Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Internet

Known as: Internet loss, Interwebz, Public concern over the Internet 
The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide. It is… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
While big data offer exciting opportunities to address questions about social behavior, studies must not abandon traditionally… Expand
  • table 1
  • table 2
  • figure 1
  • figure 2
  • table 3
Review
2019
Review
2019
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted significant attention from the research… Expand
  • table I
  • figure 1
  • figure 2
  • table II
  • figure 3
Review
2019
Review
2019
For a long time, a common opinion among policy-makers was that the digital divide problem would be solved when a country’s… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Review
2019
Review
2019
Abstract Labeled data sets are necessary to train and evaluate anomaly-based network intrusion detection systems. This work… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • table II
Review
2019
Review
2019
Traffic analysis is a compound of strategies intended to find relationships, patterns, anomalies, and misconfigurations, among… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • table I
Review
2019
Review
2019
The Internet-of-Things (IoT) is the future of the Internet, where everything will be connected. Studies have revealed that fog… Expand
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Review
2018
Review
2018
As the world population ages and older adults comprise a growing proportion of current and potential Internet users… Expand
Review
2018
Review
2018
Abstract The importance of timely, accurate and effective use of available information is essential to the proper management of… Expand
Review
2018
Review
2018
The process of using information about documents such as the author, genre, and date of publication while evaluating and… Expand
  • table 1
  • table 2
  • table 3
  • table 4
Review
2018
Review
2018
Malicious domains are one of the major resources required for adversaries to run attacks over the Internet. Due to the important… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4