Showing 341 - 360 results of 836 for search 'Computer network Security features.', query time: 0.12s Refine Results
  1. 341
  2. 342

    Assessment methodology for security of an automated control system of critical information infrastructure against DDoS attacks based on Monte Carlo simulation by V. A. Voevodin, V. S. Chernyaev, D. S. Burenok, I. V. Vinogradov

    Published 2023-05-01
    “…A possible direction for further research is to study the issue of computer network security, taking into account the features of a specific topology.…”
    Get full text
    Article
  3. 343
  4. 344

    Towards edge-collaborative, lightweight and privacy-preserving classification framework by Jinbo XIONG, Yongjie ZHOU, Renwan BI, Liang WAN, Youliang TIAN

    Published 2022-01-01
    “…Aiming at the problems of data leakage of perceptual image and computational inefficiency of privacy-preserving classification framework in edge-side computing environment, a lightweight and privacy-preserving classification framework (PPCF) was proposed to supports encryption feature extraction and classification, and achieve the goal of data transmission and computing security under the collaborative classification process of edge nodes.Firstly, a series of secure computing protocols were designed based on additive secret sharing.Furthermore, two non-collusive edge servers were used to perform secure convolution, secure batch normalization, secure activation, secure pooling and other deep neural network computing layers to realize PPCF.Theoretical and security analysis indicate that PPCF has excellent accuracy and proved to be security.Actual performance evaluation show that PPCF can achieve the same classification accuracy as plaintext environment.At the same time, compared with homomorphic encryption and multi-round iterative calculation schemes, PPCF has obvious advantages in terms of computational cost and communication overhead.…”
    Get full text
    Article
  5. 345
  6. 346

    Lightweight Blockchain for Data Integrity and Traceability in IoT Networks by Laura Garcia, Carlos Cancimance, Rafael Asorey-Cacheda, Claudia-Liliana Zuniga-Canon, Antonio-Javier Garcia-Sanchez, Joan Garcia-Haro

    Published 2025-01-01
    “…In this regard, blockchain is a promising solution to enhance IoT security, but the implementation of a conventional blockchain requires high computational and network connectivity resources that are not compatible with IoT networks. …”
    Get full text
    Article
  7. 347

    Echoes From the Void: Detecting DNS Tunneling With Blackhole Features in Encrypted Scenarios With High Accuracy by Wafa S. Alorainy

    Published 2025-01-01
    “…Integration within existing security information and event management (SIEM) systems or DNS infrastructures implies API compatibility, scaling for heterogeneous networks, and minimizing the disruption of established workflow. …”
    Get full text
    Article
  8. 348

    An IoT intrusion detection framework based on feature selection and large language models fine-tuning by Huan Ma, Wan Zhang, Dalong Zhang, Baozhan Chen

    Published 2025-07-01
    “…Abstract The rapid proliferation of Internet of Things (IoT) devices has significantly expanded the network attack surface, necessitating the deployment of advanced AI (artificial intelligence)-based intrusion detection systems (IDS) to bolster IoT security. …”
    Get full text
    Article
  9. 349

    Chaos-based audio encryption: Efficacy of 2D and 3D hyperchaotic systems by Thejas Haridas, Upasana S.D., Vyshnavi G., Malavika S. Krishnan, Sishu Shankar Muni

    Published 2024-09-01
    “…Secure communication in the digital age is necessary; securing audio data becomes very critical since this is normally transmitted across susceptible networks. …”
    Get full text
    Article
  10. 350
  11. 351
  12. 352
  13. 353

    Towards a Scalable and Adaptive Learning Approach for Network Intrusion Detection by Alebachew Chiche, Million Meshesha

    Published 2021-01-01
    “…Therefore, security experts are recommended to integrate intrusion detection in their network and computer systems, not only for well-being of their computer systems but also for the sake of improving their working process.…”
    Get full text
    Article
  14. 354

    A Survey for Blockchain-Enabled Resource Management in Edge Networks by Sharon A. Boamah, Jean D. Louis, Janise McNair, Juan E. Gilbert

    Published 2025-01-01
    “…Blockchain, with its growing popularity, presents itself as a potential solution. The inherent features of blockchain, such as decentralization, transparency, security, and immutability, make it possible for network providers to manage network resources efficiently. …”
    Get full text
    Article
  15. 355
  16. 356

    Cancelable speaker identification system for the handicapped access to healthcare networks by Samia A. El-Moneim Kabel, Walid El-Shafai, Naglaa F. Soliman, Reem Alkanhel, Fathi E. Abd El-Samie

    Published 2025-07-01
    “…While these results demonstrate the potential effectiveness of the framework for securing networks through cancelable biometrics and fast processing time, the study does not include an evaluation of computational complexity and scalability in resource-constrained IoT environments. …”
    Get full text
    Article
  17. 357
  18. 358

    Metode Deteksi Intrusi Menggunakan Algoritme Extreme Learning Machine dengan Correlation-based Feature Selection by Sulandri Sulandri, Achmad Basuki, Fitra Abdurrachman Bachtiar

    Published 2021-02-01
    “…Abstract Intrusion detection of computer networks is a very important activity carried out to maintain data and information security. …”
    Get full text
    Article
  19. 359
  20. 360