Showing 761 - 780 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))*', query time: 0.22s Refine Results
  1. 761

    Interdisciplinary framework for cyber-attacks and anomaly detection in industrial control systems using deep learning by Qawsar Gulzar, Khurram Mustafa

    Published 2025-07-01
    “…In this study, we introduced an interdisciplinary framework that aims to enhance network intrusion detection systems (NIDSs). In this framework, we introduced an IDS via feature selection and feature reduction technique(s) with the attention-driven lightweight deep neural networks: Deep Recurrent Neural Networks (RNN), Deep Long Short-Term Memory (LSTM), and Deep Bi-directional Long Short-Term Memory (Bi-LSTM). …”
    Get full text
    Article
  2. 762
  3. 763
  4. 764

    UAP: A System Authentication Protocol for UAV Relay Communication by UAV-Assisted by Chunpeng Liu, Tao Huang, Maode Ma

    Published 2025-01-01
    “…Furthermore, we evaluate the resilience of UAP against multiple security vulnerabilities using the Scyther tool. Finally, we compare our protocol with existing authentication methods in terms of application scenarios, security features, and both computational and communication overhead. …”
    Get full text
    Article
  5. 765
  6. 766

    Peculiarities of evidence in the course of investigation of criminal offences under parts 1, 2 of Article 111-1 of the Criminal Code of Ukraine by S. Ye. Ablamskyi, O. V. Kovtun, V. V. Ablamska

    Published 2024-09-01
    “…It is substantiated that in modern conditions, evidence in the course of investigation of criminal offences under Parts 1, 2 of Art. 111-1 of the Criminal Code of Ukraine is inseparable from taking into account the features of modern equipment which can be used for information transmission, analysis of computer information and information from correspondence, channels and groups in social networks containing valuable information, samples of signatures, seals and other details of documents which reflect information about the collaboration activities of individuals and groups. …”
    Get full text
    Article
  7. 767

    Blockchain covert communication scheme based on the cover of normal transactions by Pengkun JIANG, Wenyin ZHANG, Jiuru WANG, Shanyun HUANG, Wanshui SONG

    Published 2022-08-01
    “…With the development of computer technology, the situation of modern network attack and defense is becoming increasingly severe, and the problem of secure transmission of secret information needs to be solved urgently.Covert communication technology embeds secret information into the carrier and transmits the information safely through the covert channel.However, the traditional covert channels face the challenges of data damaging, attack, detection and so on, which cannot meet the higher security requirements.As a public data platform, blockchain can embed secret information under the cover of a large number of transactions.With its tamper proof, anonymity, decentralization and other characteristics, blockchain can well solve the problems of traditional covert channels and achieve secure covert communication.However, the existing blockchain covert communication schemes are limited by low communication efficiency and poor security.How to improve safety and efficiency of covert communication is a research focus of blockchain covert communication.Motivated by this issue, a blockchain covert communication scheme based on the cover of normal transactions was proposed.The hash algorithm was used to build a transmission-free password table to embed secret information without changing any transaction data.Using the elliptic curve feature, transactions with hidden information can be quickly screened out from a large number of transactions, to extract secret information quickly.This scheme improves the security and efficiency of covert communication and has strong portability.Theoretical analysis shows that attackers cannot distinguish between ordinary transactions and special transactions.This scheme has high anti-detection and scalability.Besides, the experimental results of the bitcoin test network show the high efficiency of this scheme.…”
    Get full text
    Article
  8. 768

    A Novel Framework for Financial Cybersecurity and Fraud Detection Using XAI-RNN-SGRU by Smarajit Ghosh

    Published 2025-01-01
    “…Cyber threats involve unauthorized access, alteration, or deletion of private information, extortion, and disruption of business operations. Traditional network security methods need more scalability, data protection, and difficulty detecting advanced threats. …”
    Get full text
    Article
  9. 769
  10. 770

    Intrusion Detection Using Hybrid Pearson Correlation and GS-PSO Optimized Random Forest Technique for RPL-Based IoT by Wei Yang, Xinlong Wang, Zhiming Zhang, Shaolong Chen, Chengqi Hou, Siwei Luo

    Published 2025-01-01
    “…The escalating surge of cyberattacks targeting IoT systems has exposed critical security vulnerabilities in RPL-based networks. Attackers exploit routing spoofing, resource depletion tactics, and topology manipulation strategies, while inherent constraints of resource-limited devices and scalability challenges in mass deployments amplify these risks. …”
    Get full text
    Article
  11. 771
  12. 772
  13. 773

    An Improved Machine Learning-Based Model for Detecting and Classifying PQDs with High Noise Immunity in Renewable-Integrated Microgrids by Irfan Ali Channa, Dazi Li, Mohsin Ali Koondhar, Fida Hussain Dahri, Ibrahim Mahariq

    Published 2024-01-01
    “…Recently, renewable energy sources integrated with microgrid (MG) networks have provided safe, secure, and reliable power supply to both utility and industrial purposes. …”
    Get full text
    Article
  14. 774
  15. 775
  16. 776
  17. 777
  18. 778

    Botnet Detection Using Support Vector Machines with Artificial Fish Swarm Algorithm by Kuan-Cheng Lin, Sih-Yang Chen, Jason C. Hung

    Published 2014-01-01
    “…The number of mobile devices used globally substantially increases daily; therefore, information security concerns are increasingly vital. The botnet virus is a major threat to both personal computers and mobile devices; therefore, a method of botnet feature characterization is proposed in this study. …”
    Get full text
    Article
  19. 779

    Real-Time Corn Variety Recognition Using an Efficient DenXt Architecture with Lightweight Optimizations by Jin Zhao, Chengzhong Liu, Junying Han, Yuqian Zhou, Yongsheng Li, Linzhe Zhang

    Published 2025-01-01
    “…Representative Batch Normalization (RBN) is introduced into the DenseNet-121 model to improve the generalization ability of the model, and the SE module and deep separable convolution are integrated to enhance the feature representation and reduce the computational complexity, and the Dropout regularization is introduced to further improve the generalization ability of the model and reduce the overfitting. …”
    Get full text
    Article
  20. 780