Showing 41 - 60 results of 117 for search '"network security"', query time: 0.06s Refine Results
  1. 41
  2. 42

    Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats by Pushpendra Kumar Verma, Bharat Singh, Preety, Shubham Kumar Sharma, Rakesh Prasad Joshi

    Published 2024-12-01
    “…As a paradigm shift in network security, the idea of Zero Trust Architecture has attracted a lot of attention recently. …”
    Get full text
    Article
  3. 43

    Using statistical traffic analysis to calculate the confidential means of information transmission by Нух Таха Насіф

    Published 2021-01-01
    “…Honeypot is an activity-based network security system that can be a logical addition to the passive detection policies used by the IDS. …”
    Get full text
    Article
  4. 44
  5. 45

    Effectiveness Evaluation of Random Forest, Naive Bayes, and Support Vector Machine Models for KDDCUP99 Anomaly Detection Based on K-means Clustering by Zhang Majun

    Published 2025-01-01
    “…K-means clustering technique is applied as a preprocessing step to enhance the overall quality of network intrusion detection and maximize the accuracy of the network security measures. The goal is to identify anomalies with high accuracy. …”
    Get full text
    Article
  6. 46

    Anomaly Detection in Network Traffic Using Advanced Machine Learning Techniques by Stephanie Ness, Vishwanath Eswarakrishnan, Harish Sridharan, Varun Shinde, Naga Venkata Prasad Janapareddy, Vineet Dhanawat

    Published 2025-01-01
    “…Anomaly detection in network traffic is a critical aspect of network security, particularly in defending against the increasing sophistication of cyber threats. …”
    Get full text
    Article
  7. 47

    Identifying and Ranking Security Indicators in Online Social Networks with an MADM Technique by Hamed Fathi, Alireza Amini

    Published 2022-11-01
    “…Then, the relationship between the identified indicators and online social network security was investigated using the Spearman correlation test. …”
    Get full text
    Article
  8. 48
  9. 49

    Detection and diagnosis of unknown threats in power equipment using machine learning and Spark technology by Li Di, Cen Chen, Zhuo Lv, Mingyan Li, Nuannuan Li, Hao Chang

    Published 2025-01-01
    “…This approach allows for more efficient and accurate detection of unknown threat attacks on power grid equipment, providing robust network security for power systems. Our findings offer a new theoretical perspective for the evolving field of network security.…”
    Get full text
    Article
  10. 50
  11. 51
  12. 52

    A Game Theoretic Model for Wireless Sensor Networks with Hidden-Action Attacks by Yuxin Mao, Ping Zhu, Guiyi Wei

    Published 2013-08-01
    “…In this paper, we propose to apply game theory into solving the network security problem of wireless network. We explore game theory algorithms to model situation for wireless network with malicious nodes and investigate the attack and detection problem by modeling it as pairwise simultaneous game and spatial structured game. …”
    Get full text
    Article
  13. 53
  14. 54

    An automatic test platform to verify the security functions for secure WIA-PA wireless sensor networks by Min Wei, Keecheon Kim

    Published 2016-11-01
    “…Among the several inherent limitations in wireless sensor network, security is a critical concern. The declared security functions of wireless devices should be well verified. …”
    Get full text
    Article
  15. 55

    Multi‐objective multiperiod stable environmental economic power dispatch considering probabilistic wind and solar PV generation by Aamir Ali, Sumbal Aslam, Sohrab Mirsaeidi, Noor Hussain Mugheri, Riaz Hussain Memon, Ghulam Abbas, Hammad Alnuman

    Published 2024-12-01
    “…Abstract The economic‐environmental power dispatch (EEPD) problem, a widely studied bi‐objective non‐linear optimization challenge in power systems, traditionally focuses on the economic dispatch of thermal generators without considering network security constraints. However, environmental sustainability necessitates reducing emissions and increasing the penetration of renewable energy sources (RES) into the electrical grid. …”
    Get full text
    Article
  16. 56

    Survey on Byzantine attacks and defenses in federated learning by ZHAO Xiaojie, SHI Jinqiao, HUANG Mei, KE Zhenhan, SHEN Liyan

    Published 2024-12-01
    “…Secondly, guided by the classic network security defense model, federated learning defense methods were classified and analyzed from the perspective of defense mechanisms. …”
    Get full text
    Article
  17. 57

    CUSUM-Based Intrusion Detection Mechanism for Wireless Sensor Networks by Bishan Ying

    Published 2014-01-01
    “…The nature of wireless sensor networks (WSNs) makes them very vulnerable to adversary's malicious attacks. Therefore, network security is an important issue to WSNs. Due to the constraints of WSN, intrusion detection in WSNs is a challengeable task. …”
    Get full text
    Article
  18. 58

    An Energy-Efficient Cyclic Diversionary Routing Strategy against Global Eavesdroppers in Wireless Sensor Networks by Ju Ren, Yaoxue Zhang, Kang Liu

    Published 2013-04-01
    “…While many protocols for sensor network security provide confidentiality for message content, contextual information usually remains exposed, which can be critical to the mission of the sensor network. …”
    Get full text
    Article
  19. 59

    Resilient Multipath Routing Mechanism Based on Clustering with Intrusion Tolerance by Shukui Zhang, Hongyan Zuo, Jianxi Fan, Juncheng Jia

    Published 2013-11-01
    “…However, in many special fields, network security is a basic and important factor which we must concern for. …”
    Get full text
    Article
  20. 60

    CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network by Guojie Liu, Jianbiao Zhang

    Published 2020-01-01
    “…Network intrusion detection system can effectively detect network attack behaviour, which is very important to network security. In this paper, a multiclassification network intrusion detection model based on convolutional neural network is proposed, and the algorithm is optimized. …”
    Get full text
    Article