Showing 281 - 300 results of 836 for search 'Computer network Security features.', query time: 0.15s Refine Results
  1. 281

    Design of an integrated model using deep reinforcement learning and Variational Autoencoders for enhanced quantum security by Harshala Shingne, Diptee Chikmurge, Priya Parkhi, Poorva Agrawal

    Published 2025-12-01
    “…Finally, it considers the optimization of cryptographic protocols in a distributed quantum network using Multi-Agent Deep Q-Networks. This multi-agent system strengthens both the security and computational efficiency by reducing attack vulnerabilities by 15–18 % and lowering the computational complexity by 20–25 %. …”
    Get full text
    Article
  2. 282

    Securing IoT Communications via Anomaly Traffic Detection: Synergy of Genetic Algorithm and Ensemble Method by Behnam Seyedi, Octavian Postolache

    Published 2025-06-01
    “…However, IoT systems face significant security challenges due to decentralized architectures, resource-constrained devices, and dynamic network environments. …”
    Get full text
    Article
  3. 283

    BERT-based network for intrusion detection system by Yong Yang, Xing Peng

    Published 2025-03-01
    “…The BERT model, with its bidirectional encoder structure, captures complex contextual information in sequences, producing high-quality feature representations. After feature extraction is completed, we further perform classification using a classifier based on a bidirectional gated recurrent unit (GRU) network, which is able to efficiently process sequence data and reduce computational complexity while capturing temporal dependencies in the sequences. …”
    Get full text
    Article
  4. 284
  5. 285

    Refined Judgment of Urban Traffic State Based on Machine Learning and Edge Computing by Lijuan Liu

    Published 2022-01-01
    “…For providing short-distance services and applications, we should start from the edge of the program to create a faster network. Service response covers the basic needs of real-time processing industry, intelligent applications, and security and privacy protection. …”
    Get full text
    Article
  6. 286
  7. 287
  8. 288
  9. 289

    Botnets’ similarity analysis based on communication features and D-S evidence theory by ZANG Tian-ning1, YUN Xiao-chun1, ZHANG Yong-zheng2, MEN Chao-guang1, CUI Xiang2

    Published 2011-01-01
    “…A potential hidden relationship may exist among different zombie groups.A method to analyze the relationship among botnets was proposed based on the communication activities.The method extracted several communication fea-tures of botnet,including the number of flows per hour,the number of packets per flow,the number of flows per IP and the packet payloads.It defined similarity statistical functions of the communication features,and built the analysis model of botnets relationship based on the advanced dempster-shafer(D-S) evidence theory to synthetically evaluate the simi-larities between different zombie groups.The experiments were conducted using several botnet traces.The results show that the method is valid and efficient,even in the case of encrypted botnet communication messages.Moreover,the ideal processing results is achieved by applying our method to analyze the data captured from the security monitoring platform of computer network,as well as compare with similar work.…”
    Get full text
    Article
  10. 290
  11. 291
  12. 292
  13. 293
  14. 294
  15. 295
  16. 296
  17. 297
  18. 298
  19. 299
  20. 300