-
101
-
102
A deep Reinforcement learning-based robust Intrusion Detection System for securing IoMT Healthcare Networks
Published 2025-04-01“…However, the widespread deployment of these devices introduces significant security vulnerabilities due to limited resources and inadequate network protocols. …”
Get full text
Article -
103
Build with intrinsic security: Trusted autonomy security system
Published 2020-11-01“…Compared to traditional Internet of things networks, this architecture uses trusted computing technique to build the basic of security, and makes Internet of things network available to manage security automatically. …”
Get full text
Article -
104
-
105
-
106
MW‐SAM:Mangrove wetland remote sensing image segmentation network based on segment anything model
Published 2024-12-01Get full text
Article -
107
-
108
Style Transfer and Topological Feature Analysis of Text-Based CAPTCHA via Generative Adversarial Networks
Published 2025-06-01“…The design and cracking of text-based CAPTCHAs are important topics in computer security. This study proposes a method for the style transfer of text-based CAPTCHAs using Generative Adversarial Networks (GANs). …”
Get full text
Article -
109
-
110
Bankruptcy forecasting in enterprises and its security using hybrid deep learning models
Published 2025-12-01Get full text
Article -
111
GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks
Published 2020-01-01“…Due to the dual constraints of the hybrid feature of edge computing networks and the uncertainty of new attack features, implementing active defence measures such as detection, evasion, trap, and control is essential for the security protection of edge computing networks with high real-time and continuity requirements. …”
Get full text
Article -
112
Beyond Traditional Biometrics: Harnessing Chest X-Ray Features for Robust Person Identification
Published 2024-08-01Get full text
Article -
113
A low cost compact network TAP device with Raspberry Pi 4
Published 2025-10-01“…With this feature Network TAP devices play a main role in network security, network visibility, network monitoring, forensics, etc. …”
Get full text
Article -
114
PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing
Published 2021-05-01Get full text
Article -
115
-
116
A Verifiably Secure and Lightweight Device-to-Device (D2D) Authentication Protocol for the Resource-Constrained IoT Networks
Published 2025-01-01“…The protocol minimizes energy and computational costs while ensuring strong security by utilizing mutual authentication and effective cryptographic primitives. …”
Get full text
Article -
117
-
118
FE-DIoT: IoT Device Classification Through Dynamic Feature Selection and Adaptive Cross-Network Model
Published 2024-01-01Get full text
Article -
119
ConvGRU: A Lightweight Intrusion Detection System for Vehicle Networks Based on Shallow CNN and GRU
Published 2025-01-01“…To address these challenges, this study proposes ConvGRU, a lightweight vehicular network intrusion detection model that integrates a shallow Convolutional Neural Network (CNN) with a Gated Recurrent Unit (GRU). …”
Get full text
Article -
120
Enhancing intrusion detection in IoT networks using machine learning-based feature selection and ensemble models
Published 2024-12-01“…Internet of Things (IoT) technology has evolved significantly, transitioning from personal devices to powering smart cities and global deployments across diverse industries. However, security challenges arise due to diverse devices using various protocols and having limited computational capabilities, leading to vulnerabilities and potential intrusions in IoT networks. …”
Get full text
Article