Showing 101 - 120 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))', query time: 0.24s Refine Results
  1. 101
  2. 102

    A deep Reinforcement learning-based robust Intrusion Detection System for securing IoMT Healthcare Networks by Jamshed Ali Shaikh, Chengliang Wang, Muhammad Wajeeh Us Sima, Muhammad Arshad, Muhammad Owais, Dina S. M. Hassan, Reem Alkanhel, Mohammed Saleh Ali Muthanna

    Published 2025-04-01
    “…However, the widespread deployment of these devices introduces significant security vulnerabilities due to limited resources and inadequate network protocols. …”
    Get full text
    Article
  3. 103

    Build with intrinsic security: Trusted autonomy security system by Shen He, Jing Huang, Penglin Yang

    Published 2020-11-01
    “…Compared to traditional Internet of things networks, this architecture uses trusted computing technique to build the basic of security, and makes Internet of things network available to manage security automatically. …”
    Get full text
    Article
  4. 104
  5. 105
  6. 106
  7. 107
  8. 108

    Style Transfer and Topological Feature Analysis of Text-Based CAPTCHA via Generative Adversarial Networks by Tao Xue, Zixuan Guo, Zehang Yin, Yu Rong

    Published 2025-06-01
    “…The design and cracking of text-based CAPTCHAs are important topics in computer security. This study proposes a method for the style transfer of text-based CAPTCHAs using Generative Adversarial Networks (GANs). …”
    Get full text
    Article
  9. 109
  10. 110
  11. 111

    GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks by Qianmu Li, Jun Hou, Shunmei Meng, Huaqiu Long

    Published 2020-01-01
    “…Due to the dual constraints of the hybrid feature of edge computing networks and the uncertainty of new attack features, implementing active defence measures such as detection, evasion, trap, and control is essential for the security protection of edge computing networks with high real-time and continuity requirements. …”
    Get full text
    Article
  12. 112
  13. 113

    A low cost compact network TAP device with Raspberry Pi 4 by Murat Varol, Murat İskefiyeli

    Published 2025-10-01
    “…With this feature Network TAP devices play a main role in network security, network visibility, network monitoring, forensics, etc. …”
    Get full text
    Article
  14. 114
  15. 115
  16. 116

    A Verifiably Secure and Lightweight Device-to-Device (D2D) Authentication Protocol for the Resource-Constrained IoT Networks by Naif Alzahrani

    Published 2025-01-01
    “…The protocol minimizes energy and computational costs while ensuring strong security by utilizing mutual authentication and effective cryptographic primitives. …”
    Get full text
    Article
  17. 117
  18. 118
  19. 119

    ConvGRU: A Lightweight Intrusion Detection System for Vehicle Networks Based on Shallow CNN and GRU by Shaoqiang Wang, Jiahui Cheng, Yizhe Wang, Shutong Li, Lei Kang, Yinfei Dai

    Published 2025-01-01
    “…To address these challenges, this study proposes ConvGRU, a lightweight vehicular network intrusion detection model that integrates a shallow Convolutional Neural Network (CNN) with a Gated Recurrent Unit (GRU). …”
    Get full text
    Article
  20. 120

    Enhancing intrusion detection in IoT networks using machine learning-based feature selection and ensemble models by Ayoob Almotairi, Samer Atawneh, Osama A. Khashan, Nour M. Khafajah

    Published 2024-12-01
    “…Internet of Things (IoT) technology has evolved significantly, transitioning from personal devices to powering smart cities and global deployments across diverse industries. However, security challenges arise due to diverse devices using various protocols and having limited computational capabilities, leading to vulnerabilities and potential intrusions in IoT networks. …”
    Get full text
    Article