-
41
Capacity Enhancement in 60 GHz Based D2D Networks by Relay Selection and Scheduling
Published 2015-01-01Get full text
Article -
42
Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats
Published 2024-12-01“…As a paradigm shift in network security, the idea of Zero Trust Architecture has attracted a lot of attention recently. …”
Get full text
Article -
43
Using statistical traffic analysis to calculate the confidential means of information transmission
Published 2021-01-01“…Honeypot is an activity-based network security system that can be a logical addition to the passive detection policies used by the IDS. …”
Get full text
Article -
44
ASD-YOLO: a lightweight network for coffee fruit ripening detection in complex scenarios
Published 2025-02-01Get full text
Article -
45
Effectiveness Evaluation of Random Forest, Naive Bayes, and Support Vector Machine Models for KDDCUP99 Anomaly Detection Based on K-means Clustering
Published 2025-01-01“…K-means clustering technique is applied as a preprocessing step to enhance the overall quality of network intrusion detection and maximize the accuracy of the network security measures. The goal is to identify anomalies with high accuracy. …”
Get full text
Article -
46
Anomaly Detection in Network Traffic Using Advanced Machine Learning Techniques
Published 2025-01-01“…Anomaly detection in network traffic is a critical aspect of network security, particularly in defending against the increasing sophistication of cyber threats. …”
Get full text
Article -
47
Identifying and Ranking Security Indicators in Online Social Networks with an MADM Technique
Published 2022-11-01“…Then, the relationship between the identified indicators and online social network security was investigated using the Spearman correlation test. …”
Get full text
Article -
48
Optimization of Rendering Parameters of Cesium 3DTiles Model Based on Differential Evolution Algorithm
Published 2025-01-01Get full text
Article -
49
Detection and diagnosis of unknown threats in power equipment using machine learning and Spark technology
Published 2025-01-01“…This approach allows for more efficient and accurate detection of unknown threat attacks on power grid equipment, providing robust network security for power systems. Our findings offer a new theoretical perspective for the evolving field of network security.…”
Get full text
Article -
50
Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks
Published 2013-10-01Get full text
Article -
51
-
52
A Game Theoretic Model for Wireless Sensor Networks with Hidden-Action Attacks
Published 2013-08-01“…In this paper, we propose to apply game theory into solving the network security problem of wireless network. We explore game theory algorithms to model situation for wireless network with malicious nodes and investigate the attack and detection problem by modeling it as pairwise simultaneous game and spatial structured game. …”
Get full text
Article -
53
-
54
An automatic test platform to verify the security functions for secure WIA-PA wireless sensor networks
Published 2016-11-01“…Among the several inherent limitations in wireless sensor network, security is a critical concern. The declared security functions of wireless devices should be well verified. …”
Get full text
Article -
55
Multi‐objective multiperiod stable environmental economic power dispatch considering probabilistic wind and solar PV generation
Published 2024-12-01“…Abstract The economic‐environmental power dispatch (EEPD) problem, a widely studied bi‐objective non‐linear optimization challenge in power systems, traditionally focuses on the economic dispatch of thermal generators without considering network security constraints. However, environmental sustainability necessitates reducing emissions and increasing the penetration of renewable energy sources (RES) into the electrical grid. …”
Get full text
Article -
56
Survey on Byzantine attacks and defenses in federated learning
Published 2024-12-01“…Secondly, guided by the classic network security defense model, federated learning defense methods were classified and analyzed from the perspective of defense mechanisms. …”
Get full text
Article -
57
CUSUM-Based Intrusion Detection Mechanism for Wireless Sensor Networks
Published 2014-01-01“…The nature of wireless sensor networks (WSNs) makes them very vulnerable to adversary's malicious attacks. Therefore, network security is an important issue to WSNs. Due to the constraints of WSN, intrusion detection in WSNs is a challengeable task. …”
Get full text
Article -
58
An Energy-Efficient Cyclic Diversionary Routing Strategy against Global Eavesdroppers in Wireless Sensor Networks
Published 2013-04-01“…While many protocols for sensor network security provide confidentiality for message content, contextual information usually remains exposed, which can be critical to the mission of the sensor network. …”
Get full text
Article -
59
Resilient Multipath Routing Mechanism Based on Clustering with Intrusion Tolerance
Published 2013-11-01“…However, in many special fields, network security is a basic and important factor which we must concern for. …”
Get full text
Article -
60
CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network
Published 2020-01-01“…Network intrusion detection system can effectively detect network attack behaviour, which is very important to network security. In this paper, a multiclassification network intrusion detection model based on convolutional neural network is proposed, and the algorithm is optimized. …”
Get full text
Article