Showing 1,761 - 1,780 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 1761

    A Federated Learning Framework for Enhanced Data Security and Cyber Intrusion Detection in Distributed Network of Underwater Drones by Mansahaj Singh Popli, Rudra Pratap Singh, Navneet Kaur Popli, Mohammad Mamun

    Published 2025-01-01
    “…This approach significantly improves data security by ensuring that sensitive information never leaves the local devices, reducing the risk of interception or compromise during transmission. …”
    Get full text
    Article
  2. 1762

    EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks by Sakshi Patni, Joohyung Lee

    Published 2024-12-01
    “…We also create an access control system based on smart contracts and a secure multi-party computing protocol for model updates. …”
    Get full text
    Article
  3. 1763

    Optimal Connection of Offshore Wind Farm with Maximization of Wind Capacity to Power Systems considering Losses and Security Constraints by Leandro A. Vasconcelos, João A. Passos Filho, Leonardo W. de Oliveira, Othon F. Avila

    Published 2019-01-01
    “…The objective of this work is to present a methodology to determine the optimal OWF connection point in a power system, with maximum penetration of firm wind power and minimum loss, considering security constraints related to the “N−1” contingency criterion, exchange limits between areas, and a strategy to reduce the number of constraints in the optimization problem. …”
    Get full text
    Article
  4. 1764
  5. 1765
  6. 1766
  7. 1767
  8. 1768
  9. 1769
  10. 1770
  11. 1771
  12. 1772
  13. 1773
  14. 1774
  15. 1775

    A Comparative Study of Anomaly Detection Techniques for IoT Security Using Adaptive Machine Learning for IoT Threats by Dheyaaldin Alsalman

    Published 2024-01-01
    “…The results emphasize the promising prospects of FusionNet in security, healthcare, and other domains where accurate anomaly detection is crucial.…”
    Get full text
    Article
  16. 1776
  17. 1777
  18. 1778
  19. 1779
  20. 1780