Showing 661 - 680 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))', query time: 0.17s Refine Results
  1. 661
  2. 662
  3. 663
  4. 664

    Explainable and cognitive attention evoked learning framework for mitigating the large-scale real time cyber attacks by Ragipani Sowmya, Bhagavan Konduri

    Published 2025-07-01
    “…The proposed system integrates an Attention-Evoked Gated Recurrent (AEGR) and Long Short-Term Memory Network (AEGR-LSTM) to mitigate threats posed by malicious activities. …”
    Get full text
    Article
  5. 665
  6. 666

    Fine-art recognition using convolutional transformers by Yu Liu, Haozhe Bai, Jingchao Wang

    Published 2024-10-01
    “…To assess the performance of our model, we compared it with those developed using four pre-trained networks: ResNet50, VGG16, AlexNet, and ViT. Each pre-trained network was integrated into a corresponding state-of-the-art model as the first processing blocks. …”
    Get full text
    Article
  7. 667
  8. 668

    A Novel Hybrid Method Using Grey Wolf Algorithm and Genetic Algorithm for IoT Botnet DDoS Attacks Detection by Mahdieh Maazalahi, Soodeh Hosseini

    Published 2025-03-01
    “…Abstract The Internet of Things (IoT) is a vast network of interconnected physical objects that has improved the conditions for a computer-based physical world and improved efficiency. …”
    Get full text
    Article
  9. 669
  10. 670
  11. 671
  12. 672
  13. 673

    Editorial by Christian Gütl

    Published 2024-11-01
    “…Khan, Sunil Kashyap and Manoj Kumar Chande from India conduct their study on the certificateless aggregate signature scheme in terms of their computational performance and security, which can be widely used in areas such as IoT or healthcare systems. …”
    Get full text
    Article
  14. 674
  15. 675
  16. 676
  17. 677
  18. 678
  19. 679
  20. 680