Showing 681 - 700 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))*', query time: 0.16s Refine Results
  1. 681
  2. 682
  3. 683
  4. 684
  5. 685
  6. 686

    Adaptive Anomaly Detection Framework Model Objects in Cyberspace by Hasan Alkahtani, Theyazn H. H. Aldhyani, Mohammed Al-Yaari

    Published 2020-01-01
    “…Accordingly, the monitoring of computers and networks is too complicated for network administrators. …”
    Get full text
    Article
  7. 687
  8. 688
  9. 689
  10. 690
  11. 691
  12. 692
  13. 693

    A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis by Salman Muneer, Umer Farooq, Atifa Athar, Muhammad Ahsan Raza, Taher M. Ghazal, Shadman Sakib

    Published 2024-01-01
    “…Intrusion detection (ID) is critical in securing computer networks against various malicious attacks. …”
    Get full text
    Article
  14. 694

    UNION: A Trust Model Distinguishing Intentional and Unintentional Misbehavior in Inter-UAV Communication by Ezedin Barka, Chaker Abdelaziz Kerrache, Nasreddine Lagraa, Abderrahmane Lakas, Carlos T. Calafate, Juan-Carlos Cano

    Published 2018-01-01
    “…Hence, the communications interface used and that computation complexity are additional factors to consider when designing secure protocols for these networks. …”
    Get full text
    Article
  15. 695

    A hybrid super learner ensemble for phishing detection on mobile devices by Routhu Srinivasa Rao, Cheemaladinne Kondaiah, Alwyn Roshan Pais, Bumshik Lee

    Published 2025-05-01
    “…Abstract In today’s digital age, the rapid increase in online users and massive network traffic has made ensuring security more challenging. …”
    Get full text
    Article
  16. 696
  17. 697

    Historical Blurry Video-Based Face Recognition by Lujun Zhai, Suxia Cui, Yonghui Wang, Song Wang, Jun Zhou, Greg Wilsbacher

    Published 2024-09-01
    “…Face recognition is a widely used computer vision, which plays an increasingly important role in user authentication systems, security systems, and consumer electronics. …”
    Get full text
    Article
  18. 698
  19. 699
  20. 700

    Accelerating Deep Learning-Based Morphological Biometric Recognition with Field-Programmable Gate Arrays by Nourhan Zayed, Nahed Tawfik, Mervat M. A. Mahmoud, Ahmed Fawzy, Young-Im Cho, Mohamed S. Abdallah

    Published 2025-01-01
    “…Convolutional neural networks (CNNs) are increasingly recognized as an important and potent artificial intelligence approach, widely employed in many computer vision applications, such as facial recognition. …”
    Get full text
    Article