-
201
Augmenting cybersecurity through attention based stacked autoencoder with optimization algorithm for detection and mitigation of attacks on IoT assisted networks
Published 2024-12-01“…The IoT network’s security can progressively become a critical concern as IoT technology obtains extensive use. …”
Get full text
Article -
202
Zero-day exploits detection with adaptive WavePCA-Autoencoder (AWPA) adaptive hybrid exploit detection network (AHEDNet)
Published 2025-02-01“…Additionally, a novel “Meta-Attention Transformer Autoencoder (MATA)” for enhancing feature extraction which address the subtlety issue, and improves the model’s ability and flexibility to detect new security threats, and a novel “Genetic Mongoose-Chameleon Optimization (GMCO)” was introduced for effective feature selection in the case of addressing the efficiency challenges. …”
Get full text
Article -
203
A novel integration of multi-stocked gated variant recurrent units and Kolmogorov-Arnold tuned deep training networks for anchoring the intrusion detection against computer attacks
Published 2025-07-01“…Abstract With the explosive expansion of smart computers, there is a rapid intrusion of network attacks in the user’s personal life that intensifies the privacy and security breaches. …”
Get full text
Article -
204
-
205
-
206
Pseudo-Random Identification and Efficient Privacy-Preserving V2X Communication for IoV Networks
Published 2025-01-01Get full text
Article -
207
X-FuseRLSTM: A Cross-Domain Explainable Intrusion Detection Framework in IoT Using the Attention-Guided Dual-Path Feature Fusion and Residual LSTM
Published 2025-06-01“…The suggested method is appropriate for practical IoT security applications since it provides strong domain generalization and explainability while preserving computational efficiency.…”
Get full text
Article -
208
-
209
-
210
Protecting Industrial Control Systems From Shodan Exploitation Through Advanced Traffic Analysis
Published 2025-01-01Get full text
Article -
211
A novel speaker verification approach featuring multidomain acoustics based on the weighted city-block Minkowski distance
Published 2025-04-01“…Access control is vital in interconnected environments like the Internet of Things, Industry 4.0, and smart connectivity, ensuring authorized access for security. Biometric-based access, particularly speaker verification (SV), enhances security with unique vocal features, offering nonintrusive authenti-cation with continuous monitoring. …”
Get full text
Article -
212
-
213
-
214
A comprehensive survey on techniques, challenges, evaluation metrics and applications of deep learning models for anomaly detection
Published 2025-07-01“…Abstract Connected devices improve life quality and generate a large amount of data which require computation and transfer; the need for security becomes a major concern with networks evolving in complexity and scale. …”
Get full text
Article -
215
-
216
-
217
-
218
Smart Grid Security: Proactive Prediction of Advanced Persistent Threats
Published 2025-05-01Get full text
Article -
219
A speech-based convolutional neural network for human body posture classification
Published 2024-10-01Get full text
Article -
220
FD-IDS: Federated Learning with Knowledge Distillation for Intrusion Detection in Non-IID IoT Environments
Published 2025-07-01Get full text
Article