Showing 361 - 380 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))*', query time: 0.24s Refine Results
  1. 361
  2. 362
  3. 363

    Network-based intrusion detection using deep learning technique by Muhammad Farhan, Hafiz Waheed ud din, Saadat Ullah, Muhammad Sajjad Hussain, Muhammad Amir Khan, Tehseen Mazhar, Umar Farooq Khattak, Ines Hilali Jaghdam

    Published 2025-07-01
    “…These findings underscore the effectiveness of deep learning architectures enhanced with optimized feature selection in detecting network intrusions, making the proposed system a promising solution for securing critical infrastructure in sectors such as finance, healthcare, and government networks.…”
    Get full text
    Article
  4. 364

    Towards edge-collaborative, lightweight and privacy-preserving classification framework by Jinbo XIONG, Yongjie ZHOU, Renwan BI, Liang WAN, Youliang TIAN

    Published 2022-01-01
    “…Aiming at the problems of data leakage of perceptual image and computational inefficiency of privacy-preserving classification framework in edge-side computing environment, a lightweight and privacy-preserving classification framework (PPCF) was proposed to supports encryption feature extraction and classification, and achieve the goal of data transmission and computing security under the collaborative classification process of edge nodes.Firstly, a series of secure computing protocols were designed based on additive secret sharing.Furthermore, two non-collusive edge servers were used to perform secure convolution, secure batch normalization, secure activation, secure pooling and other deep neural network computing layers to realize PPCF.Theoretical and security analysis indicate that PPCF has excellent accuracy and proved to be security.Actual performance evaluation show that PPCF can achieve the same classification accuracy as plaintext environment.At the same time, compared with homomorphic encryption and multi-round iterative calculation schemes, PPCF has obvious advantages in terms of computational cost and communication overhead.…”
    Get full text
    Article
  5. 365
  6. 366

    (IoT) Network intrusion detection system using optimization algorithms by Luo Shan

    Published 2025-07-01
    “…Compared with traditional models like the Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) and Support Vector Machine (SVM), the proposed framework significantly improves the sensitivity and generalization ability for detecting various types of attacks through dynamic feature selection and parameter optimization. …”
    Get full text
    Article
  7. 367
  8. 368
  9. 369
  10. 370
  11. 371
  12. 372
  13. 373
  14. 374

    Anomaly detection in encrypted network traffic using self-supervised learning by Sadaf Sattar, Shumaila Khan, Muhammad Ismail Khan, Ainur Akhmediyarova, Orken Mamyrbayev, Dinara Kassymova, Dina Oralbekova, Janna Alimkulova

    Published 2025-07-01
    “…Abstract Privacy and security in network communication have been enhanced via encryption and traditional anomaly detection methods are no longer effective because of their payload inspection. …”
    Get full text
    Article
  15. 375
  16. 376
  17. 377

    Explainable AI for Lightweight Network Traffic Classification Using Depthwise Separable Convolutions by Mustafa Ghaleb, Mosab Hamdan, Abdulaziz Y. Barnawi, Muhammad Gambo, Abubakar Danasabe, Saheed Bello, Aliyu Habib

    Published 2025-01-01
    “…With the rapid growth of internet usage and the increasing number of connected devices, there is a critical need for advanced Network Traffic Classification (NTC) solutions to ensure optimal performance and robust security. …”
    Get full text
    Article
  18. 378
  19. 379

    Research on power data security full-link monitoring technology based on alternative evolutionary graph neural architecture search and multimodal data fusion by Zhenwan Zou, Bin Wang, Tao Chen, Jia Chen

    Published 2025-06-01
    “…The current evolutionary graph neural architecture search (GNAS) method mainly focuses on the topological connection and feature fusion between network layers, but it often requires a lot of computing resources, and the real-time performance of the GNN (graph neural network) model is difficult to meet the requirements when facing dynamic attacks and changing data. …”
    Get full text
    Article
  20. 380