Showing 121 - 140 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))*', query time: 0.27s Refine Results
  1. 121

    Encrypted Image Retrieval System based on Features Analysis by Methaq Talib GAATA, Fadya Fouad Hantoosh

    Published 2018-07-01
    “…However, since communication between digital products takes place in a public network, the necessity of security for digital images becomes vital. …”
    Get full text
    Article
  2. 122
  3. 123

    IMpc-PyrYOLO: Hybrid YOLO Based Feature Pyramidal Network for Pest Detection in Rice Leaves by Ramesh Shunmugam, Sumendra Yogarayan, Siti Fatimah Abdul Razak, Md. Shohel Sayeed

    Published 2025-06-01
    “…The model integrates an efficient channel attention (ECA) mechanism with the feature pyramidal network (FPN) in the YOLO network to improve multi-scale feature extraction and pest classification accuracy. …”
    Get full text
    Article
  4. 124
  5. 125
  6. 126
  7. 127
  8. 128
  9. 129

    Enhancing IoT device security: CNN-SVM hybrid approach for real-time detection of DoS and DDoS attacks by Al-Na’amneh Qais, Aljaidi Mohammad, Nasayreh Ahmad, Gharaibeh Hasan, Al Mamlook Rabia Emhamed, Jaradat Ameera S., Alsarhan Ayoub, Samara Ghassan

    Published 2024-11-01
    “…Therefore, developing a secure IoT system is vital, shielding against attackers leveraging IoT devices to obtain network access and maintaining data security during transmission between these devices. …”
    Get full text
    Article
  10. 130

    Connected Vehicles Security: A Lightweight Machine Learning Model to Detect VANET Attacks by Muawia A. Elsadig, Abdelrahman Altigani, Yasir Mohamed, Abdul Hakim Mohamed, Akbar Kannan, Mohamed Bashir, Mousab A. E. Adiel

    Published 2025-06-01
    “…Vehicular ad hoc networks (VANETs) aim to manage traffic, prevent accidents, and regulate various parts of traffic. …”
    Get full text
    Article
  11. 131
  12. 132

    FFT-RDNet: A Time–Frequency-Domain-Based Intrusion Detection Model for IoT Security by Bingjie Xiang, Renguang Zheng, Kunsan Zhang, Chaopeng Li, Jiachun Zheng

    Published 2025-07-01
    “…The traditional IDS models, however, struggle with high computational complexity and inadequate feature extraction, limiting their accuracy and generalizability in IoT environments. …”
    Get full text
    Article
  13. 133

    An adaptive hybrid framework for IIoT intrusion detection using neural networks and feature optimization using genetic algorithms by Mohammad Zubair Khan, Aijaz Ahmad Reshi, Shabana Shafi, Ibrahim Aljubayri

    Published 2025-05-01
    “…Abstract In Industrial Internet of Things (IIoT) networks, securing device connectivity through effective intrusion detection systems is essential for maintaining operational integrity. …”
    Get full text
    Article
  14. 134
  15. 135

    A topology-guided high-quality solution learning framework for security-constraint unit commitment based on graph convolutional network by Liqian Gao, Lishen Wei, Shichang Cui, Jiakun Fang, Xiaomeng Ai, Wei Yao, Jinyu Wen

    Published 2025-03-01
    “…In this sense, this paper proposes a topology-guided high-quality solution learning framework based on graph convolutional network (GCN) and neighborhood search (NS). Firstly, a GCN-based method is presented to learn the potential patterns between commitments and graph data associated with bus feature and power grid topology. …”
    Get full text
    Article
  16. 136

    Cross-stream attention enhanced central difference convolutional network for CG image detection by HUANG Jinkun, HUANG Yuanhang, HUANG Wenmin, LUO Weiqi

    Published 2024-12-01
    “…With the maturation of computer graphics (CG) technology in the field of image generation, the realism of created images has been improved significantly. …”
    Get full text
    Article
  17. 137
  18. 138
  19. 139
  20. 140

    Cyberterrorism: content, forms and promising countermeasures by D. S. Melnyk

    Published 2023-10-01
    “…The main forms of cyber terrorism are revealed: the commission of terrorist acts by organisations, groups and individuals using computers and computer networks or by influencing the information processed (circulated) in them, as well as the use of cyberspace for other purposes of terrorist activities not directly related to the commission of terrorist acts. …”
    Get full text
    Article