Showing 61 - 80 results of 117 for search '"network security"', query time: 0.05s Refine Results
  1. 61

    Secure Event-Triggered Mechanism for Networked Control Systems under Injection Cyber-Attacks by Xiao Cai, Jian Kang, Kaibo Shi

    Published 2022-01-01
    “…This study focuses on the secure stability issue of networked control systems (NCSs) under injection cyber-attacks (ICAs), which have important research value of applications for network security. Firstly, a more general Lyapunov–Krasovskii functional (LKF) is constructed based on the time-delay phenomenon in systems. …”
    Get full text
    Article
  2. 62

    Machine Learning Applications based on SVM Classification A Review by Dakhaz Mustafa Abdullah, Adnan Mohsin Abdulazeez

    Published 2021-04-01
    “…Classification based on SVM has been used in many fields like face recognition, diseases diagnostics, text recognition, sentiment analysis, plant disease identification and intrusion detection system for network security application. Based on this study, it can be concluded that SVM classifier has obtained high accuracy results in most of the applications, specifically, for face recognition and diseases identification applications. …”
    Get full text
    Article
  3. 63

    Mathematical Modeling of Static Data Attribute Encryption Based on Big Data Technology by Yutang Liu, Qin Zhang

    Published 2022-01-01
    “…In order to improve the attributes of static data, encryption technology can provide a reliable technical guarantee for network security. This paper presents a mathematical modeling method of static data attribute encryption based on big data technology. …”
    Get full text
    Article
  4. 64

    A Method of Intrusion Detection Based on WOA-XGBoost Algorithm by Yan Song, Haowei Li, Panfeng Xu, Dan Liu

    Published 2022-01-01
    “…However, computer viruses and malicious network attacks make network security face huge challenges, and more accurate detection of attacks has become the focus of attention to current computer fields. …”
    Get full text
    Article
  5. 65
  6. 66

    Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions by Bilal Ahmad, Wang Jian, Zain Anwar Ali

    Published 2018-01-01
    “…Intrusion detection, an important entity towards network security, has the ability to observe network activity as well as detect intrusions/attacks. …”
    Get full text
    Article
  7. 67
  8. 68

    A Reconfigurable Antenna-Based Solution for Stationary Device Authentication in Wireless Networks by Prathaban Mookiah, Kapil R. Dandekar

    Published 2012-01-01
    “…Applying channel information for user authentication is gaining attention in the area of wireless network security. Similarly, reconfigurable antennas capable of generating multiple decorrelated channel realizations have become increasingly popular in wireless systems. …”
    Get full text
    Article
  9. 69

    AN APPROACH HYBRID RECURRENT NEURAL NETWORK AND RULE-BASE FOR INTRUSION DETECTION SYSTEM by Trần Thị Hương, Phạm Văn Hạnh

    Published 2019-06-01
    “…Network intrusion detection is one of the most important issues of network security and is a research interest of many researchers. …”
    Get full text
    Article
  10. 70

    Packet Payload Monitoring for Internet Worm Content Detection Using Deterministic Finite Automaton with Delayed Dictionary Compression by Divya Selvaraj, Padmavathi Ganapathi

    Published 2014-01-01
    “…Packet content scanning is one of the crucial threats to network security and network monitoring applications. In monitoring applications, payload of packets in a network is matched against the set of patterns in order to detect attacks like worms, viruses, and protocol definitions. …”
    Get full text
    Article
  11. 71
  12. 72

    Assisting Laboratory Management Based on Network Big Data Mining Technology by Yonghua Xu

    Published 2022-01-01
    “…In today’s big data context, the composition of virtual networks is becoming increasingly complex, so it is neither easy nor difficult to strengthen the control of network security issues. This paper studies the important content of network big data mining-assisted laboratory management. …”
    Get full text
    Article
  13. 73

    Malware Detection in Self-Driving Vehicles Using Machine Learning Algorithms by Seunghyun Park, Jin-Young Choi

    Published 2020-01-01
    “…Thus, intrusion detection is a key network security function in vehicles with open connectivity, such as self-driving and connected cars. …”
    Get full text
    Article
  14. 74

    Modeling Peer-to-Peer Botnet on Scale-Free Network by Liping Feng, Hongbin Wang, Qi Han, Qingshan Zhao, Lipeng Song

    Published 2014-01-01
    “…Our findings can provide meaningful instruction to network security management.…”
    Get full text
    Article
  15. 75

    A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features by P. Amudha, S. Karthik, S. Sivakumari

    Published 2015-01-01
    “…Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. …”
    Get full text
    Article
  16. 76

    An active detection of compromised nodes based on en-route trap in wireless sensor network by Jiang-Tao Wang, Zhi-Xiong Liu

    Published 2021-08-01
    “…With the development and wide use of wireless sensor network, security arises as an essential issue since sensors with restrict resources are deployed in wild areas in an unattended manner. …”
    Get full text
    Article
  17. 77

    Dynamics and Control of Worm Epidemic Based on Mobile Networks by SEIQR-Type Model with Saturated Incidence Rate by Rui Hu, Qingwu Gao, Bairong Wang

    Published 2021-01-01
    “…Our results give new insights to mobile network security, namely, that is predicting the worm spreading tendency, identifying the epidemic control strategies, and estimating the worm popularity level. …”
    Get full text
    Article
  18. 78

    Research on Spam Filters Based on NB Algorithm by Su Shengyue

    Published 2025-01-01
    “…Spam filtering is a crucial part of network security. As spam becomes more complex, traditional rule-based methods struggle to meet the needs of modern email systems. …”
    Get full text
    Article
  19. 79

    Improved Security Patch on Secure Communication among Cell Phones and Sensor Networks by Ndibanje Bruce, Tae-Yong Kim, Hoon Jae Lee

    Published 2013-04-01
    “…The communication between cell phones and sensor networks involves strong user authentication protocols to ensure the data and network security. Generally, in order to obtain the relevant information, cell phones interact with sensor networks via gateways. …”
    Get full text
    Article
  20. 80

    Efficient Pairing-Free Privacy-Preserving Auditing Scheme for Cloud Storage in Distributed Sensor Networks by Xinpeng Zhang, Chunxiang Xu, Xiaojun Zhang

    Published 2015-07-01
    “…The previous research of distributed sensor network security has focused on secure information in communication; however the research of secure data storage has been overlooked. …”
    Get full text
    Article