-
61
Secure Event-Triggered Mechanism for Networked Control Systems under Injection Cyber-Attacks
Published 2022-01-01“…This study focuses on the secure stability issue of networked control systems (NCSs) under injection cyber-attacks (ICAs), which have important research value of applications for network security. Firstly, a more general Lyapunov–Krasovskii functional (LKF) is constructed based on the time-delay phenomenon in systems. …”
Get full text
Article -
62
Machine Learning Applications based on SVM Classification A Review
Published 2021-04-01“…Classification based on SVM has been used in many fields like face recognition, diseases diagnostics, text recognition, sentiment analysis, plant disease identification and intrusion detection system for network security application. Based on this study, it can be concluded that SVM classifier has obtained high accuracy results in most of the applications, specifically, for face recognition and diseases identification applications. …”
Get full text
Article -
63
Mathematical Modeling of Static Data Attribute Encryption Based on Big Data Technology
Published 2022-01-01“…In order to improve the attributes of static data, encryption technology can provide a reliable technical guarantee for network security. This paper presents a mathematical modeling method of static data attribute encryption based on big data technology. …”
Get full text
Article -
64
A Method of Intrusion Detection Based on WOA-XGBoost Algorithm
Published 2022-01-01“…However, computer viruses and malicious network attacks make network security face huge challenges, and more accurate detection of attacks has become the focus of attention to current computer fields. …”
Get full text
Article -
65
Topological Indices of the Pent-Heptagonal Nanosheets VC5C7 and HC5C7
Published 2019-01-01Get full text
Article -
66
Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions
Published 2018-01-01“…Intrusion detection, an important entity towards network security, has the ability to observe network activity as well as detect intrusions/attacks. …”
Get full text
Article -
67
-
68
A Reconfigurable Antenna-Based Solution for Stationary Device Authentication in Wireless Networks
Published 2012-01-01“…Applying channel information for user authentication is gaining attention in the area of wireless network security. Similarly, reconfigurable antennas capable of generating multiple decorrelated channel realizations have become increasingly popular in wireless systems. …”
Get full text
Article -
69
AN APPROACH HYBRID RECURRENT NEURAL NETWORK AND RULE-BASE FOR INTRUSION DETECTION SYSTEM
Published 2019-06-01“…Network intrusion detection is one of the most important issues of network security and is a research interest of many researchers. …”
Get full text
Article -
70
Packet Payload Monitoring for Internet Worm Content Detection Using Deterministic Finite Automaton with Delayed Dictionary Compression
Published 2014-01-01“…Packet content scanning is one of the crucial threats to network security and network monitoring applications. In monitoring applications, payload of packets in a network is matched against the set of patterns in order to detect attacks like worms, viruses, and protocol definitions. …”
Get full text
Article -
71
-
72
Assisting Laboratory Management Based on Network Big Data Mining Technology
Published 2022-01-01“…In today’s big data context, the composition of virtual networks is becoming increasingly complex, so it is neither easy nor difficult to strengthen the control of network security issues. This paper studies the important content of network big data mining-assisted laboratory management. …”
Get full text
Article -
73
Malware Detection in Self-Driving Vehicles Using Machine Learning Algorithms
Published 2020-01-01“…Thus, intrusion detection is a key network security function in vehicles with open connectivity, such as self-driving and connected cars. …”
Get full text
Article -
74
Modeling Peer-to-Peer Botnet on Scale-Free Network
Published 2014-01-01“…Our findings can provide meaningful instruction to network security management.…”
Get full text
Article -
75
A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features
Published 2015-01-01“…Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. …”
Get full text
Article -
76
An active detection of compromised nodes based on en-route trap in wireless sensor network
Published 2021-08-01“…With the development and wide use of wireless sensor network, security arises as an essential issue since sensors with restrict resources are deployed in wild areas in an unattended manner. …”
Get full text
Article -
77
Dynamics and Control of Worm Epidemic Based on Mobile Networks by SEIQR-Type Model with Saturated Incidence Rate
Published 2021-01-01“…Our results give new insights to mobile network security, namely, that is predicting the worm spreading tendency, identifying the epidemic control strategies, and estimating the worm popularity level. …”
Get full text
Article -
78
Research on Spam Filters Based on NB Algorithm
Published 2025-01-01“…Spam filtering is a crucial part of network security. As spam becomes more complex, traditional rule-based methods struggle to meet the needs of modern email systems. …”
Get full text
Article -
79
Improved Security Patch on Secure Communication among Cell Phones and Sensor Networks
Published 2013-04-01“…The communication between cell phones and sensor networks involves strong user authentication protocols to ensure the data and network security. Generally, in order to obtain the relevant information, cell phones interact with sensor networks via gateways. …”
Get full text
Article -
80
Efficient Pairing-Free Privacy-Preserving Auditing Scheme for Cloud Storage in Distributed Sensor Networks
Published 2015-07-01“…The previous research of distributed sensor network security has focused on secure information in communication; however the research of secure data storage has been overlooked. …”
Get full text
Article