Showing 61 - 80 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))*', query time: 0.22s Refine Results
  1. 61
  2. 62
  3. 63
  4. 64

    Pre-authentication and group management based secure handover for space-earth integration network by Jia-nan HONG, Shao-hua LI, Kai-ping XUE, Pei-lin HONG

    Published 2016-07-01
    “…In space-earth integration network,high-speed movement of space nodes brings in the problem of fre-quent satellite access router (SAR) handover.A group-based secure handover scheme for multiple mobility nodes (MN) utilizing satellite trajectory prediction was proposed.By using the movement features of the corresponding entities,an efficient aggregation mechanism for the interaction message occurred during the multi-MN handover was put forward.By using predictable satellite trajectory,authentication and session key agreement between new SAR and MN was accomplished beforehand with the secure context.Compared with existing schemes,the proposed scheme can provide necessary security features,lower the handover delay,and reduce the computation and commu-nication overhead of mutual authentication and key agreement.The proposed scheme well suits the space-earth inte-gration network,where the satellite node is energy constraint.…”
    Get full text
    Article
  5. 65

    qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era by Hyoungsub Shim, Bongho Kang, Haejung Im, Duhyun Jeon, Seok-Min Kim

    Published 2025-01-01
    “…This innovative combination of WireGuard protocol, PQC algorithms, and PUF technology creates a VPN system with significantly improved security features. To validate its effectiveness, the performance of the proposed qTrustNet VPN was rigorously evaluated in a 10GbE NIC network environment. …”
    Get full text
    Article
  6. 66

    Analysis of software defined security model and architecture by Chunmei GUO, Jun MA, Hao GUO, Xueyao BI, Ruhui ZHANG, Shaomin ZHU, Congyi YANG

    Published 2017-06-01
    “…Currently,most enterprises have deployed information security defense system based on policy access control.With cloud computing environment deployment and network attacking technology development,security has been regarded as one of the greatest problems in the cloud computing environment.The advanced persistent attacks including of bypassing the traditional firewall easily,breaking through the black and white list and feature matching of the security defense mechanism have included to the traditional security system new challenges.The problem in the traditional tightly coupled security defense system of combining the virtual with the true for construction of network environments was described,and a software defined security model and framework was provided.The decoupling scheme of access patterns and deployment position in combining the virtual with the true for construction of network environments was realized,which provided a beneficial exploration in the field of the adaptive active safety for enterprise cloud computing environment.…”
    Get full text
    Article
  7. 67

    AI-Driven Adaptive Security for Sensor Networks: Next-Generation Firewalls for Attack Detection by Niranjan W. Meegammana, Harinda Fernando

    Published 2025-01-01
    “…Traditional static firewalls and computationally intensive deep learning models are impractical for securing such networks. …”
    Get full text
    Article
  8. 68
  9. 69
  10. 70

    An effectiveness of deep learning with fox optimizer-based feature selection model for securing cyberattack detection in IoT environments by Mimouna Abdullah Alkhonaini

    Published 2025-08-01
    “…This paper presents a Fox Optimizer-Based Feature Selection with Deep Learning for Securing Cyberattack Detection (FOFSDL-SCD) model. …”
    Get full text
    Article
  11. 71
  12. 72
  13. 73

    Advancing Artificial Intelligence of Things Security: Integrating Feature Selection and Deep Learning for Real-Time Intrusion Detection by Faisal Albalwy, Muhannad Almohaimeed

    Published 2025-03-01
    “…An effective IDS is crucial as evolving threats continue to expose new security vulnerabilities. This study proposes an integrated approach combining feature selection methods and principal component analysis (PCA) with advanced deep learning (DL) models for real-time intrusion detection, significantly improving both computational efficiency and accuracy compared to previous methods. …”
    Get full text
    Article
  14. 74
  15. 75
  16. 76
  17. 77
  18. 78
  19. 79
  20. 80