Showing 1 - 20 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))*', query time: 0.27s Refine Results
  1. 1
  2. 2

    An optimization model of computer network security based on GABP neural network algorithm by Jiangang Wang, Xiaoyan Wang

    Published 2025-04-01
    “…Abstract Background Digital connectivity drives global innovation, ensuring computer network security is more critical than ever. …”
    Get full text
    Article
  3. 3
  4. 4

    Analysis of features of implementing a “Port scanning” attack using a “Zombie” computer by N. V. Boldyrikhin, M. V. Karpenko, I. A. Sosnovsky, E. A. Yadrets

    Published 2024-07-01
    “…Analyze the implementation features of a “Port scanning” attack using a “Zombie” computer to hide the IP address of the attacking machine.Method. …”
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    A Lightweight Intrusion Detection System with Dynamic Feature Fusion Federated Learning for Vehicular Network Security by Junjun Li, Yanyan Ma, Jiahui Bai, Congming Chen, Tingting Xu, Chi Ding

    Published 2025-07-01
    “…The rapid integration of complex sensors and electronic control units (ECUs) in autonomous vehicles significantly increases cybersecurity risks in vehicular networks. Although the Controller Area Network (CAN) is efficient, it lacks inherent security mechanisms and is vulnerable to various network attacks. …”
    Get full text
    Article
  8. 8

    Towards edge-collaborative,lightweight and secure region proposal network by Jinbo XIONG, Renwan BI, Qianxin CHEN, Ximeng LIU

    Published 2020-10-01
    “…Aiming at the problem of image privacy leakage and computing efficiency in edge environment,a lightweight and secure region proposal network (SecRPN) was proposed.A series of secure computing protocols were designed based on the additive secret sharing scheme.Two non-collusive edge servers cooperate to perform calculation modules such as secure feature processing,secure anchor transformation,secure bounding-box correction,and secure non-maximum suppression.Theoretical analysis guarantees the correctness and security of SecRPN.The actual performance evaluation shows that SecRPN is outstanding in the computational cost and communication overhead compared with the existing works.…”
    Get full text
    Article
  9. 9
  10. 10

    Intelligent intrusion detection system based on crowd search optimization for attack classification in network security by Chetan Gupta, Amit Kumar, Neelesh Kumar Jain

    Published 2025-07-01
    “…We have developed the hybrid model based on crow search optimization (CSO) and random forest (RF) algorithm for identifying threats and irregularities in a computer network. In comparison to the various state-of-the-art classifiers, the CSO method was applied to the NSL-KDD dataset and the ROSPaCe dataset for the detection of the attacks. …”
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Intrusion Detection-Data Security Protection Scheme Based on Particle Swarm-BP Network Algorithm in Cloud Computing Environment by Zhun Wang, Xue Chen

    Published 2023-01-01
    “…Aiming at the problems of low detection rate and high false detection rate of intrusion detection algorithms in the traditional cloud computing environment, an intrusion detection-data security protection scheme based on particle swarm-BP network algorithm in a cloud computing environment is proposed. …”
    Get full text
    Article
  14. 14

    Network Security Situational Awareness Based on Improved Particle Swarm Algorithm and Bidirectional Long Short-Term Memory Modeling by Peng Zheng, Yun Cheng, Wei Zhu, Bo Liu, Shuhong Liu, Shijie Wang, Jinyin Bai

    Published 2025-02-01
    “…This indicates a high level of recognition and precision exhibited by the proposed model in detecting network security risk behaviors. Furthermore, in contrast to the traditional CNN neural network, the proposed model is more compact, which significantly reduces the computational overhead and allows for efficient network security situational awareness.…”
    Get full text
    Article
  15. 15

    Research on cloud computing users’ public safety trust model based on scorecard-random forest by Shengli ZHOU, Canghong JIN, Lifa WU, Zheng HONG

    Published 2018-05-01
    “…Traditional cloud computing trust models mainly focused on the calculation of the trust of users’ behavior.In the process of classification and evaluation,there were some problems such as ignorance of content security and lack of trust division verification.Aiming to solve these problems,cloud computing users’ public safety trust model based on scorecard-random forest was proposed.Firstly,the text was processed using Word2Vec in the data preprocessing stage.The convolution neural network (CNN) was used to extract the sentence features for user content tag classification.Then,scorecard method was used to filter the strong correlation index.Meanwhile,in order to establish the users’ public safety trust evaluation model in cloud computing,a random forest method was applied.Experimental results show that the proposed users’ public safety trust evaluation model outperforms the general trust evaluation model.The proposed model can effectively distinguish malicious users from normal users,and it can improve the efficiency of the cloud computing users management.…”
    Get full text
    Article
  16. 16
  17. 17

    Anomaly Detection Approach Based on Deep Neural Network and Dropout by Zaid Hussien et al.

    Published 2020-06-01
    “…Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. …”
    Get full text
    Article
  18. 18

    Survey on data security and privacy-preserving for the research of edge computing by Jiale ZHANG, Yanchao ZHAO, Bing CHEN, Feng HU, Kun ZHU

    Published 2018-03-01
    “…With the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve such dilemma,the edge computing which deploys the cloud services in the edge network has envisioned to be the dominant cloud service paradigm in the era of IoT.Meanwhile,the unique features of edge computing,such as content perception,real-time computing,parallel processing and etc.…”
    Get full text
    Article
  19. 19

    Applications of big data cognitive computing in content security governance by Xuetao DU

    Published 2021-11-01
    “…In the communication network, there is a mass of bad information needed to be read and understood to extract useful knowledge and features for governance.Methods based on manual analysis can not achieve this goal.It is necessary to adopt the big-data-based cognitive computing technology to help to understand massive data and customize content security strategies.Aiming at four practical problems including telecommunication fraud governance, bad message governance, variant message governance and bad website governance, the big data cognitive computing solutions were put forward, and the practical results were given.The results show that the solutions could find the bad information quickly, and improve the quality of the content security governance effectively.…”
    Get full text
    Article
  20. 20