Showing 261 - 280 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))*', query time: 0.18s Refine Results
  1. 261

    Overview of detection techniques for malicious social bots by Rong LIU, Bo CHEN, Ling YU, Ya-shang LIU, Si-yuan CHEN

    Published 2017-11-01
    “…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
    Get full text
    Article
  2. 262
  3. 263

    Machine learning based intrusion detection framework for detecting security attacks in internet of things by V. Kantharaju, H. Suresh, M. Niranjanamurthy, Syed Immamul Ansarullah, Farhan Amin, Amerah Alabrah

    Published 2024-12-01
    “…Thus, to solve this issue, herein, we propose an advance Intrusion detection framework using Self-Attention Progressive Generative Adversarial Network (SAPGAN) framework for detecting security threats in IoT networks. …”
    Get full text
    Article
  4. 264
  5. 265
  6. 266

    Design of an iterative method for disease prediction in finger millet leaves using graph networks, dyna networks, autoencoders, and recurrent neural networks by Shailendra Tiwari, Anita Gehlot, Rajesh Singh, Bhekisipho Twala, Neeraj Priyadarshi

    Published 2024-12-01
    “…This work proposes a comprehensive framework for detection and prediction of the disease in Finger Millet leaves using a combination of Graph Networks, Dyna Networks, Autoencoders, and Recurrent Neural Networks. …”
    Get full text
    Article
  7. 267
  8. 268

    Securing IoT-Cloud Applications with AQ-KGMO-DMG Enhanced SVM for Intrusion Detection by Konduru Siva Naga Narasimharao, P. V. Lakshmi

    Published 2025-02-01
    “…Intrusion detection, as a cornerstone of information security, plays a pivotal role in fortifying networks against potential threats, emphasizing the necessity for robust and reliable methods capable of discerning and mitigating network vulnerabilities effectively. …”
    Get full text
    Article
  9. 269
  10. 270

    Deep Complex Gated Recurrent Networks-Based IoT Network Intrusion Detection Systems by Engy El-Shafeiy, Walaa M. Elsayed, Haitham Elwahsh, Maazen Alsabaan, Mohamed I. Ibrahem, Gamal Farouk Elhady

    Published 2024-09-01
    “…Convolutional neural networks (CNN) are used for spatial feature extraction and superfluous data are filtered to improve computing efficiency. …”
    Get full text
    Article
  11. 271

    Improvement of the Regulatory Framework of Information Security for Terminal Access Devices of the State Information System by V. A. Sizov, D. M. Malinichev, V. V. Mochalov

    Published 2020-04-01
    “…Such diversity and heterogeneity of state information systems, on the one hand, and the need for high-quality state regulation in the field of information security in these systems, on the other hand, require the study and development of legal acts that take into account primarily the features of systems that have a typical modern architecture of “thin customer". …”
    Get full text
    Article
  12. 272

    A secure and efficient deep learning-based intrusion detection framework for the internet of vehicles by Hasim Khan, Ghanshyam G. Tejani, Rayed AlGhamdi, Sultan Alasmari, Naveen Kumar Sharma, Sunil Kumar Sharma

    Published 2025-04-01
    “…Vision Transformer (ViT), wavelet transforms, and GAT ensure effective feature extraction, and a novel hybrid optimization known as Crayfish-Mother secure Optimization (CMSO) method is proposed to optimize feature selection to its maximum and reduce computational cost. …”
    Get full text
    Article
  13. 273
  14. 274

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  15. 275

    Security-Enhanced Lightweight Authentication Key-Agreement Protocol for Unmanned Aerial Vehicle Communication by Zhoucan He, Yilong Zheng, Sisi Chen, Zhongze Du, Shuyuan Liu, Kailong Zhang

    Published 2025-04-01
    “…Unmanned aerial vehicles have been widely employed in recent years owing to their remarkable features such as low environmental requirements and high survivability, and a new tendency towards networking, intelligence, and collaboration has emerged. …”
    Get full text
    Article
  16. 276

    Edge computing privacy protection method based on blockchain and federated learning by Chen FANG, Yuanbo GUO, Yifeng WANG, Yongjin HU, Jiali MA, Han ZHANG, Yangyang HU

    Published 2021-11-01
    “…Aiming at the needs of edge computing for data privacy, the correctness of calculation results and the auditability of data processing, a privacy protection method for edge computing based on blockchain and federated learning was proposed, which can realize collaborative training with multiple devices at the edge of the network without a trusted environment and special hardware facilities.The blockchain was used to endow the edge computing with features such as tamper-proof and resistance to single-point-of-failure attacks, and the gradient verification and incentive mechanism were incorporated into the consensus protocol to encourage more local devices to honestly contribute computing power and data to the federated learning.For the potential privacy leakage problems caused by sharing model parameters, an adaptive differential privacy mechanism was designed to protect parameter privacy while reducing the impact of noise on the model accuracy, and moments accountant was used to accurately track the privacy loss during the training process.Experimental results show that the proposed method can resist 30% of poisoning attacks, and can achieve privacy protection with high model accuracy, and is suitable for edge computing scenarios that require high level of security and accuracy.…”
    Get full text
    Article
  17. 277
  18. 278
  19. 279
  20. 280

    Design of an integrated model using deep reinforcement learning and Variational Autoencoders for enhanced quantum security by Harshala Shingne, Diptee Chikmurge, Priya Parkhi, Poorva Agrawal

    Published 2025-12-01
    “…Finally, it considers the optimization of cryptographic protocols in a distributed quantum network using Multi-Agent Deep Q-Networks. This multi-agent system strengthens both the security and computational efficiency by reducing attack vulnerabilities by 15–18 % and lowering the computational complexity by 20–25 %. …”
    Get full text
    Article