-
1
Wireless and Mobile Networks: Security and Privacy Issues
Published 2017-01-01Get full text
Article -
2
FWA-SVM Network Intrusion Identification Technology for Network Security
Published 2025-01-01Subjects: Get full text
Article -
3
Optimal Management of Computer Network Security in the Era of Big Data
Published 2022-01-01Get full text
Article -
4
Integrating PCA and DEA techniques for strategic assessment of network security
Published 2023-03-01Subjects: Get full text
Article -
5
Improving Network Security: An Intelligent IDS with RNN-LSTM and Grey Wolf Optimization
Published 2024-12-01“…The architecture of this RNN-LSTM with GWO IDS provides capable and responsive intrusion detection, training on previous data to be able to detect new threats. Made for network security by combining deep learning and optimization, tests reached 99.5% accurate. …”
Get full text
Article -
6
Enhancing IoT Network Security Through Digital Object Architecture-Based Approaches
Published 2024-03-01Get full text
Article -
7
5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach
Published 2025-01-01“…This paper presents a new security mitigation model using artificial neural network (ANN) with interpretive structure modeling (ISM) to improve the 5G network security system. The main goal of this study is to develop a 5G network security mitigation model (5GN-SMM) that leverages the predictive capabilities of ANN and the analysis of ISM to identify and mitigate security threats by providing practices in 5G networks. …”
Get full text
Article -
8
A Quantitative Risk Evaluation Model for Network Security Based on Body Temperature
Published 2016-01-01“…These days, in allusion to the traditional network security risk evaluation model, which have certain limitations for real-time, accuracy, characterization. …”
Get full text
Article -
9
-
10
Adaptive Conflict-Free Optimization of Rule Sets for Network Security Packet Filtering Devices
Published 2015-01-01Get full text
Article -
11
Improved Population Intelligence Algorithm and BP Neural Network for Network Security Posture Prediction
Published 2023-01-01“…To address the problems of low prediction accuracy and slow convergence of the network security posture prediction model, a population intelligence optimization algorithm is proposed to improve the network security posture prediction model of the BP neural network. …”
Get full text
Article -
12
Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
Published 2022-01-01“…In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. …”
Get full text
Article -
13
Charging wireless sensor network security technology based on encryption algorithms and dynamic model
Published 2020-02-01“…Wireless networks cover all aspects of life, along with it, network security issues have gradually emerged. In recent years, network security vulnerabilities have been exposed continuously, from WiFi to Bluetooth, people gradually realize the security of wireless networks. …”
Get full text
Article -
14
A Topology Visualization Early Warning Distribution Algorithm for Large-Scale Network Security Incidents
Published 2013-01-01“…It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system’s emergency response capabilities, alleviate the cyber attacks’ damage, and strengthen the system’s counterattack ability. …”
Get full text
Article -
15
Optimal Joint Defense and Monitoring for Networks Security under Uncertainty: A POMDP-Based Approach
Published 2024-01-01“…To address these challenges, this paper proposes a partially observable Markov decision process (POMDP) model for network security under uncertainty. The POMDP model accounts for uncertainty in monitoring and defense processes, as well as the probabilistic attack propagation. …”
Get full text
Article -
16
-
17
Is low‐rate distributed denial of service a great threat to the Internet?
Published 2021-09-01Subjects: Get full text
Article -
18
Intelligent classification of computer vulnerabilities and network security management system: Combining memristor neural network and improved TCNN model.
Published 2025-01-01“…To enhance the intelligent classification of computer vulnerabilities and improve the efficiency and accuracy of network security management, this study delves into the application of a comprehensive classification system that integrates the Memristor Neural Network (MNN) and an improved Temporal Convolutional Neural Network (TCNN) in network security management. …”
Get full text
Article -
19
A two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network security
Published 2025-01-01“…Abstract Adversarial attacks were commonly considered in computer vision (CV), but their effect on network security apps rests in the field of open investigation. …”
Get full text
Article -
20
Evaluation of Network Security Service Provider Using 2-Tuple Linguistic Complex q-Rung Orthopair Fuzzy COPRAS Method
Published 2022-01-01“…In recent years, network security has become a major concern. Using the Internet to store and analyze data has become an integral aspect of the production and operation of many new and traditional enterprises. …”
Get full text
Article