-
141
Embedding Trust in the Media Access Control Protocol for Wireless Networks
Published 2025-01-01Get full text
Article -
142
SA3C-ID: a novel network intrusion detection model using feature selection and adversarial training
Published 2025-07-01“…With the continuous proliferation of emerging technologies such as cloud computing, 5G networks, and the Internet of Things, the field of cybersecurity is facing an increasing number of complex challenges. …”
Get full text
Article -
143
-
144
A Hybrid Deep Learning Framework for Deepfake Detection Using Temporal and Spatial Features
Published 2025-01-01“…The rise of deep-fake technology has sparked concerns as it blurs the distinction between fake media by harnessing Generative Adversarial Networks (GANs). This has raised issues surrounding privacy and security in the realm. …”
Get full text
Article -
145
LLM-Based Cyberattack Detection Using Network Flow Statistics
Published 2025-06-01Get full text
Article -
146
Explainable AI for zero-day attack detection in IoT networks using attention fusion model
Published 2025-07-01Get full text
Article -
147
Optimizing Cervical Cancer Diagnosis with Feature Selection and Deep Learning
Published 2025-01-01Get full text
Article -
148
-
149
Wireless Security Threats
Published 2013-12-01“…These entire devices store large amount of data and their wireless connection to network spectrum exhibit them as important source of computing. …”
Get full text
Article -
150
A Risk Assessment Analysis to Enhance the Security of OT WAN with SD-WAN
Published 2024-10-01Get full text
Article -
151
-
152
Approach of detecting low-rate DoS attack based on combined features
Published 2017-05-01“…LDoS (low-rate denial of service) attack is a kind of RoQ (reduction of quality) attack which has the characteristics of low average rate and strong concealment.These characteristics pose great threats to the security of cloud computing platform and big data center.Based on network traffic analysis,three intrinsic characteristics of LDoS attack flow were extracted to be a set of input to BP neural network,which is a classifier for LDoS attack detection.Hence,an approach of detecting LDoS attacks was proposed based on novel combined feature value.The proposed approach can speedily and accurately model the LDoS attack flows by the efficient self-organizing learning process of BP neural network,in which a proper decision-making indicator is set to detect LDoS attack in accuracy at the end of output.The proposed detection approach was tested in NS2 platform and verified in test-bed network environment by using the Linux TCP-kernel source code,which is a widely accepted LDoS attack generation tool.The detection probability derived from hypothesis testing is 96.68%.Compared with available researches,analysis results show that the performance of combined features detection is better than that of single feature,and has high computational efficiency.…”
Get full text
Article -
153
On‐Chip Metamaterial‐Enhanced Mid‐Infrared Photodetectors with Built‐In Encryption Features
Published 2025-03-01Get full text
Article -
154
Enhanced anomaly traffic detection framework using BiGAN and contrastive learning
Published 2024-11-01“…Abstract Abnormal traffic detection is a crucial topic in the field of network security. However, existing methods face many challenges when processing complex high-dimensional traffic data. …”
Get full text
Article -
155
-
156
-
157
Smart framework for industrial IoT and cloud computing network intrusion detection using a ConvLSTM-based deep learning model
Published 2025-08-01“…In the rapidly evolving landscape of the Industrial Internet of Things (IIoT) and cloud computing, ensuring robust network security has become a major challenge for the Internet of Everything (IoE). …”
Get full text
Article -
158
Spatial attention-guided pre-trained networks for accurate identification of crop diseases
Published 2025-07-01Get full text
Article -
159
A Cross-Mamba Interaction Network for UAV-to-Satallite Geolocalization
Published 2025-06-01Get full text
Article -
160
Optimizing Intrusion Detection in IoMT Networks Through Interpretable and Cost-Aware Machine Learning
Published 2025-05-01Get full text
Article