Showing 481 - 500 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))*', query time: 0.23s Refine Results
  1. 481

    Unseen Attack Detection in Software-Defined Networking Using a BERT-Based Large Language Model by Mohammed N. Swileh, Shengli Zhang

    Published 2025-07-01
    “…By utilizing Random Forest for feature selection, we optimize model performance and reduce computational overhead, ensuring efficient and accurate detection. …”
    Get full text
    Article
  2. 482
  3. 483

    HSTCN-NuSVC: A Homogeneous Stacked Deep Ensemble Learner for Classifying Human Actions Using Smartphones by Sarmela Raja Sekaran, Ying Han Pang, Ooi Shih Yin, Lim Zheng You

    Published 2025-02-01
    “…Smartphone-based human activity recognition (HAR) is an important research area due to its wide-ranging applications in health, security, gaming, etc. Existing HAR models face challenges such as tedious manual feature extraction/selection techniques, limited model generalisation, high computational cost, and inability to retain longer-term dependencies. …”
    Get full text
    Article
  4. 484
  5. 485
  6. 486
  7. 487

    Research on Small-Sample Credit Card Fraud Identification Based on Temporal Attention-Boundary-Enhanced Prototype Network by Boyu Liu, Longrui Wu, Shengdong Mu

    Published 2024-12-01
    “…Additionally, nearest-neighbor boundary loss is introduced after the computation of the prototype-like network model to adjust the overall distribution of features in the metric space and to clarify the representation boundaries of the prototype-like model. …”
    Get full text
    Article
  8. 488
  9. 489

    Highly accurate anomaly based intrusion detection through integration of the local outlier factor and convolutional neural network by Rahimullah Rabih, Hamed Vahdat-Nejad, Wathiq Mansoor, Javad Hassannataj Joloudari

    Published 2025-07-01
    “…Abstract Intrusion detection systems (IDS) are critical for safeguarding computer networks by identifying malicious activities. …”
    Get full text
    Article
  10. 490
  11. 491
  12. 492
  13. 493
  14. 494
  15. 495

    Digits Recognition for Arabic Handwritten through Convolutional Neural Networks, Local Binary Patterns, and Histogram of Oriented Gradients by Bushra Mahdi Hasan, Zahraa Jasim Jaber, Ahmad Adel Habeeb

    Published 2024-10-01
    “…In addition, a Histogram of Oriented Gradients (HOG) is a feature extraction technique that is used in computer vision and image processing for the purpose of object detection. …”
    Get full text
    Article
  16. 496
  17. 497
  18. 498
  19. 499

    LGR-Net: A Lightweight Defect Detection Network Aimed at Elevator Guide Rail Pressure Plates by Ruizhen Gao, Meng Chen, Yue Pan, Jiaxin Zhang, Haipeng Zhang, Ziyue Zhao

    Published 2025-03-01
    “…To improve the localization accuracy for small defects, we add a high-resolution small object detection layer (P2 layer) and integrate the Convolutional Block Attention Module (CBAM) to construct a four-scale feature fusion network. This study employs various data augmentation methods to construct a custom dataset for guide rail pressure plate defect detection. …”
    Get full text
    Article
  20. 500