Showing 781 - 800 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))*', query time: 0.22s Refine Results
  1. 781

    Certificateless aggregate signcryption scheme with multi-ciphertext equality test for the internet of vehicles. by Xiaodong Yang, Xilai Luo, Ruixia Liu, Songyu Li, Ke Yao

    Published 2025-01-01
    “…When compared to similar schemes, this approach exhibits reduced computational overhead while providing superior security features.…”
    Get full text
    Article
  2. 782
  3. 783

    Leveraging self attention driven gated recurrent unit with crocodile optimization algorithm for cyberattack detection using federated learning framework by Manal Abdullah Alohali, Hatim Dafaalla, Mohammed Baihan, Sultan Alahmari, Achraf Ben Miled, Othman Alrusaini, Ali Alqazzaz, Hanadi Alkhudhayr

    Published 2025-07-01
    “…Cybersecurity includes decreasing the risk of mischievous computer, software, and network attacks. Novel techniques have been combined into emerging artificial intelligence (AI) that attains cybersecurity. …”
    Get full text
    Article
  4. 784
  5. 785

    Review of malware detection and classification visualization techniques by Jinwei WANG, Zhengjia CHEN, Xue XIE, Xiangyang LUO, Bin MA

    Published 2023-10-01
    “…With the rapid advancement of technology, network security faces a significant challenge due to the proliferation of malicious software and its variants.These malicious software use various technical tactics to deceive or bypass traditional detection methods, rendering conventional non-visual detection techniques inadequate.In recent years, data visualization has gained considerable attention in the academic community as a powerful approach for detecting and classifying malicious software.By visually representing the key features of malicious software, these methods greatly enhance the accuracy of malware detection and classification, opening up extensive research opportunities in the field of cyber security.An overview of traditional non-visual detection techniques and visualization-based methods were provided in the realm of malicious software detection.Traditional non-visual approaches for malicious software detection, including static analysis, dynamic analysis, and hybrid techniques, were introduced.Subsequently, a comprehensive survey and evaluation of prominent contemporary visualization-based methods for detecting malicious software were undertaken.This primarily encompasses encompassed the integration of visualization with machine learning and visualization combined with deep learning, each of which exhibits distinct advantages and characteristics within the domain of malware detection and classification.Consequently, the holistic consideration of several factors, such as dataset size, computational resources, time constraints, model accuracy, and implementation complexity, is necessary for the selection of detection and classification methods.In conclusion, the challenges currently faced by detection technologies are summarized, and a forward-looking perspective on future research directions in the field is provided.…”
    Get full text
    Article
  6. 786
  7. 787
  8. 788
  9. 789

    Robust Face Recognition Using Deep Learning and Ensemble Classification by Pavani Chitrapu, Mahesh Kumar Morampudi, Hemantha Kumar Kalluri

    Published 2025-01-01
    “…Existing methods often struggle to strike a balance between accuracy, computational efficiency, and robustness. Deep learning has become popular for automatically learning features through convolution layers. …”
    Get full text
    Article
  10. 790
  11. 791

    Fractional Artificial Protozoa Optimization Enabled Deep Learning for Intrusion Detection and Mitigation in Cyber-Physical Systems by Shaik Abdul Rahim, Arun Manoharan

    Published 2024-01-01
    “…CPSs are gradually growing and utilized in important infrastructure and industries for attaining smart grid, smart transportation, and smart healthcare, which assists governments and citizens. Nevertheless, the network and wireless communication technology creates high complexity, and the intelligence and dynamic of network intrusions make CPS more insecure to network intrusions and provide more critical threats to human life and national security. …”
    Get full text
    Article
  12. 792
  13. 793

    Evaluating Lightweight Transformers With Local Explainability for Android Malware Detection by Fatima Bourebaa, Mohamed Benmohammed

    Published 2025-01-01
    “…Mobile phones have evolved into powerful handheld computers, fostering a vast application ecosystem but also increasing security and privacy risks. …”
    Get full text
    Article
  14. 794
  15. 795
  16. 796

    Constructing segmentation method for wheat powdery mildew using deep learning by Hecang Zang, Hecang Zang, Congsheng Wang, Qing Zhao, Qing Zhao, Jie Zhang, Jie Zhang, Junmei Wang, Guoqing Zheng, Guoqing Zheng, Guoqiang Li, Guoqiang Li

    Published 2025-05-01
    “…Finally, in the deep bottleneck of Swin-Unet network, ResNet network layers are used to increase the expressive power of feature. …”
    Get full text
    Article
  17. 797
  18. 798
  19. 799
  20. 800

    Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption by Jeyamala Chandrasekaran, S. J. Thiruvengadam

    Published 2015-01-01
    “…Although naive approaches are the most secure for video encryption, the computational cost associated with them is very high. …”
    Get full text
    Article