network administration
Recently Published Documents


TOTAL DOCUMENTS

75
(FIVE YEARS 14)

H-INDEX

4
(FIVE YEARS 0)

Author(s):  
Wira Ardian Prasetyo

This study aimed to determine the increase in student activity and learning outcomes through the implementation of the Problem Based Learning (PBL) learning model. This research is classroom action research conducted in 2 cycles. The method of data collection was carried out through observation. Data analysis was carried out by comparing the test results in cycle 1 and cycle 2 with descriptive techniques after implementing the learning method using the Problem Based Learning model. Students' activeness can be seen from the aspect of students who give full attention to the material, dare to ask the teacher, answer questions, and have opinions. In addition, students also collaborate in groups, work on questions, learn to use resources, and make group presentations. This study indicates that the learning outcomes and learning activities of class XII students of SMK PUSTEK BSD, South Tangerang City, Banten Province, in the Basic Network Administration subject have increased.


Author(s):  
Wenjuan Xu

Computer forensics is not only important for the security professionals in the forensics field, it also can help the information technology professionals working in the network administration, system management and other related fields. Our department has a computer forensics course offered for the undergraduate students to prepare them to be successful in their future career.  In this paper, we introduce our forensics course design, especially, we explain our course hands-on activities, which include the labs and the projects for practicing the computer forensics related programming and the existing tools using.


Author(s):  
Keerthy N ◽  
Deepa N P ◽  
Mahesh Kumar N

The advancement of cloud and IoT technologies, has made network administration more difficult. Software-Defined Networking is one of the trending technologies which replaces the traditional networking domain with the programmable network configuration. In the current development of the network architecture, data security plays a prominent role. Many strategies for dealing with network attacks have been developed, among them deep learning is one of the most advanced technology. The paper aims to classify the network traffic into normal traffic and attack traffic with Multilayer Perceptron (MLP). The simulation uses a python programming language with many packages like Numpy, sci-kit, seaborn, etc. in a mininet SDN test bed with the Ryu controller. From the obtained results proposed algorithm gives better accuracy for classifying the attack traffic and normal traffic in the network.


2021 ◽  
Vol 5 (136) ◽  
pp. 58-69
Author(s):  
Sergey Klishch ◽  
Anton Guda ◽  
Yuliia Mala ◽  
Yuliia Synytsina

Malware analysis takes significant place at the intersection of incident response, forensics, and security monitoring, and system and network administration. The reason behind performing malware analysis is to extract information from a malware sample that can assist in responding to a malware incident. From a business perspective malware analysis is critical for saving valuable data of many organizations since the control of any IT system vulnerability in the wrong hands can have unexpected consequences. In this article we will cover general practical aspects and pre requirements needed for quick start in this area.


2021 ◽  
pp. 138-153
Author(s):  
León F. García Corona

Most ethnomusicological training requires fieldwork and lab techniques in which students gain technical skills related to the acquisition of data related to fieldwork. Although the work we do as ethnomusicologists sits at the forefront of gathering engaging, relevant content related to musical expressions, most ethnomusicologists are ill equipped in delivering their findings to a broader audience through the use of new media and post-production techniques such as video, sound, and image editing, web development, database administration, and network administration, among many others. Although plenty of literature about developing these skills exists as stand-alone instruction, in this essay I present a bird’s-eye view of content production from an ethnomusicological perspective, providing an understanding of not only content production but how intersects with revenue and ethnomusicological goals. I do so by sharing more than twenty years of experience as an IT specialist and consultant and by exploring some examples of content production at Smithsonian Folkways.


2021 ◽  
Vol 1764 (1) ◽  
pp. 012097
Author(s):  
Ambiyar ◽  
Raimon Efendi ◽  
Waskito ◽  
Nur Zamalia Afifa ◽  
Ratih Agustin Wulandari

Author(s):  
Alexander V. Ponachugin ◽  
Sergey D. Popenko ◽  
Ivan V. Snyrov

2021 ◽  
Author(s):  
I. García ◽  
D. Camarero ◽  
E. Jauregui ◽  
M. Echevarría ◽  
M. Morillo ◽  
...  

Author(s):  
Songrit Kitisriworapan ◽  
Aphirak Jansang ◽  
Anan Phonphoem

AbstractTraditional rogue access-point (AP) detection mechanisms are employed in network administration to protect network infrastructure and organization; however, these mechanisms do not protect end users from connecting to a rogue-AP. In this paper, a rogue-AP detection technique on the mobile-user side is proposed. By using a simple method involving walking, the round-trip time (RTT) and the modulation and coding scheme values are obtained, and a more accurate transmission rate for particular RTT values is thereby calculated. Further, the cleansed data are classified using the k-means method and the cumulative distribution function for the detection process. The results demonstrate that a rogue-AP can be detected with an F-measure value of up to 0.9. In the future, the proposed algorithm can be implemented as an application installed on mobile devices so that nontechnical users can detect rogue-APs.


Sign in / Sign up

Export Citation Format

Share Document