Showing 181 - 200 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))*', query time: 0.16s Refine Results
  1. 181
  2. 182
  3. 183
  4. 184
  5. 185
  6. 186

    Leveraging explainable artificial intelligence for early detection and mitigation of cyber threat in large-scale network environments by G. Nalinipriya, S. Rama Sree, K. Radhika, E. Laxmi Lydia, Faten Khalid Karim, Mohamad Khairi Ishak, Samih M. Mostafa

    Published 2025-07-01
    “…The Mayfly Optimization Algorithm (MOA) is then utilized for feature selection, effectively mitigating computational complexity. …”
    Get full text
    Article
  7. 187

    Deep Learning Network Selection and Optimized Information Fusion for Enhanced COVID-19 Detection: A Literature Review by Olga Adriana Caliman Sturdza, Florin Filip, Monica Terteliu Baitan, Mihai Dimian

    Published 2025-07-01
    “…The rapid spread of COVID-19 increased the need for speedy diagnostic tools, which led scientists to conduct extensive research on deep learning (DL) applications that use chest imaging, such as chest X-ray (CXR) and computed tomography (CT). This review examines the development and performance of DL architectures, notably convolutional neural networks (CNNs) and emerging vision transformers (ViTs), in identifying COVID-19-related lung abnormalities. …”
    Get full text
    Article
  8. 188
  9. 189

    Optimizing Fingerprint Identification: CNNs With Raw Images Versus Handcrafted Features for Real-Time Systems by Shaik Salma, Tauheed Ahmed, Garimella Ramamurthy

    Published 2025-01-01
    “…This study investigates the balance between accuracy and computational efficiency(thereby speed) by comparing two approaches: training a Convolutional Neural Network (CNN) with raw fingerprint images and training a CNN using handcrafted fingerprint features. …”
    Get full text
    Article
  10. 190
  11. 191
  12. 192
  13. 193
  14. 194
  15. 195
  16. 196
  17. 197

    Information Security and Artificial Intelligence–Assisted Diagnosis in an Internet of Medical Thing System (IoMTS) by Pi-Yun Chen, Yu-Cheng Cheng, Zi-Heng Zhong, Feng-Zhou Zhang, Neng-Sheng Pai, Chien-Ming Li, Chia-Hung Lin

    Published 2024-01-01
    “…The internet of medical thing system (IoMTS) comprises the fifth-generation (5G) networking technology that collects and shares digital data from signal- or image-capturing devices through computer and wireless communication networks. …”
    Get full text
    Article
  18. 198

    A Malware Detection Method Based on Genetic Algorithm Optimized CNN-SENet Network by Zheng Yang, Hua Zhu, Zhao Li, Gang Wang, Meng Su

    Published 2024-01-01
    “…To this end, this paper proposes a malware detection method based on genetic algorithm optimization of the CNN-SENet network, which firstly introduces the SENet attention mechanism into the convolutional neural network to enhance the spatial feature extraction capability of the model; then, the application programming interface (API) sequences corresponding to different software behaviors are processed by segmentation and de-duplication, which in turn leads to the sequence feature extraction through the CNN-SENet model; finally, genetic algorithm is used to optimize the hyperparameters of CNN-SENet network to reduce the computational overhead of CNN and to achieve the recognition and classification of different malware at the output layer. …”
    Get full text
    Article
  19. 199
  20. 200

    Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network by Weicheng QIU, Xiuzhen CHEN, Yinghua MA, Jin MA, Zhihong ZHOU

    Published 2023-08-01
    “…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
    Get full text
    Article