-
1
Network traffic anomaly detection model based on feature grouping and multi‐autoencoders integration
Published 2024-12-01Get full text
Article -
2
An optimization model of computer network security based on GABP neural network algorithm
Published 2025-04-01“…Abstract Background Digital connectivity drives global innovation, ensuring computer network security is more critical than ever. …”
Get full text
Article -
3
Dual Feature-Based Intrusion Detection System for IoT Network Security
Published 2025-03-01Get full text
Article -
4
Analysis of features of implementing a “Port scanning” attack using a “Zombie” computer
Published 2024-07-01“…The method is based on computer simulation of a “port scanning” attack using a virtual infrastructure of the network.Result. …”
Get full text
Article -
5
-
6
Adversarial Threats to Cloud IDS: Robust Defense With Adversarial Training and Feature Selection
Published 2025-01-01Get full text
Article -
7
A Lightweight Intrusion Detection System with Dynamic Feature Fusion Federated Learning for Vehicular Network Security
Published 2025-07-01“…The rapid integration of complex sensors and electronic control units (ECUs) in autonomous vehicles significantly increases cybersecurity risks in vehicular networks. Although the Controller Area Network (CAN) is efficient, it lacks inherent security mechanisms and is vulnerable to various network attacks. …”
Get full text
Article -
8
Towards edge-collaborative,lightweight and secure region proposal network
Published 2020-10-01“…Aiming at the problem of image privacy leakage and computing efficiency in edge environment,a lightweight and secure region proposal network (SecRPN) was proposed.A series of secure computing protocols were designed based on the additive secret sharing scheme.Two non-collusive edge servers cooperate to perform calculation modules such as secure feature processing,secure anchor transformation,secure bounding-box correction,and secure non-maximum suppression.Theoretical analysis guarantees the correctness and security of SecRPN.The actual performance evaluation shows that SecRPN is outstanding in the computational cost and communication overhead compared with the existing works.…”
Get full text
Article -
9
HealthChain: A blockchain‐based framework for secure and interoperable electronic health records (EHRs)
Published 2024-12-01Get full text
Article -
10
Intelligent intrusion detection system based on crowd search optimization for attack classification in network security
Published 2025-07-01“…We have developed the hybrid model based on crow search optimization (CSO) and random forest (RF) algorithm for identifying threats and irregularities in a computer network. In comparison to the various state-of-the-art classifiers, the CSO method was applied to the NSL-KDD dataset and the ROSPaCe dataset for the detection of the attacks. …”
Get full text
Article -
11
LDoS attack detection method based on traffic classification prediction
Published 2022-03-01Get full text
Article -
12
Adversarial Robustness of Self-Supervised Learning Features
Published 2025-01-01Get full text
Article -
13
Intrusion Detection-Data Security Protection Scheme Based on Particle Swarm-BP Network Algorithm in Cloud Computing Environment
Published 2023-01-01“…Aiming at the problems of low detection rate and high false detection rate of intrusion detection algorithms in the traditional cloud computing environment, an intrusion detection-data security protection scheme based on particle swarm-BP network algorithm in a cloud computing environment is proposed. …”
Get full text
Article -
14
Network Security Situational Awareness Based on Improved Particle Swarm Algorithm and Bidirectional Long Short-Term Memory Modeling
Published 2025-02-01“…This indicates a high level of recognition and precision exhibited by the proposed model in detecting network security risk behaviors. Furthermore, in contrast to the traditional CNN neural network, the proposed model is more compact, which significantly reduces the computational overhead and allows for efficient network security situational awareness.…”
Get full text
Article -
15
Research on cloud computing users’ public safety trust model based on scorecard-random forest
Published 2018-05-01“…Traditional cloud computing trust models mainly focused on the calculation of the trust of users’ behavior.In the process of classification and evaluation,there were some problems such as ignorance of content security and lack of trust division verification.Aiming to solve these problems,cloud computing users’ public safety trust model based on scorecard-random forest was proposed.Firstly,the text was processed using Word2Vec in the data preprocessing stage.The convolution neural network (CNN) was used to extract the sentence features for user content tag classification.Then,scorecard method was used to filter the strong correlation index.Meanwhile,in order to establish the users’ public safety trust evaluation model in cloud computing,a random forest method was applied.Experimental results show that the proposed users’ public safety trust evaluation model outperforms the general trust evaluation model.The proposed model can effectively distinguish malicious users from normal users,and it can improve the efficiency of the cloud computing users management.…”
Get full text
Article -
16
-
17
Anomaly Detection Approach Based on Deep Neural Network and Dropout
Published 2020-06-01“…Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. …”
Get full text
Article -
18
Survey on data security and privacy-preserving for the research of edge computing
Published 2018-03-01“…With the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve such dilemma,the edge computing which deploys the cloud services in the edge network has envisioned to be the dominant cloud service paradigm in the era of IoT.Meanwhile,the unique features of edge computing,such as content perception,real-time computing,parallel processing and etc.…”
Get full text
Article -
19
Applications of big data cognitive computing in content security governance
Published 2021-11-01“…In the communication network, there is a mass of bad information needed to be read and understood to extract useful knowledge and features for governance.Methods based on manual analysis can not achieve this goal.It is necessary to adopt the big-data-based cognitive computing technology to help to understand massive data and customize content security strategies.Aiming at four practical problems including telecommunication fraud governance, bad message governance, variant message governance and bad website governance, the big data cognitive computing solutions were put forward, and the practical results were given.The results show that the solutions could find the bad information quickly, and improve the quality of the content security governance effectively.…”
Get full text
Article -
20
DualAD: Dual adversarial network for image anomaly detection⋆
Published 2024-12-01Get full text
Article