-
61
-
62
DeepSpoofNet: a framework for securing UAVs against GPS spoofing attacks
Published 2025-03-01Get full text
Article -
63
An intelligent IDS using bagging based fuzzy CNN for secured communication in vehicular networks
Published 2025-07-01Get full text
Article -
64
Pre-authentication and group management based secure handover for space-earth integration network
Published 2016-07-01“…In space-earth integration network,high-speed movement of space nodes brings in the problem of fre-quent satellite access router (SAR) handover.A group-based secure handover scheme for multiple mobility nodes (MN) utilizing satellite trajectory prediction was proposed.By using the movement features of the corresponding entities,an efficient aggregation mechanism for the interaction message occurred during the multi-MN handover was put forward.By using predictable satellite trajectory,authentication and session key agreement between new SAR and MN was accomplished beforehand with the secure context.Compared with existing schemes,the proposed scheme can provide necessary security features,lower the handover delay,and reduce the computation and commu-nication overhead of mutual authentication and key agreement.The proposed scheme well suits the space-earth inte-gration network,where the satellite node is energy constraint.…”
Get full text
Article -
65
qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era
Published 2025-01-01“…This innovative combination of WireGuard protocol, PQC algorithms, and PUF technology creates a VPN system with significantly improved security features. To validate its effectiveness, the performance of the proposed qTrustNet VPN was rigorously evaluated in a 10GbE NIC network environment. …”
Get full text
Article -
66
Analysis of software defined security model and architecture
Published 2017-06-01“…Currently,most enterprises have deployed information security defense system based on policy access control.With cloud computing environment deployment and network attacking technology development,security has been regarded as one of the greatest problems in the cloud computing environment.The advanced persistent attacks including of bypassing the traditional firewall easily,breaking through the black and white list and feature matching of the security defense mechanism have included to the traditional security system new challenges.The problem in the traditional tightly coupled security defense system of combining the virtual with the true for construction of network environments was described,and a software defined security model and framework was provided.The decoupling scheme of access patterns and deployment position in combining the virtual with the true for construction of network environments was realized,which provided a beneficial exploration in the field of the adaptive active safety for enterprise cloud computing environment.…”
Get full text
Article -
67
AI-Driven Adaptive Security for Sensor Networks: Next-Generation Firewalls for Attack Detection
Published 2025-01-01“…Traditional static firewalls and computationally intensive deep learning models are impractical for securing such networks. …”
Get full text
Article -
68
Securing Industrial IoT Environments: A Fuzzy Graph Attention Network for Robust Intrusion Detection
Published 2025-01-01Get full text
Article -
69
MFI-Net: multi-level feature invertible network image concealment technique
Published 2025-02-01Get full text
Article -
70
An effectiveness of deep learning with fox optimizer-based feature selection model for securing cyberattack detection in IoT environments
Published 2025-08-01“…Usually, cybersecurity is considered a group of processes and technologies intended to safeguard networks, computers, data, and programs against malicious attacks, harm, activities, or unauthorized access. …”
Get full text
Article -
71
Analysis of security and privacy challenges of smart health and sensing systems
Published 2024-12-01Get full text
Article -
72
-
73
Advancing Artificial Intelligence of Things Security: Integrating Feature Selection and Deep Learning for Real-Time Intrusion Detection
Published 2025-03-01“…An effective IDS is crucial as evolving threats continue to expose new security vulnerabilities. This study proposes an integrated approach combining feature selection methods and principal component analysis (PCA) with advanced deep learning (DL) models for real-time intrusion detection, significantly improving both computational efficiency and accuracy compared to previous methods. …”
Get full text
Article -
74
-
75
A Hybrid Deep Learning Paradigm for Robust Feature Extraction and Classification for Cataracts
Published 2025-04-01Get full text
Article -
76
Detecting Unbalanced Network Traffic Intrusions With Deep Learning
Published 2024-01-01Get full text
Article -
77
Enhancing Security in DNP3 Communication for Smart Grids: A Segmented Neural Network Approach
Published 2025-01-01Get full text
Article -
78
-
79
Secure healthcare data sharing and attack detection framework using radial basis neural network
Published 2025-05-01Get full text
Article -
80
A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks
Published 2013-04-01Get full text
Article