Showing 81 - 100 results of 117 for search '"network security"', query time: 0.07s Refine Results
  1. 81

    EFFICIENT MALICIOUS NODE DETECTION IN WIRELESS SENSOR NETWORKS USING RABIN-KARP ALGORITHM by T Devapriya, V Ganesan, S Velmurugan

    Published 2024-12-01
    “…A scalable, lightweight algorithm that can detect and mitigate harmful behavior is the goal of this effort to improve network security. The Rabin-Karp method, well-known for its pattern-matching efficiency, is modified to verify transmitted data packets using hashes. …”
    Get full text
    Article
  2. 82

    Deep Learning Based DDoS Attack Detection by Xu Ziyi

    Published 2025-01-01
    “…Nowadays, one of the biggest risks to network security is Distributed Denial of Service (DDoS) assaults, which cause disruptions to services by flooding systems with malicious traffic. …”
    Get full text
    Article
  3. 83

    Network Packet Sniffer: A Case Study of Kabale University. by Mugarurebye, Shawn, Gumoshabe, Rebecca

    Published 2024
    “…As a fundamental procedure of network security measurement, network data collection executes real-time network monitoring, supports network performance evaluation, assists network billing, and helps traffic testing and filtering. …”
    Get full text
    Thesis
  4. 84

    DETECTING WEB-BASED BOTNETS USING A WEB PROXY AND A CONVOLUTIONAL NEURAL NETWORK by Trần Đắc Tốt, Phạm Tuấn Khiêm, Phạm Nguyễn Huy Phương

    Published 2020-09-01
    “…Botnets are increasingly becoming the most dangerous threats in the field of network security, and many different approaches to detecting attacks from botnets have been studied. …”
    Get full text
    Article
  5. 85
  6. 86
  7. 87

    IMPROVING INTRUSION DETECTION USING TREE ADJOINING GRAMMAR GUIDED GENETIC PROGRAMMING by Vũ Văn Cảnh, Hoàng Tuấn Hảo, Nguyễn Văn Hoàn

    Published 2017-09-01
    “…Nowadays, the problem of network security has become urgent and affect the performance of modern computer networks greatly. …”
    Get full text
    Article
  8. 88

    Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks by Madiha Khalid, Umar Mujahid, Muhammad Najam-ul-Islam

    Published 2018-08-01
    “…To reduce the overall cost of radio frequency identification enabled Internet of Thing network security, the researchers use simple bitwise logical operations such as XOR , AND , OR , and Rot and have proposed many ultralightweight mutual authentication protocols. …”
    Get full text
    Article
  9. 89

    Traffic Anomaly Detection Algorithm for Wireless Sensor Networks Based on Improved Exploitation of the GM(1,1) Model by Qin Yu, Jibin Lyu, Lirui Jiang, Longjiang Li

    Published 2016-07-01
    “…Because worms, attacks, intrusions, and other kinds of malicious behaviors can be recognized by traffic analysis and anomaly detection, WSN traffic anomaly detection provides useful tools for timely reaction and appropriate prevention in network security. In the paper, we improve exploitation of GM(1,1) model to make traffic prediction and judge the traffic anomaly in WSNs. …”
    Get full text
    Article
  10. 90

    Elevated few-shot network intrusion detection via self-attention mechanisms and iterative refinement. by Congyuan Xu, Yong Zhan, Guanghui Chen, Zhiqiang Wang, Siqing Liu, Weichen Hu

    Published 2025-01-01
    “…The network intrusion detection system (NIDS) plays a critical role in maintaining network security. However, traditional NIDS relies on a large volume of samples for training, which exhibits insufficient adaptability in rapidly changing network environments and complex attack methods, especially when facing novel and rare attacks. …”
    Get full text
    Article
  11. 91

    LKM: A LDA-Based -Means Clustering Algorithm for Data Analysis of Intrusion Detection in Mobile Sensor Networks by Yuhua Zhang, Kun Wang, Min Gao, Zhiyou Ouyang, Siguang Chen

    Published 2015-10-01
    “…Intrusion detection system (IDS) is a kind of active network security technology to protect network from attacks. …”
    Get full text
    Article
  12. 92

    An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data by Arjun Kumar Bose Arnob, M. F. Mridha, Mejdl Safran, Md Amiruzzaman, Md. Rajibul Islam

    Published 2025-02-01
    “…Abstract One of the widening perils in network security is the Distributed Denial of Service (DDoS) attacks on the Internet of Things (IoT) ecosystem. …”
    Get full text
    Article
  13. 93

    Wireless body area network: Architecture and security mechanism for healthcare using internet of things by Arun Kumar, Ritu Dewan, Wisam Subhi Al-Dayyeni, Bharat Bhushan, Jayant Giri, Sardar MN Islam, Ahmed Elaraby

    Published 2025-01-01
    “…The data generated by small sensor devices need strong security methods for secure transmission over a public network. Security of the data sent from source to destination is handled by transport layer security (TLS) protocol and prevent message loss or reordering. …”
    Get full text
    Article
  14. 94

    A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023 by Shalini Kumari, Chander Prabha, Asif Karim, Md. Mehedi Hassan, Sami Azam

    Published 2024-01-01
    “…AD is crucial for various applications, including network security, fraud detection, predictive maintenance, fault diagnosis, and industrial and healthcare monitoring. …”
    Get full text
    Article
  15. 95
  16. 96

    Enhancing the robustness of block ciphers through a graphical S-box evolution scheme for secure multimedia applications by Abdul Razaq, Muhammad Mahboob Ahsan, Hanan Alolaiyan, Musheer Ahmad, Qin Xin

    Published 2024-12-01
    “…Block ciphers are essential for the secure exchange of data and communication, as they are one of the primary components of network security systems. Modern-day block ciphers are most significantly reliant on substitution-boxes (S-boxes). …”
    Get full text
    Article
  17. 97

    A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity by Abdullah Al Siam, Moutaz Alazab, Albara Awajan, Nuruzzaman Faruqui

    Published 2025-01-01
    “…This study offers a comprehensive literature review on the role, effect, and future prospects of AI across five critical areas of cybersecurity: threat detection, endpoint security, phishing and fraud detection, network security, and adaptive authentication. The study examines contemporary developments in AI for cybersecurity, highlighting the use of these technologies to enhance security protocols. …”
    Get full text
    Article
  18. 98

    Intrusion detection using synaptic intelligent convolutional neural networks for dynamic Internet of Things environments by Hui Chen, Zhendong Wang, Shuxin Yang, Xiao Luo, Daojing He, Sammy Chan

    Published 2025-01-01
    “…The swift proliferation of IoT devices has brought about a multitude of complex cyberattacks that breach network security and compromise user privacy. To address these threats, this paper proposes a synaptic intelligent convolutional neural network (SICNN) model for intrusion detection in dynamic IoT environments. …”
    Get full text
    Article
  19. 99
  20. 100

    Transferability Evaluation in Wi-Fi Intrusion Detection Systems Through Machine Learning and Deep Learning Approaches by Saud Yonbawi, Adil Afzal, Muhammad Yasir, Muhammad Rizwan, Natalia Kryvinska

    Published 2025-01-01
    “…Intrusion Detection System (IDS) plays a pivotal role in safeguarding network security. The efficacy of these systems is rigorously assessed through established metrics including precision, recall, F1 score, and AUC score. …”
    Get full text
    Article