Showing 401 - 420 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))*', query time: 0.21s Refine Results
  1. 401
  2. 402
  3. 403
  4. 404
  5. 405
  6. 406

    Smart Grid Intrusion Detection for IEC 60870-5-104 With Feature Optimization, Privacy Protection, and Honeypot-Firewall Integration by Pedamallu Sai Mrudula, Rayappa David Amar Raj, Archana Pallakonda, Yanamala Rama Muni Reddy, K. Krishna Prakasha, V. Anandkumar

    Published 2025-01-01
    “…The experimental results demonstrate the framework’s operational capability and effectiveness for SCADA network security, achieving 99.29% accuracy, 94.8% recall and 4.1% false positive rates.…”
    Get full text
    Article
  7. 407
  8. 408

    A novel reconstruction-based video anomaly detection with idempotent generative network by Wenmin Dong, Lifeng Zhang, Wenjuan Shi, Xiangwei Zheng, Yuang Zhang

    Published 2025-06-01
    “…Finite Scalar Quantization (FSQ) layer is designed to discretize the encoder’s output, preserving key discriminative features. Meanwhile, the Pyramid Deformation Module (PDM), as an integral part of PSVAE, computes offset maps of original video frames for anomaly detection supplementation. …”
    Get full text
    Article
  9. 409
  10. 410
  11. 411
  12. 412
  13. 413
  14. 414

    Detecting eavesdropping nodes in the power Internet of Things based on Kolmogorov-Arnold networks. by Rong Wang, Weibin Jiang, Yanjin Shen, Qiqing Yue, Kan-Lin Hsiung

    Published 2025-01-01
    “…The rapid proliferation of the Power Internet of Things (PIoT) has given rise to severe network security threats, with eavesdropping attacks emerging as a paramount concern. …”
    Get full text
    Article
  15. 415
  16. 416

    Adaptive resource optimization mechanism for blockchain sharding in digital twin edge network by Li JIANG, Shengli XIE, Hui TIAN

    Published 2023-03-01
    “…To address the security and privacy issues for data sharing in digital twin edge networks, a new distributed and secure data sharing mechanism was developed by leveraging blockchain sharding.Considering dynamic and time varying features in digital twin edge networks and mapping errors of physic networks, an adaptive resource allocation model was formulated which jointly optimized cluster head selection, local base station (BS) consensus access selection, spectrum and computation consensus resources allocation, in order to maximize transactional throughput for the blockchain sharding.Moreover, a digital twin edge networks empowered two-layered proximal policy optimization (PPO) algorithm was designed to obtain the optimal solutions.Numerical results illustrate that the proposed algorithm can effectively improve the transactional throughput for the blockchain sharding.Meanwhile, it can well adapt to the mapping errors.…”
    Get full text
    Article
  17. 417
  18. 418

    Group Authentication Key Agreement Protocol Based on Certificateless Cryptography in UAV Network by Yuecheng WANG, Youwen ZHU, Zhiqiang ZHANG

    Published 2025-01-01
    “…If directly applied to multi-party interaction scenarios, traditional two-party key negotiation protocols require numerous interaction rounds, resulting in significant computational and communication overhead. Therefore, group key agreement protocols for UAV networks must provide a lighter computing process and stronger security guarantees.Methods This protocol adopts a certificateless key system. …”
    Get full text
    Article
  19. 419
  20. 420

    SoybeanNet: A Lightweight Neural Network for Soybean Pod Detection and Quantification by Nayak Ashu, Raghatate Kapesh Subhash

    Published 2025-01-01
    “…Future work will focus on extending SoybeanNet to detect and quantify other critical crop features and integrating it with broader agricultural monitoring systems to support sustainable farming and food security.…”
    Get full text
    Article