Showing 521 - 540 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))*', query time: 0.22s Refine Results
  1. 521

    DS-YOLO: A dense small object detection algorithm based on inverted bottleneck and multi-scale fusion network by Hongyu Zhang, Guoliang Li, Dapeng Wan, Ziyue Wang, Jinshun Dong, Shoujun Lin, Lixia Deng, Haiying Liu

    Published 2024-12-01
    “…Firstly, to enhance the dense small objects’ feature extraction capability of backbone network, the paper proposes a lightweight backbone. …”
    Get full text
    Article
  2. 522

    A multi-class hybrid variational autoencoder and vision transformer model for enhanced plant disease identification by Folasade Olubusola Isinkaye, Michael Olusoji Olusanya, Ayobami Andronicus Akinyelu

    Published 2025-06-01
    “…Plant diseases pose a major risk to global food security as they account for losses of between 10 to 30 % of the global harvest every year. …”
    Get full text
    Article
  3. 523
  4. 524

    Regional experience in organizing the protection of minors from a destructive information environment (by the example of non-central regions) by S. E. Titor

    Published 2023-03-01
    “…Achievements in the field of new technologies, on which the formation of the modern information society is based, have led to the rapid development of the global computer network Internet. The Internet as a means of social communication has both a positive impact on the world community and has negative consequences. …”
    Get full text
    Article
  5. 525
  6. 526

    Lightweight authentication for IoT devices (LAID) in sustainable smart cities by Aqeel Khalique, Farheen Siddiqui, Mohd Abdul Ahad, Imran Hussain

    Published 2025-07-01
    “…Due to constrained nature of IoT, ensuring security in IoT enabled network is a challenge. However, growing urban population and exponential rise in IoT enabled devices make it challenging to implement and ensure security mechanisms. …”
    Get full text
    Article
  7. 527
  8. 528

    Distributed denial-of-service (DDoS) on the smart grids based on VGG19 deep neural network and Harris Hawks optimization algorithm by Abdurahim Alhashmi, H. Idwaib, Selçuk Alparslan Avci, Javad Rahebi, Raheleh Ghadami

    Published 2025-05-01
    “…The suggested approach uses the robust feature extraction capability of VGG19-DNN for network traffic pattern analysis to detect abnormal traffic flows indicative of DDoS attacks. …”
    Get full text
    Article
  9. 529
  10. 530
  11. 531
  12. 532

    Development of Various Stacking Ensemble-Based HIDS Using ADFA Datasets by Hami Satilmis, Sedat Akleylek, Zaliha Yuce Tok

    Published 2025-01-01
    “…The rapid increase in the number of cyber attacks and the emergence of various attack variations pose significant threats to the security of computer systems and networks. Various intrusion detection systems (IDS) are developed to defend computer systems and networks in response to these threats. …”
    Get full text
    Article
  13. 533

    Deep learning with leagues championship algorithm based intrusion detection on cybersecurity driven industrial IoT systems by Saud S. Alotaibi, Turki Ali Alghamdi

    Published 2025-08-01
    “…However, owing to the constraints of limited resources and computation abilities, IoT networks are subject to different cyber-attacks. …”
    Get full text
    Article
  14. 534
  15. 535
  16. 536
  17. 537
  18. 538

    Copula entropy regularization transformer with C2 variational autoencoder and fine-tuned hybrid DL model for network intrusion detection by Srinivas Akkepalli, Sagar K

    Published 2025-03-01
    “…In cyber security, Intrusion Detection Systems (IDS) act as a network security tool, in which computational complexity and dynamic IDS detection issues are observed by conventional studies. …”
    Get full text
    Article
  19. 539
  20. 540