Showing 381 - 400 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))', query time: 0.23s Refine Results
  1. 381
  2. 382
  3. 383
  4. 384
  5. 385
  6. 386
  7. 387

    Detecting malicious code variants using convolutional neural network (CNN) with transfer learning by Nazish Younas, Shazia Riaz, Saqib Ali, Rafiullah Khan, Farman Ali, Daehan Kwak

    Published 2025-04-01
    “…We further improve the detection process by employing transfer learning to automatically identify and classify malware images based on their distinctive features. Empirical results demonstrate that MVDS achieves 97.98% accuracy with high detection speed, highlighting its potential for practical implementation in strengthening network security.…”
    Get full text
    Article
  8. 388

    Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities by Vincent Omollo Nyangaresi, Ahmad A. AlRababah, Ganesh Keshaorao Yenurkar, Ravikumar Chinthaginjala, Muhammad Yasir

    Published 2025-01-01
    “…In addition, the informal security analysis shows that it supports salient functional and security features such as mutual authentication, key agreement, perfect key secrecy, anonymity, and untraceability. …”
    Get full text
    Article
  9. 389
  10. 390
  11. 391
  12. 392

    FEXGBIDS: Federated XGBoost-Based Intrusion Detection System for In-Vehicle Network by Jie Li, Yuanyuan Song, Ming-Gang Zheng, Shuo Zhang, Han Liang

    Published 2025-01-01
    “…By integrating the Federated Learning (FL) framework with cryptographic optimization techniques, FEXGBIDS addresses data silo and security challenges in the vehicular network environment. …”
    Get full text
    Article
  13. 393
  14. 394

    Adversarial Hierarchical-Aware Edge Attention Learning Method for Network Intrusion Detection by Hao Yan, Jianming Li, Lei Du, Binxing Fang, Yan Jia, Zhaoquan Gu

    Published 2025-07-01
    “…The rapid development of information technology has made cyberspace security an increasingly critical issue. Network intrusion detection methods are practical approaches to protecting network systems from cyber attacks. …”
    Get full text
    Article
  15. 395

    A Chaotic Maps-Based Authentication Scheme for Wireless Body Area Networks by Gaimei Gao, Xinguang Peng, Ye Tian, Zefeng Qin

    Published 2016-07-01
    “…Compared with the previous schemes, our scheme not only enjoys more security features but also has reduced computational cost of client and application provider. …”
    Get full text
    Article
  16. 396
  17. 397

    Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data by Naglaa Ibrahim, Hana Usman

    Published 2013-07-01
    “…With the development of the Internet, technological innovation and the availability of information emerged new computer security threats. The researchers are developing new systems known as Intrusion Detection Systems IDSs for detecting the known and unknown attacks.  …”
    Get full text
    Article
  18. 398
  19. 399

    Lightweight machine learning framework for efficient DDoS attack detection in IoT networks by Mamoona Nawaz, Shireen Tahira, Dilawar Shah, Shujaat Ali, Muhammad Tahir

    Published 2025-07-01
    “…Abstract The rapid proliferation of Internet of Things (IoT) devices has introduced significant security challenges, with Distributed Denial of Service (DDoS) attacks posing a critical threat to network integrity. …”
    Get full text
    Article
  20. 400

    Explainability of Network Intrusion Detection Using Transformers: A Packet-Level Approach by Pahavalan Rajkumardheivanayahi, Ryan Berry, Nicholas U. Costagliola, Lance Fiondella, Nathaniel D. Bastian, Gokhan Kul

    Published 2025-01-01
    “…Network Intrusion Detection Systems (NIDS) are critical in ensuring the security of connected computer systems by actively detecting and preventing unauthorized activities and malicious attacks. …”
    Get full text
    Article