-
121
Encrypted Image Retrieval System based on Features Analysis
Published 2018-07-01“…However, since communication between digital products takes place in a public network, the necessity of security for digital images becomes vital. …”
Get full text
Article -
122
A Proactive Model for Intrusion Detection Using Image Representation of Network Flows
Published 2024-01-01Get full text
Article -
123
IMpc-PyrYOLO: Hybrid YOLO Based Feature Pyramidal Network for Pest Detection in Rice Leaves
Published 2025-06-01“…The model integrates an efficient channel attention (ECA) mechanism with the feature pyramidal network (FPN) in the YOLO network to improve multi-scale feature extraction and pest classification accuracy. …”
Get full text
Article -
124
Analysis of Basic Compounds in a Network Intrusion Detection System using NSL-KDD Data
Published 2013-03-01Get full text
Article -
125
Encrypted malicious traffic detection based on neural network
Published 2025-03-01Get full text
Article -
126
-
127
Efficient IDS for IoT Networks Using Host-Based Data Aggregation and Multi-Entropy Analysis
Published 2025-01-01Get full text
Article -
128
Cross-Architecture Vulnerability Detection Combining Semantic and Attribute Feature
Published 2025-03-01Get full text
Article -
129
Enhancing IoT device security: CNN-SVM hybrid approach for real-time detection of DoS and DDoS attacks
Published 2024-11-01“…Therefore, developing a secure IoT system is vital, shielding against attackers leveraging IoT devices to obtain network access and maintaining data security during transmission between these devices. …”
Get full text
Article -
130
Connected Vehicles Security: A Lightweight Machine Learning Model to Detect VANET Attacks
Published 2025-06-01“…Vehicular ad hoc networks (VANETs) aim to manage traffic, prevent accidents, and regulate various parts of traffic. …”
Get full text
Article -
131
Multiscale Two-Stream Fusion Network for Benggang Classification in Multi-Source Images
Published 2025-05-01Get full text
Article -
132
FFT-RDNet: A Time–Frequency-Domain-Based Intrusion Detection Model for IoT Security
Published 2025-07-01“…This network effectively captures complex periodic attack patterns with minimal computational overhead. …”
Get full text
Article -
133
An adaptive hybrid framework for IIoT intrusion detection using neural networks and feature optimization using genetic algorithms
Published 2025-05-01“…Abstract In Industrial Internet of Things (IIoT) networks, securing device connectivity through effective intrusion detection systems is essential for maintaining operational integrity. …”
Get full text
Article -
134
CSTAN: A Deepfake Detection Network with CST Attention for Superior Generalization
Published 2024-11-01Get full text
Article -
135
A topology-guided high-quality solution learning framework for security-constraint unit commitment based on graph convolutional network
Published 2025-03-01“…In this sense, this paper proposes a topology-guided high-quality solution learning framework based on graph convolutional network (GCN) and neighborhood search (NS). Firstly, a GCN-based method is presented to learn the potential patterns between commitments and graph data associated with bus feature and power grid topology. …”
Get full text
Article -
136
Cross-stream attention enhanced central difference convolutional network for CG image detection
Published 2024-12-01“…Therefore, an innovative cross-stream attention enhanced central difference convolutional network was proposed, aiming at improving the accuracy of CG image detection. …”
Get full text
Article -
137
-
138
Intrusion Detection and Real-Time Adaptive Security in Medical IoT Using a Cyber-Physical System Design
Published 2025-07-01Get full text
Article -
139
-
140
Cyberterrorism: content, forms and promising countermeasures
Published 2023-10-01“…The main forms of cyber terrorism are revealed: the commission of terrorist acts by organisations, groups and individuals using computers and computer networks or by influencing the information processed (circulated) in them, as well as the use of cyberspace for other purposes of terrorist activities not directly related to the commission of terrorist acts. …”
Get full text
Article