-
201
Zero-day exploits detection with adaptive WavePCA-Autoencoder (AWPA) adaptive hybrid exploit detection network (AHEDNet)
Published 2025-02-01“…Additionally, a novel “Meta-Attention Transformer Autoencoder (MATA)” for enhancing feature extraction which address the subtlety issue, and improves the model’s ability and flexibility to detect new security threats, and a novel “Genetic Mongoose-Chameleon Optimization (GMCO)” was introduced for effective feature selection in the case of addressing the efficiency challenges. …”
Get full text
Article -
202
A comprehensive survey on techniques, challenges, evaluation metrics and applications of deep learning models for anomaly detection
Published 2025-07-01“…Abstract Connected devices improve life quality and generate a large amount of data which require computation and transfer; the need for security becomes a major concern with networks evolving in complexity and scale. …”
Get full text
Article -
203
A novel integration of multi-stocked gated variant recurrent units and Kolmogorov-Arnold tuned deep training networks for anchoring the intrusion detection against computer attacks
Published 2025-07-01“…Abstract With the explosive expansion of smart computers, there is a rapid intrusion of network attacks in the user’s personal life that intensifies the privacy and security breaches. …”
Get full text
Article -
204
Knowledge Improved Hybrid DNN–KAN Framework for Intrusion Detection in Wireless Sensor Networks
Published 2025-01-01Get full text
Article -
205
A novel speaker verification approach featuring multidomain acoustics based on the weighted city-block Minkowski distance
Published 2025-04-01“…Access control is vital in interconnected environments like the Internet of Things, Industry 4.0, and smart connectivity, ensuring authorized access for security. Biometric-based access, particularly speaker verification (SV), enhances security with unique vocal features, offering nonintrusive authenti-cation with continuous monitoring. …”
Get full text
Article -
206
-
207
Hybrid Big Bang-Big crunch with cuckoo search for feature selection in credit card fraud detection
Published 2025-07-01Get full text
Article -
208
Pseudo-Random Identification and Efficient Privacy-Preserving V2X Communication for IoV Networks
Published 2025-01-01Get full text
Article -
209
-
210
-
211
Botnet detection in internet of things using stacked ensemble learning model
Published 2025-07-01Get full text
Article -
212
-
213
-
214
-
215
-
216
-
217
-
218
-
219
-
220