Showing 81 - 100 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))~', query time: 0.11s Refine Results
  1. 81
  2. 82

    Multi-Branch Feature Alignment Network for Misaligned and Occluded Person Re-Identification by Chunyan Lyu, Hai Huang, Lixi Zhang, Wenting Zhu, Zhengyang Wang, Kejun Wang, Caidong Jiao

    Published 2024-01-01
    “…As a pivotal computer vision technique, person re-identification (re-ID) assumes a paramount role in bolstering public security. …”
    Get full text
    Article
  3. 83
  4. 84
  5. 85
  6. 86

    An Effective Network Intrusion Detection System Using Recursive Feature Elimination Technique by Narendra Singh Yadav, Vijay Prakash Sharma, D. Sikha Datta Reddy, Saswati Mishra

    Published 2023-12-01
    “…Machine learning facilitates the growth of an intrusion detection system (IDS) in the context of cyber security. These systems are proposed to identify and classify cyber-attacks on the network. …”
    Get full text
    Article
  7. 87
  8. 88

    Security and Fairness in Multiparty Quantum Secret Sharing Protocol by Alessio Di Santo, Walter Tiberti, Dajana Cassioli

    Published 2025-01-01
    “…However, none of these works account for redundancy, enhanced security/privacy features, or authentication mechanisms able to fingerprint players. …”
    Get full text
    Article
  9. 89
  10. 90
  11. 91
  12. 92

    Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging by Ikram Benfarhat, Vik Tor Goh, Chun Lim Siow, Muhammad Sheraz, Teong Chee Chuah

    Published 2025-01-01
    “…Securing data transactions across computer networks presents significant challenges, particularly concerning data privacy and cybersecurity threats. …”
    Get full text
    Article
  13. 93
  14. 94
  15. 95

    An Effective Method for Detecting Cyber Attacks on Computer Networks from the NSL-KDD Data Set by Shaik Aseena Babu, Reddy Rajeswara, Vullam Nagagopi Raju, Reddy Gondi Konda, Shaik Subhani

    Published 2025-01-01
    “…Logistic regression models can fully favor network traffic structure information to capture features more comprehensively. …”
    Get full text
    Article
  16. 96

    Restricted Boltzmann machine with Sobel filter dense adversarial noise secured layer framework for flower species recognition by Shyamala Devi M, Sundaravadivazhagan Balasubaramanian, Balasubramaniam S, Mohd Asif Shah

    Published 2025-04-01
    “…The first contribution deals with the dataset preparation by means of feature extraction through the use of the Sobel filter and the Restricted Boltzmann Machine (RBM) neural network approach through unsupervised learning. …”
    Get full text
    Article
  17. 97

    Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques by Hanaa Attou, Azidine Guezzaz, Said Benkirane, Mourade Azrour, Yousef Farhaoui

    Published 2023-09-01
    “…Cloud computing (CC) is a novel technology that has made it easier to access network and computer resources on demand such as storage and data management services. …”
    Get full text
    Article
  18. 98
  19. 99
  20. 100