-
381
Trust Model for Underwater Wireless Sensor Networks Based on Variational Autoencoders
Published 2025-04-01Get full text
Article -
382
Adap-UIL: A Multi-Feature-Aware User Identity Linkage Framework Based on an Adaptive Graph Walk
Published 2025-06-01Get full text
Article -
383
Wireless Body Area Networks for Healthcare Applications: Protocol Stack Review
Published 2015-10-01Get full text
Article -
384
Intrusion detection in software defined network using deep learning approaches
Published 2024-11-01Get full text
Article -
385
Enhancing IDS for the IoMT based on advanced features selection and deep learning methods to increase the model trustworthiness.
Published 2025-01-01“…Finally, a deep neural network (DNN) classifies traffic as normal or anomalous. …”
Get full text
Article -
386
Network Intrusion Detection Using Knapsack Optimization, Mutual Information Gain, and Machine Learning
Published 2024-01-01Get full text
Article -
387
Detecting malicious code variants using convolutional neural network (CNN) with transfer learning
Published 2025-04-01“…We further improve the detection process by employing transfer learning to automatically identify and classify malware images based on their distinctive features. Empirical results demonstrate that MVDS achieves 97.98% accuracy with high detection speed, highlighting its potential for practical implementation in strengthening network security.…”
Get full text
Article -
388
Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities
Published 2025-01-01“…In addition, the informal security analysis shows that it supports salient functional and security features such as mutual authentication, key agreement, perfect key secrecy, anonymity, and untraceability. …”
Get full text
Article -
389
Green IoT: how wireless sensor networks are paving the way for sustainable smart environments
Published 2023-06-01Get full text
Article -
390
PoseAlign network for hybrid structure in 2D human pose estimation
Published 2025-05-01Get full text
Article -
391
Facial Expression Recognition using Convolutional Neural Networks with Transfer Learning Resnet-50
Published 2024-08-01Get full text
Article -
392
FEXGBIDS: Federated XGBoost-Based Intrusion Detection System for In-Vehicle Network
Published 2025-01-01“…By integrating the Federated Learning (FL) framework with cryptographic optimization techniques, FEXGBIDS addresses data silo and security challenges in the vehicular network environment. …”
Get full text
Article -
393
Logitwise Distillation Network: Improving Knowledge Distillation via Introducing Sample Confidence
Published 2025-02-01Get full text
Article -
394
Adversarial Hierarchical-Aware Edge Attention Learning Method for Network Intrusion Detection
Published 2025-07-01“…The rapid development of information technology has made cyberspace security an increasingly critical issue. Network intrusion detection methods are practical approaches to protecting network systems from cyber attacks. …”
Get full text
Article -
395
A Chaotic Maps-Based Authentication Scheme for Wireless Body Area Networks
Published 2016-07-01“…Compared with the previous schemes, our scheme not only enjoys more security features but also has reduced computational cost of client and application provider. …”
Get full text
Article -
396
DSNI-Net: Forensic Network for Detecting Splicing in Salt-and-Pepper Noisy Images
Published 2025-01-01Get full text
Article -
397
Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data
Published 2013-07-01“…With the development of the Internet, technological innovation and the availability of information emerged new computer security threats. The researchers are developing new systems known as Intrusion Detection Systems IDSs for detecting the known and unknown attacks. …”
Get full text
Article -
398
An Intrusion Detection System over the IoT Data Streams Using eXplainable Artificial Intelligence (XAI)
Published 2025-01-01Get full text
Article -
399
Lightweight machine learning framework for efficient DDoS attack detection in IoT networks
Published 2025-07-01“…Abstract The rapid proliferation of Internet of Things (IoT) devices has introduced significant security challenges, with Distributed Denial of Service (DDoS) attacks posing a critical threat to network integrity. …”
Get full text
Article -
400
Explainability of Network Intrusion Detection Using Transformers: A Packet-Level Approach
Published 2025-01-01“…Network Intrusion Detection Systems (NIDS) are critical in ensuring the security of connected computer systems by actively detecting and preventing unauthorized activities and malicious attacks. …”
Get full text
Article