Showing 201 - 220 results of 836 for search 'Computer network Security features.', query time: 0.19s Refine Results
  1. 201

    Zero-day exploits detection with adaptive WavePCA-Autoencoder (AWPA) adaptive hybrid exploit detection network (AHEDNet) by Ahmed A. Mohamed, Abdullah Al-Saleh, Sunil Kumar Sharma, Ghanshyam G. Tejani

    Published 2025-02-01
    “…Additionally, a novel “Meta-Attention Transformer Autoencoder (MATA)” for enhancing feature extraction which address the subtlety issue, and improves the model’s ability and flexibility to detect new security threats, and a novel “Genetic Mongoose-Chameleon Optimization (GMCO)” was introduced for effective feature selection in the case of addressing the efficiency challenges. …”
    Get full text
    Article
  2. 202

    A comprehensive survey on techniques, challenges, evaluation metrics and applications of deep learning models for anomaly detection by Mudita Kohli, Indu Chhabra

    Published 2025-07-01
    “…Abstract Connected devices improve life quality and generate a large amount of data which require computation and transfer; the need for security becomes a major concern with networks evolving in complexity and scale. …”
    Get full text
    Article
  3. 203

    A novel integration of multi-stocked gated variant recurrent units and Kolmogorov-Arnold tuned deep training networks for anchoring the intrusion detection against computer attacks by M. Saritha, Saidireddy Malgireddy

    Published 2025-07-01
    “…Abstract With the explosive expansion of smart computers, there is a rapid intrusion of network attacks in the user’s personal life that intensifies the privacy and security breaches. …”
    Get full text
    Article
  4. 204
  5. 205

    A novel speaker verification approach featuring multidomain acoustics based on the weighted city-block Minkowski distance by Khushboo Jha, Sumit Srivastava, Aruna Jain

    Published 2025-04-01
    “…Access control is vital in interconnected environments like the Internet of Things, Industry 4.0, and smart connectivity, ensuring authorized access for security. Biometric-based access, particularly speaker verification (SV), enhances security with unique vocal features, offering nonintrusive authenti-cation with continuous monitoring. …”
    Get full text
    Article
  6. 206
  7. 207
  8. 208
  9. 209
  10. 210
  11. 211
  12. 212
  13. 213
  14. 214
  15. 215
  16. 216
  17. 217
  18. 218
  19. 219
  20. 220