Showing 501 - 520 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))', query time: 0.23s Refine Results
  1. 501

    A Human-Centric, Uncertainty-Aware Event-Fused AI Network for Robust Face Recognition in Adverse Conditions by Akmalbek Abdusalomov, Sabina Umirzakova, Elbek Boymatov, Dilnoza Zaripova, Shukhrat Kamalov, Zavqiddin Temirov, Wonjun Jeong, Hyoungsun Choi, Taeg Keun Whangbo

    Published 2025-06-01
    “…Complementing this, an Adaptive Spectral Attention mechanism dynamically reweights each stream to amplify the most reliable facial features in real time. Unlike previous efforts that compartmentalize uncertainty handling, spectral blending, or computational thrift, HUE-Net unites all three in a lightweight package. …”
    Get full text
    Article
  2. 502
  3. 503

    A Hybrid CNN-LSTM Model With Attention Mechanism for Improved Intrusion Detection in Wireless IoT Sensor Networks by Pendukeni Phalaagae, Adamu Murtala Zungeru, Abid Yahya, Boyce Sigweni, Selvaraj Rajalakshmi

    Published 2025-01-01
    “…The framework’s resilience and adaptability underscore its potential for enhancing network security in real-world IoT applications by addressing evolving threats and computational constraints.…”
    Get full text
    Article
  4. 504

    CNN-Based Object Recognition and Tracking System to Assist Visually Impaired People by Fahad Ashiq, Muhammad Asif, Maaz Bin Ahmad, Sadia Zafar, Khalid Masood, Toqeer Mahmood, Muhammad Tariq Mahmood, Ik Hyun Lee

    Published 2022-01-01
    “…The application uses MobileNet architecture due to its low computational complexity to run on low-power end devices. …”
    Get full text
    Article
  5. 505
  6. 506
  7. 507

    A Novel Ensemble of Deep Learning Approach for Cybersecurity Intrusion Detection with Explainable Artificial Intelligence by Abdullah Alabdulatif

    Published 2025-07-01
    “…The framework is deployed using a Flask-based web interface in the Amazon Elastic Compute Cloud environment, capturing live network traffic and offering sub-second inference with visual alerts. …”
    Get full text
    Article
  8. 508
  9. 509

    Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space by Jian-hua LI

    Published 2016-02-01
    “…With a rapid development of information technologies including big data,cloud computing,Internet of things,etc.,the threats in cyber space also become more ubiquitous and complex.Moreover,more and more persis-tence and hidden features present in all kinds of network attacks.Threat intelligence based network defense can analyze the undergoing attacks and predict the threat situation in the future.Furthermore,based on the potential risk,users can define efficient security policy,thus the defense capabilities of the cyber space could be enhanced system-atically.Threat intelligence is a very wide research area.The research works and developments of the sensing,shar-ing and analysis for threat intelligence were studied and reviewed deeply.…”
    Get full text
    Article
  10. 510

    DDoS Attack Detection in SDN-Assisted Federated Learning Environment Based on Contrastive Learning by Minghong Fan, Jinghua Lan, Yiyi Zhou, Mengshuang Pan, Junrong Li, Daqiang Zhang

    Published 2025-01-01
    “…Software-defined networking (SDN)-assisted federated learning (FL) is an emerging network computing environment. …”
    Get full text
    Article
  11. 511

    A Novel Dangerous Goods Detection Network Based on Multi-Layer Attention Mechanism in X-Ray Baggage Images by Xu Yang, Ting Lan, Yili Xu

    Published 2025-01-01
    “…The automatic detection of dangerous goods in X-ray baggage images is a crucial task in the field of industrial security. This paper proposes a novel dangerous goods detection network (DGDN) designed to address the challenges of detecting dangerous goods in complex X-ray baggage images. …”
    Get full text
    Article
  12. 512
  13. 513
  14. 514
  15. 515
  16. 516
  17. 517
  18. 518

    A big data analysis algorithm for massive sensor medical images by Sarah A. Alzakari, Nuha Alruwais, Shaymaa Sorour, Shouki A. Ebad, Asma Abbas Hassan Elnour, Ahmed Sayed

    Published 2024-11-01
    “…Current anomaly detection methods in healthcare systems, such as artificial intelligence and big data analytics-intracerebral hemorrhage (AIBDA-ICH) and parallel conformer neural network (PCNN), face several challenges, including high resource consumption, inefficient feature selection, and an inability to handle temporal data effectively for real-time monitoring. …”
    Get full text
    Article
  19. 519
  20. 520