Showing 101 - 117 results of 117 for search '"network security"', query time: 0.08s Refine Results
  1. 101

    Network Intrusion Detection and Prevention System Using Hybrid Machine Learning with Supervised Ensemble Stacking Model by Godfrey A. Mills, Daniel K. Acquah, Robert A. Sowah

    Published 2024-01-01
    “…The detection performance of the proposed hybrid intrusion detection system suggests that it can be deployed in network security applications to detect packets that exhibit suspicious behaviour or indicate potential threats and respond appropriately to attacks. …”
    Get full text
    Article
  2. 102

    Research on power plant security issues monitoring and fault detection using attention based LSTM model by Shengda Wang, Zeng Dou, Danni Liu, Han Xu, Ji Du

    Published 2025-01-01
    “…This will help to successfully enhance the security and service quality of the power data communication network, effectively cope with network security threats in the new environment, and ensure the security of the power plant network access. …”
    Get full text
    Article
  3. 103

    A Survey on Event Tracking in Social Media Data Streams by Zixuan Han, Leilei Shi, Lu Liu, Liang Jiang, Jiawei Fang, Fanyuan Lin, Jinjuan Zhang, John Panneerselvam, Nick Antonopoulos

    Published 2024-03-01
    “…Event tracking in social networks finds various applications, such as network security and societal governance, which involves analyzing data generated by user groups on social networks in real time. …”
    Get full text
    Article
  4. 104

    MANAGING FRAUD IN CONTEMPORARY BUSINESS ENVIRONMENT, THE ROLE OF INFORMATION SECURITY MANAGEMENT: A STUDY OF QUOTED DEPOSIT MONEY BANKS (DMBs) IN NIGERIA by Onajero Kensington OHWO

    Published 2024-05-01
    “…Utilizing a regression model, the research examines three key proxies of information security management: Application Security Control (ASC), Access/Authentication Control (AAC), and Network Security Control (NSC) and one proxy (Fraud risk governance - FRG) for fraud risk management The model reveals that both ASC and AAC have significant positive effects on FRG, with coefficients of 0.216 and 0.247, respectively, while NSC, with a coefficient of 0.080, does not significantly influence FRG. …”
    Article
  5. 105

    Studi Empiris terhadap Kinerja & Keamanan Wifi (Studi Kasus di Kota Depok) by Ahmad Fajri

    Published 2019-12-01
    “…Therefore, performance assessment and wifi network security in Depok City are considered to be good in accordance with the IEEE 802.11i standard which is about increasing security on Wifi networks using WPA2 and 802.11b regarding wifi channel settings that do not cause interference. …”
    Get full text
    Article
  6. 106
  7. 107

    Evaluasi Manajemen Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) pada Jaringan (Studi Kasus: UIN Sunan Kalijaga Yogyakarta) by Rizki Dewantara, Bambang Sugiantoro

    Published 2021-11-01
    “…Abstract Attacks on networks today are very common, with more and more ways to access data and the development of technology used, they will certainly cause an increase in network security threats. Evaluation of information security management using the information security index (KAMI) conducted on the network at UIN Sunan Kalijaga Yogyakarta obtained an index result of 407, which is considered still not optimal. …”
    Get full text
    Article
  8. 108

    A Review on Blockchain Applications in Operational Technology for Food and Agriculture Critical Infrastructure by Chengliang Zheng, Xiangzhen Peng, Ziyue Wang, Tianyu Ma, Jiajia Lu, Leiyang Chen, Liang Dong, Long Wang, Xiaohui Cui, Zhidong Shen

    Published 2025-01-01
    “…Blockchain technology (BT) has emerged as a transformative solution for addressing these challenges by enhancing network security, traceability, and system resilience. …”
    Get full text
    Article
  9. 109

    Survei Penelitian Metode Kecerdasan Buatan untuk Mendeteksi Ancaman Teknologi Serangan Siber by Eza Yolanda Fitria, Kusprasapta Mutijarsa

    Published 2023-12-01
    “…The types of cyberattacks discussed in this study focus on attacks on the host system and the network security layer. In previous SLR research, these matters were discussed separately or even just one of them. …”
    Get full text
    Article
  10. 110

    Presenting the Model of Effective Factors on Smart Governance in the Country by Ghaem Gheiravani, Mohammad Montazeri, Shams Sadat Zahedi

    Published 2024-06-01
    “…In other words, equipment and infrastructure such as hardware, software, high-speed and secure internet, user-friendly designed websites and portals, resources such as sufficient financial and human resources, and most importantly securing this virtual space through the creation of functional ID, network security, design and the development of security laws, and finally the creation of mechanized databases in various fields and the formation of electronic statistics and information units in government organizations can help to provide a suitable platform for the establishment of smart governance in the country as effectively as possible.…”
    Get full text
    Article
  11. 111

    Review on Social Media and Digital Security by Amar Yahya Hussien

    Published 2022-07-01
    “…To address the challenge, this paper firstly made a survey on the state-of-the-art of social media networks security and trustworthiness particularly for the increasingly growing sophistication and variety of attacks as well as related intelligence applications. …”
    Get full text
    Article
  12. 112

    Secrecy Cognitive Gain of Cognitive Radio Sensor Networks with Primary Outage Constraint by Hongyu Ma, Kai Niu, Weiling Wu, Shengyu Li, Guangqian Chu

    Published 2015-06-01
    “…Then, the concept of secrecy cognitive gain is produced to highlight the effect of SR systems with secrecy on the whole networks security. Comparing with a single PR system, the SR system is beneficial to enhance the secrecy level for overlaid CRSNs. …”
    Get full text
    Article
  13. 113

    Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks by Walter Tiberti, Federica Caruso, Luigi Pomante, Marco Pugliese, Marco Santic, Fortunato Santucci

    Published 2020-10-01
    “…Among the various technical challenges addressed by more than one decade of research in wireless sensor networks, security across wireless links is by far one of the most critical ones and relates to the need of guaranteeing reliability and trustiness of the collected data. …”
    Get full text
    Article
  14. 114

    Lightweight load-balanced and authentication scheme for a cluster-based wireless sensor network by Jiliang Zhou, Ziqiang Lin

    Published 2021-02-01
    “…Therefore, this article effectively combines load balancing and security verification, and proposes a lightweight load balancing and verification scheme (secure load and energy balancing) based on clustered wireless sensor networks. Secure load and energy balancing implements cluster head’s authentication and confidentiality and integrity of all messages in load balancing. …”
    Get full text
    Article
  15. 115

    Application on Wireless Sensor Networks in Domestic and Hostile Environment by lu fan

    Published 2022-09-01
    “…WSNs are susceptible to many types of link layer attacks and most of traditional networks security techniques are unusable on WSNs  due to wireless and shared nature of communication channel, untrusted transmissions, deployment in open environments, unattended nature and limited resources. …”
    Get full text
    Article
  16. 116

    VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION by E. V. Batueva

    Published 2014-06-01
    “…The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. …”
    Get full text
    Article
  17. 117

    Enhanced Lightweight Quantum Key Distribution Protocol for Improved Efficiency and Security by Ashutosh Bhatia, Sainath Bitragunta, Kamlesh Tiwari

    Published 2025-01-01
    “…The proposed optimizations enhance post-processing efficiency and scalability, enabling practical deployment in bandwidth-limited environments like IoT networks, secure financial systems, and defense communications, thereby supporting broader adoption of quantum communication systems.…”
    Get full text
    Article