Showing 201 - 220 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))*', query time: 0.27s Refine Results
  1. 201
  2. 202

    Zero-day exploits detection with adaptive WavePCA-Autoencoder (AWPA) adaptive hybrid exploit detection network (AHEDNet) by Ahmed A. Mohamed, Abdullah Al-Saleh, Sunil Kumar Sharma, Ghanshyam G. Tejani

    Published 2025-02-01
    “…Additionally, a novel “Meta-Attention Transformer Autoencoder (MATA)” for enhancing feature extraction which address the subtlety issue, and improves the model’s ability and flexibility to detect new security threats, and a novel “Genetic Mongoose-Chameleon Optimization (GMCO)” was introduced for effective feature selection in the case of addressing the efficiency challenges. …”
    Get full text
    Article
  3. 203

    A novel integration of multi-stocked gated variant recurrent units and Kolmogorov-Arnold tuned deep training networks for anchoring the intrusion detection against computer attacks by M. Saritha, Saidireddy Malgireddy

    Published 2025-07-01
    “…Abstract With the explosive expansion of smart computers, there is a rapid intrusion of network attacks in the user’s personal life that intensifies the privacy and security breaches. …”
    Get full text
    Article
  4. 204
  5. 205
  6. 206
  7. 207

    X-FuseRLSTM: A Cross-Domain Explainable Intrusion Detection Framework in IoT Using the Attention-Guided Dual-Path Feature Fusion and Residual LSTM by Adel Alabbadi, Fuad Bajaber

    Published 2025-06-01
    “…The suggested method is appropriate for practical IoT security applications since it provides strong domain generalization and explainability while preserving computational efficiency.…”
    Get full text
    Article
  8. 208
  9. 209
  10. 210
  11. 211

    A novel speaker verification approach featuring multidomain acoustics based on the weighted city-block Minkowski distance by Khushboo Jha, Sumit Srivastava, Aruna Jain

    Published 2025-04-01
    “…Access control is vital in interconnected environments like the Internet of Things, Industry 4.0, and smart connectivity, ensuring authorized access for security. Biometric-based access, particularly speaker verification (SV), enhances security with unique vocal features, offering nonintrusive authenti-cation with continuous monitoring. …”
    Get full text
    Article
  12. 212
  13. 213
  14. 214

    A comprehensive survey on techniques, challenges, evaluation metrics and applications of deep learning models for anomaly detection by Mudita Kohli, Indu Chhabra

    Published 2025-07-01
    “…Abstract Connected devices improve life quality and generate a large amount of data which require computation and transfer; the need for security becomes a major concern with networks evolving in complexity and scale. …”
    Get full text
    Article
  15. 215
  16. 216
  17. 217
  18. 218
  19. 219
  20. 220