Implementation of ABC & WOA-Based Security Defense Mechanism for Distributed Denial of Service Attacks

S Devi, YK Sharma, S Athithan, S Sachi… - … and Informatics (IC3I …, 2023 - ieeexplore.ieee.org
Computer systems are vulnerable to information theft as a result of the extensive use of the
internet, which has caused an increase in security defence mechanisms. In order to …

Research on Big Data in Computer Information Security Processing Technology

R Zhang, C Hu, T Li, PS Fan - 2024 3rd International …, 2024 - ieeexplore.ieee.org
Nowadays, network technology has made a qualitative leap and has also realized the
universal use of networks, but because of the strengthening of technology, computer …

Development and Application of Service Middle Office Full-Link Monitoring System based on Genetic Algorithm

H Liu, J Duan, R Wang, D Li, Z He… - 2024 3rd International …, 2024 - ieeexplore.ieee.org
The role of monitoring system design in service middle office monitoring system is very
important, but there are operation and maintenance problems such as difficult …

[PDF][PDF] International Journal of Communication Networks and Information Security

N An, M Ahmad - core.ac.uk
This study explores the metaverse's intriguing mysteries, including storytelling patterns and
interactive narratives' effects on humancomputer interactions. This study examines the …