Showing 221 - 240 results of 836 for search 'Computer network Security features.', query time: 0.11s Refine Results
  1. 221
  2. 222
  3. 223
  4. 224

    Legal aspects of functional security standardisation of the Internet of Things by P. S. Klimushyn, V. Ye. Roh, T. P. Kolisnyk

    Published 2023-09-01
    “…The single phenomenon of IoT security has been identified as a complex concept that includes functional security and information security with their interconnection, contradictions, challenges and risks. …”
    Get full text
    Article
  5. 225
  6. 226
  7. 227
  8. 228
  9. 229
  10. 230

    A Novel Framework for Quantum-Enhanced Federated Learning with Edge Computing for Advanced Pain Assessment Using ECG Signals via Continuous Wavelet Transform Images by Madankumar Balasubramani, Monisha Srinivasan, Wei-Horng Jean, Shou-Zen Fan, Jiann-Shing Shieh

    Published 2025-02-01
    “…The cornerstone of our system is a Quantum Convolutional Hybrid Neural Network (QCHNN) that harnesses quantum entanglement properties to enhance feature detection and classification robustness. …”
    Get full text
    Article
  11. 231

    Biometric cryptosystem to secure smart object communications in the internet of things by Abdallah Meraoumia, Mohamed Amroune, Lakhadr Laimeche, Hakiml Bendjenna

    Published 2022-03-01
    “…Like any electronic application, the security aspect is one of the most difficult challenges in the creation and design of such networks. …”
    Get full text
    Article
  12. 232

    Considerations of Cloud Computing Contracts at the Conclusion Stage by Mohammadali Hasanian, Esmaeil Shahsavandi, Amirabbas Bozorgmehr

    Published 2025-03-01
    “…As a result, cloud computing is a model for providing services in information technology, which allows storing and processing information in It provides internet platform or private networks. …”
    Get full text
    Article
  13. 233
  14. 234

    X-FuseRLSTM: A Cross-Domain Explainable Intrusion Detection Framework in IoT Using the Attention-Guided Dual-Path Feature Fusion and Residual LSTM by Adel Alabbadi, Fuad Bajaber

    Published 2025-06-01
    “…The suggested method is appropriate for practical IoT security applications since it provides strong domain generalization and explainability while preserving computational efficiency.…”
    Get full text
    Article
  15. 235
  16. 236

    A Dual-Strategy Framework for Cyber Threat Detection in Imbalanced, High-Dimensional Data Across Heterogeneous Networks by T. Saranya, S. Indra Priyadharshini

    Published 2025-01-01
    “…As cyber threats grow in complexity, ensuring robust network security has become increasingly critical. …”
    Get full text
    Article
  17. 237
  18. 238

    UNIFIED MULTIMODAL BIOMETRICS FUSION USING DEEP LEARNING FOR SECURING IOT by Prabhjot Kaur, Chander Kaur

    Published 2024-12-01
    “…Our proposed approach employs “Convolutional Neural Network (CNN)” architectures, notable for their efficacy in computer vision tasks, to extract potent discriminative features from the input images. …”
    Get full text
    Article
  19. 239

    Ultra Wideband radar-based gait analysis for gender classification using artificial intelligence by Adil Ali Saleem, Hafeez Ur Rehman Siddiqui, Muhammad Amjad Raza, Sandra Dudley, Julio César Martínez Espinosa, Luis Alonso Dzul López, Isabel de la Torre Díez

    Published 2025-09-01
    “…Gender classification plays a vital role in various applications, particularly in security and healthcare. While several biometric methods such as facial recognition, voice analysis, activity monitoring, and gait recognition are commonly used, their accuracy and reliability often suffer due to challenges like body part occlusion, high computational costs, and recognition errors. …”
    Get full text
    Article
  20. 240