Showing 341 - 360 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))*', query time: 0.22s Refine Results
  1. 341
  2. 342
  3. 343

    Assessment methodology for security of an automated control system of critical information infrastructure against DDoS attacks based on Monte Carlo simulation by V. A. Voevodin, V. S. Chernyaev, D. S. Burenok, I. V. Vinogradov

    Published 2023-05-01
    “…A possible direction for further research is to study the issue of computer network security, taking into account the features of a specific topology.…”
    Get full text
    Article
  4. 344
  5. 345

    Echoes From the Void: Detecting DNS Tunneling With Blackhole Features in Encrypted Scenarios With High Accuracy by Wafa S. Alorainy

    Published 2025-01-01
    “…Integration within existing security information and event management (SIEM) systems or DNS infrastructures implies API compatibility, scaling for heterogeneous networks, and minimizing the disruption of established workflow. …”
    Get full text
    Article
  6. 346

    Lightweight Blockchain for Data Integrity and Traceability in IoT Networks by Laura Garcia, Carlos Cancimance, Rafael Asorey-Cacheda, Claudia-Liliana Zuniga-Canon, Antonio-Javier Garcia-Sanchez, Joan Garcia-Haro

    Published 2025-01-01
    “…In this regard, blockchain is a promising solution to enhance IoT security, but the implementation of a conventional blockchain requires high computational and network connectivity resources that are not compatible with IoT networks. …”
    Get full text
    Article
  7. 347

    Chaos-based audio encryption: Efficacy of 2D and 3D hyperchaotic systems by Thejas Haridas, Upasana S.D., Vyshnavi G., Malavika S. Krishnan, Sishu Shankar Muni

    Published 2024-09-01
    “…Secure communication in the digital age is necessary; securing audio data becomes very critical since this is normally transmitted across susceptible networks. …”
    Get full text
    Article
  8. 348

    An IoT intrusion detection framework based on feature selection and large language models fine-tuning by Huan Ma, Wan Zhang, Dalong Zhang, Baozhan Chen

    Published 2025-07-01
    “…Abstract The rapid proliferation of Internet of Things (IoT) devices has significantly expanded the network attack surface, necessitating the deployment of advanced AI (artificial intelligence)-based intrusion detection systems (IDS) to bolster IoT security. …”
    Get full text
    Article
  9. 349
  10. 350
  11. 351
  12. 352

    Towards a Scalable and Adaptive Learning Approach for Network Intrusion Detection by Alebachew Chiche, Million Meshesha

    Published 2021-01-01
    “…Therefore, security experts are recommended to integrate intrusion detection in their network and computer systems, not only for well-being of their computer systems but also for the sake of improving their working process.…”
    Get full text
    Article
  13. 353

    A Survey for Blockchain-Enabled Resource Management in Edge Networks by Sharon A. Boamah, Jean D. Louis, Janise McNair, Juan E. Gilbert

    Published 2025-01-01
    “…Blockchain, with its growing popularity, presents itself as a potential solution. The inherent features of blockchain, such as decentralization, transparency, security, and immutability, make it possible for network providers to manage network resources efficiently. …”
    Get full text
    Article
  14. 354

    Cancelable speaker identification system for the handicapped access to healthcare networks by Samia A. El-Moneim Kabel, Walid El-Shafai, Naglaa F. Soliman, Reem Alkanhel, Fathi E. Abd El-Samie

    Published 2025-07-01
    “…While these results demonstrate the potential effectiveness of the framework for securing networks through cancelable biometrics and fast processing time, the study does not include an evaluation of computational complexity and scalability in resource-constrained IoT environments. …”
    Get full text
    Article
  15. 355
  16. 356

    Energy-Efficient Secure Cell-Free Massive MIMO for Internet of Things: A Hybrid CNN–LSTM-Based Deep-Learning Approach by Ali Vaziri, Pardis Sadatian Moghaddam, Mehrdad Shoeibi, Masoud Kaveh

    Published 2025-04-01
    “…However, the increasing demand for high-performance wireless networks necessitates advanced frameworks that optimize both energy efficiency (EE) and security. …”
    Get full text
    Article
  17. 357
  18. 358
  19. 359

    Metode Deteksi Intrusi Menggunakan Algoritme Extreme Learning Machine dengan Correlation-based Feature Selection by Sulandri Sulandri, Achmad Basuki, Fitra Abdurrachman Bachtiar

    Published 2021-02-01
    “…Abstract Intrusion detection of computer networks is a very important activity carried out to maintain data and information security. …”
    Get full text
    Article
  20. 360