Showing 1 - 20 results of 117 for search '"network security"', query time: 0.11s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Improving Network Security: An Intelligent IDS with RNN-LSTM and Grey Wolf Optimization by murtadha ali

    Published 2024-12-01
    “…The architecture of this RNN-LSTM with GWO IDS provides capable and responsive intrusion detection, training on previous data to be able to detect new threats. Made for network security by combining deep learning and optimization, tests reached 99.5% accurate. …”
    Get full text
    Article
  6. 6
  7. 7

    5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach by Rafiq Ahmad Khan, Habib Ullah Khan, Hathal Salamah Alwageed, Hussein Al Hashimi, Ismail Keshta

    Published 2025-01-01
    “…This paper presents a new security mitigation model using artificial neural network (ANN) with interpretive structure modeling (ISM) to improve the 5G network security system. The main goal of this study is to develop a 5G network security mitigation model (5GN-SMM) that leverages the predictive capabilities of ANN and the analysis of ISM to identify and mitigate security threats by providing practices in 5G networks. …”
    Get full text
    Article
  8. 8

    A Quantitative Risk Evaluation Model for Network Security Based on Body Temperature by Y. P. Jiang, C. C. Cao, X. Mei, H. Guo

    Published 2016-01-01
    “…These days, in allusion to the traditional network security risk evaluation model, which have certain limitations for real-time, accuracy, characterization. …”
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Improved Population Intelligence Algorithm and BP Neural Network for Network Security Posture Prediction by Yueying Li, Feng Wu

    Published 2023-01-01
    “…To address the problems of low prediction accuracy and slow convergence of the network security posture prediction model, a population intelligence optimization algorithm is proposed to improve the network security posture prediction model of the BP neural network. …”
    Get full text
    Article
  12. 12

    Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology by Xiaokun Zheng

    Published 2022-01-01
    “…In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. …”
    Get full text
    Article
  13. 13

    Charging wireless sensor network security technology based on encryption algorithms and dynamic model by Yuanming Li, Wei Guo, Xuejun Meng, Wen Xia

    Published 2020-02-01
    “…Wireless networks cover all aspects of life, along with it, network security issues have gradually emerged. In recent years, network security vulnerabilities have been exposed continuously, from WiFi to Bluetooth, people gradually realize the security of wireless networks. …”
    Get full text
    Article
  14. 14

    A Topology Visualization Early Warning Distribution Algorithm for Large-Scale Network Security Incidents by Hui He, Guotao Fan, Jianwei Ye, Weizhe Zhang

    Published 2013-01-01
    “…It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system’s emergency response capabilities, alleviate the cyber attacks’ damage, and strengthen the system’s counterattack ability. …”
    Get full text
    Article
  15. 15

    Optimal Joint Defense and Monitoring for Networks Security under Uncertainty: A POMDP-Based Approach by Armita Kazeminajafabadi, Mahdi Imani

    Published 2024-01-01
    “…To address these challenges, this paper proposes a partially observable Markov decision process (POMDP) model for network security under uncertainty. The POMDP model accounts for uncertainty in monitoring and defense processes, as well as the probabilistic attack propagation. …”
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    Intelligent classification of computer vulnerabilities and network security management system: Combining memristor neural network and improved TCNN model. by Zhenhui Liu

    Published 2025-01-01
    “…To enhance the intelligent classification of computer vulnerabilities and improve the efficiency and accuracy of network security management, this study delves into the application of a comprehensive classification system that integrates the Memristor Neural Network (MNN) and an improved Temporal Convolutional Neural Network (TCNN) in network security management. …”
    Get full text
    Article
  19. 19

    A two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network security by Kashi Sai Prasad, P Udayakumar, E. Laxmi Lydia, Mohammed Altaf Ahmed, Mohamad Khairi Ishak, Faten Khalid Karim, Samih M. Mostafa

    Published 2025-01-01
    “…Abstract Adversarial attacks were commonly considered in computer vision (CV), but their effect on network security apps rests in the field of open investigation. …”
    Get full text
    Article
  20. 20

    Evaluation of Network Security Service Provider Using 2-Tuple Linguistic Complex q-Rung Orthopair Fuzzy COPRAS Method by Sumera Naz, Muhammad Akram, Mohammed M. Ali Al-Shamiri, Muhammad Ramzan Saeed

    Published 2022-01-01
    “…In recent years, network security has become a major concern. Using the Internet to store and analyze data has become an integral aspect of the production and operation of many new and traditional enterprises. …”
    Get full text
    Article