Showing 21 - 40 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))~', query time: 0.23s Refine Results
  1. 21

    Resource-Efficient Traffic Classification Using Feature Selection for Message Queuing Telemetry Transport-Internet of Things Network-Based Security Attacks by Emmanuel Tuyishime, Marco Martalò, Petru A. Cotfas, Vlad Popescu, Daniel T. Cotfas, Alexandre Rekeraho

    Published 2025-04-01
    “…Anomaly detection, primarily through traffic classification supported by artificial intelligence and machine learning techniques, has emerged as a practical approach to enhancing IoT network security. Effective traffic classification requires efficient feature selection, which is critical for resource-constrained IoT devices with limited computational power, memory, and energy. …”
    Get full text
    Article
  2. 22
  3. 23

    Machine learning based multi-stage intrusion detection system and feature selection ensemble security in cloud assisted vehicular ad hoc networks by C. Christy, A. Nirmala, A. Mary Odilya Teena, A. Isabella Amali

    Published 2025-07-01
    “…This research ensures next-generation transport networkssecure and reliable functioning and prepares the path for VANET protection upgrades. …”
    Get full text
    Article
  4. 24

    Metaheuristic Algorithms for Optimization and Feature Selection in Cloud Data Classification Using Convolutional Neural Network by Nandita Goyal, Munesh Chandra Trivedi

    Published 2023-08-01
    “…Cloud forensics plays a vital role to address the security issues related to cloud computing by identifying, collecting and studying digital evidence in cloud environment.The aim of the research paper is to explore the concept of cloud forensic by applying optimization for feature selection before classification of data on cloud side. …”
    Get full text
    Article
  5. 25

    ENHANCING NETWORK INTRUSION DETECTION USING MACHINE LEARNING AND META-MODELLING FOR IMPROVED CYBER SECURITY PERFORMANCE by Sunita, Pankaj Verma, Nitika, Jaspreet Kaur, Vijay Rana

    Published 2025-04-01
    “…This study is based on the analysis of network intrusion detection and the improvement of various machine learning methods that produce high accuracy and guarantee secure network traffic from malicious activities. …”
    Get full text
    Article
  6. 26
  7. 27

    Systematic Approach for Malware Detection in IoT Devices: Enhancing Security and Performance by Vasudeva Pai, B. H. Karthik Pai, G. S. Sudhiksha, Vandya Kamath, K. Varsha, S. Manjunatha

    Published 2025-07-01
    “…These include ensemble methods such as Bagging, Stacking, Voting, AdaBoost, and H2O AutoML, as well as advanced models such as sparse neural networks with pruning and feature selection and regularized classifiers L1. …”
    Get full text
    Article
  8. 28
  9. 29

    Hybrid Convolutional Neural Network-Based Intrusion Detection System for Secure IoT Networks by Sami Qawasmeh, Ahmad Habboush, Bassam Elzaghmouri, Qasem Kharma, Da'ad Albalawneh

    Published 2025-08-01
    “…CNN-based intrusion detection in IoT networks is stressed in the study. It shows how hybrid CNN-based techniques can improve IoT network security and resilience. …”
    Get full text
    Article
  10. 30
  11. 31
  12. 32
  13. 33

    TriageHD: A Hyper-Dimensional Learning-to-Rank Framework for Dynamic Micro-Segmentation in Zero-Trust Network Security by Ryozo Masukawa, Sanggeon Yun, Sungheon Jeong, Nathaniel D. Bastian, Mohsen Imani

    Published 2025-01-01
    “…This paper presents TriageHD, a novel framework that integrates graph-based Hyper-Dimensional Computing (HDC) with a learning-to-rank algorithm to strengthen zero-trust network security. …”
    Get full text
    Article
  14. 34
  15. 35
  16. 36
  17. 37
  18. 38

    Effects of feature selection and normalization on network intrusion detection by Mubarak Albarka Umar, Zhanfang Chen, Khaled Shuaib, Yan Liu

    Published 2025-03-01
    “…Furthermore, while feature selection benefits simpler algorithms (such as RF), normalization is more useful for complex algorithms like ANNs and deep neural networks (DNNs), and algorithms such as Naive Bayes are unsuitable for IDS modeling. …”
    Get full text
    Article
  19. 39

    Research on SDN Architecture and Security by Shu1ing Wang, Jihan Li, Yunyong Zhang, Bingyi Fang

    Published 2013-03-01
    “…With the rapid deve1opment of c1oud computing and mobi1e internet, the features that network exhibits, such as diversity, dec1are for urgent requirements for sca1abi1ity, manageabi1ity and security of the data center.The SDN architecture shows a promising way of dea1ing with the above requirements of network through revo1utionary innovation of the traditiona1 network architecture, which attracts great interest of companies and research institutes.However, according to the recent research and progress of SDN, security prob1em has not been addressed, which wi11 be a significant issue.Based on the situation, the basis of SDN, inc1uding the origination, architecture, standardization work and standardized protoco1, were described, and the security issue was a1so ana1yzed.In the security part, the exhibiting new features of security prob1em for SDN, were ana1yzed, by 1isting the undergoing work, and then the security threats in SDN were conc1uded.Fina11y, a suggested architecture for security research of SDN was proposed.…”
    Get full text
    Article
  20. 40