-
281
Design of an integrated model using deep reinforcement learning and Variational Autoencoders for enhanced quantum security
Published 2025-12-01“…Finally, it considers the optimization of cryptographic protocols in a distributed quantum network using Multi-Agent Deep Q-Networks. This multi-agent system strengthens both the security and computational efficiency by reducing attack vulnerabilities by 15–18 % and lowering the computational complexity by 20–25 %. …”
Get full text
Article -
282
Securing IoT Communications via Anomaly Traffic Detection: Synergy of Genetic Algorithm and Ensemble Method
Published 2025-06-01“…However, IoT systems face significant security challenges due to decentralized architectures, resource-constrained devices, and dynamic network environments. …”
Get full text
Article -
283
BERT-based network for intrusion detection system
Published 2025-03-01“…The BERT model, with its bidirectional encoder structure, captures complex contextual information in sequences, producing high-quality feature representations. After feature extraction is completed, we further perform classification using a classifier based on a bidirectional gated recurrent unit (GRU) network, which is able to efficiently process sequence data and reduce computational complexity while capturing temporal dependencies in the sequences. …”
Get full text
Article -
284
A Novel Semantic Driven Meta-Learning Model for Rare Attack Detection
Published 2025-01-01Get full text
Article -
285
Refined Judgment of Urban Traffic State Based on Machine Learning and Edge Computing
Published 2022-01-01“…For providing short-distance services and applications, we should start from the edge of the program to create a faster network. Service response covers the basic needs of real-time processing industry, intelligent applications, and security and privacy protection. …”
Get full text
Article -
286
An Mcformer encoder integrating Mamba and Cgmlp for improved acoustic feature extraction
Published 2025-07-01Get full text
Article -
287
IoT‐Based Elderly Health Monitoring System Using Firebase Cloud Computing
Published 2025-03-01Get full text
Article -
288
Analysis and Identification of Students with Financial Difficulties: A Behavioural Feature Perspective
Published 2020-01-01Get full text
Article -
289
Botnets’ similarity analysis based on communication features and D-S evidence theory
Published 2011-01-01“…A potential hidden relationship may exist among different zombie groups.A method to analyze the relationship among botnets was proposed based on the communication activities.The method extracted several communication fea-tures of botnet,including the number of flows per hour,the number of packets per flow,the number of flows per IP and the packet payloads.It defined similarity statistical functions of the communication features,and built the analysis model of botnets relationship based on the advanced dempster-shafer(D-S) evidence theory to synthetically evaluate the simi-larities between different zombie groups.The experiments were conducted using several botnet traces.The results show that the method is valid and efficient,even in the case of encrypted botnet communication messages.Moreover,the ideal processing results is achieved by applying our method to analyze the data captured from the security monitoring platform of computer network,as well as compare with similar work.…”
Get full text
Article -
290
Advances to IoT security using a GRU-CNN deep learning model trained on SUCMO algorithm
Published 2025-05-01Get full text
Article -
291
-
292
Real-time multi-level trust-based secure routing for improved QoS in WSN using blockchain
Published 2025-06-01Get full text
Article -
293
AgriChainSync: A Scalable and Secure Blockchain-Enabled Framework for IoT-Driven Precision Agriculture
Published 2024-01-01Get full text
Article -
294
Design a new scheme for image security using a deep learning technique of hierarchical parameters
Published 2024-10-01Get full text
Article -
295
-
296
-
297
FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review
Published 2021-03-01“…Data security, integrity, and verification may be used due to these features. …”
Get full text
Article -
298
VAE-Based Real-Time Anomaly Detection Approach for Enhanced V2X Communication Security
Published 2025-06-01Get full text
Article -
299
A computational enhancement of Base64 algorithm using Residue Number System algorithms
Published 2025-03-01Get full text
Article -
300