, tablets and other smart devices disturb their attention. Smart devices that disturb attention of students in Traditional teaching methods can be used as auxiliary tools of modern teaching methods. In this paper, we review two most popular modern teaching methods: Flipped Classroom and Gamification...
Recently, laboratory classes of computer network courses are very important in order to enhance students' learning and activities, therefore, these classes need to establish a suitable laboratory where each student can connect network devices to configure and test functions within different network topologies. In this study, we build a Virtualization-Based Laboratory (VBLab) for facilitating networking...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.