-
81
A Review of Secure Routing Approaches for Current and Next-Generation Wireless Multimedia Sensor Networks
Published 2015-10-01Get full text
Article -
82
Multi-Branch Feature Alignment Network for Misaligned and Occluded Person Re-Identification
Published 2024-01-01“…As a pivotal computer vision technique, person re-identification (re-ID) assumes a paramount role in bolstering public security. …”
Get full text
Article -
83
Dynamic analysis of malicious behavior propagation based on feature selection in software network
Published 2024-11-01Get full text
Article -
84
-
85
-
86
An Effective Network Intrusion Detection System Using Recursive Feature Elimination Technique
Published 2023-12-01“…Machine learning facilitates the growth of an intrusion detection system (IDS) in the context of cyber security. These systems are proposed to identify and classify cyber-attacks on the network. …”
Get full text
Article -
87
Solving blockchain trilemma using off‐chain storage protocol
Published 2023-07-01Get full text
Article -
88
Security and Fairness in Multiparty Quantum Secret Sharing Protocol
Published 2025-01-01“…However, none of these works account for redundancy, enhanced security/privacy features, or authentication mechanisms able to fingerprint players. …”
Get full text
Article -
89
Leveraging Graph Neural Networks for IoT Attack Detection
Published 2025-06-01Get full text
Article -
90
-
91
AEFFNet: Attention Enhanced Feature Fusion Network for Small Object Detection in UAV Imagery
Published 2025-01-01Get full text
Article -
92
Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging
Published 2025-01-01“…Securing data transactions across computer networks presents significant challenges, particularly concerning data privacy and cybersecurity threats. …”
Get full text
Article -
93
-
94
Blockchain-Enabled Deep Recurrent Neural Network Model for Clickbait Detection
Published 2022-01-01Get full text
Article -
95
An Effective Method for Detecting Cyber Attacks on Computer Networks from the NSL-KDD Data Set
Published 2025-01-01“…Logistic regression models can fully favor network traffic structure information to capture features more comprehensively. …”
Get full text
Article -
96
Restricted Boltzmann machine with Sobel filter dense adversarial noise secured layer framework for flower species recognition
Published 2025-04-01“…The first contribution deals with the dataset preparation by means of feature extraction through the use of the Sobel filter and the Restricted Boltzmann Machine (RBM) neural network approach through unsupervised learning. …”
Get full text
Article -
97
Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques
Published 2023-09-01“…Cloud computing (CC) is a novel technology that has made it easier to access network and computer resources on demand such as storage and data management services. …”
Get full text
Article -
98
Reinforcement Learning With Deep Features: A Dynamic Approach for Intrusion Detection in IoT Networks
Published 2025-01-01Get full text
Article -
99
Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification
Published 2025-04-01Get full text
Article -
100
Fast anomalous traffic detection system for secure vehicular communications
Published 2024-12-01Get full text
Article