-
341
-
342
Assessment methodology for security of an automated control system of critical information infrastructure against DDoS attacks based on Monte Carlo simulation
Published 2023-05-01“…A possible direction for further research is to study the issue of computer network security, taking into account the features of a specific topology.…”
Get full text
Article -
343
Trust-Based Anomaly Detection in Emerging Sensor Networks
Published 2015-10-01Get full text
Article -
344
Towards edge-collaborative, lightweight and privacy-preserving classification framework
Published 2022-01-01“…Aiming at the problems of data leakage of perceptual image and computational inefficiency of privacy-preserving classification framework in edge-side computing environment, a lightweight and privacy-preserving classification framework (PPCF) was proposed to supports encryption feature extraction and classification, and achieve the goal of data transmission and computing security under the collaborative classification process of edge nodes.Firstly, a series of secure computing protocols were designed based on additive secret sharing.Furthermore, two non-collusive edge servers were used to perform secure convolution, secure batch normalization, secure activation, secure pooling and other deep neural network computing layers to realize PPCF.Theoretical and security analysis indicate that PPCF has excellent accuracy and proved to be security.Actual performance evaluation show that PPCF can achieve the same classification accuracy as plaintext environment.At the same time, compared with homomorphic encryption and multi-round iterative calculation schemes, PPCF has obvious advantages in terms of computational cost and communication overhead.…”
Get full text
Article -
345
The Human Voice as a Digital Health Solution Leveraging Artificial Intelligence
Published 2025-05-01Get full text
Article -
346
Lightweight Blockchain for Data Integrity and Traceability in IoT Networks
Published 2025-01-01“…In this regard, blockchain is a promising solution to enhance IoT security, but the implementation of a conventional blockchain requires high computational and network connectivity resources that are not compatible with IoT networks. …”
Get full text
Article -
347
Echoes From the Void: Detecting DNS Tunneling With Blackhole Features in Encrypted Scenarios With High Accuracy
Published 2025-01-01“…Integration within existing security information and event management (SIEM) systems or DNS infrastructures implies API compatibility, scaling for heterogeneous networks, and minimizing the disruption of established workflow. …”
Get full text
Article -
348
An IoT intrusion detection framework based on feature selection and large language models fine-tuning
Published 2025-07-01“…Abstract The rapid proliferation of Internet of Things (IoT) devices has significantly expanded the network attack surface, necessitating the deployment of advanced AI (artificial intelligence)-based intrusion detection systems (IDS) to bolster IoT security. …”
Get full text
Article -
349
Chaos-based audio encryption: Efficacy of 2D and 3D hyperchaotic systems
Published 2024-09-01“…Secure communication in the digital age is necessary; securing audio data becomes very critical since this is normally transmitted across susceptible networks. …”
Get full text
Article -
350
Dual Attention Equivariant Network for Weakly Supervised Semantic Segmentation
Published 2025-06-01Get full text
Article -
351
-
352
DANNET: deep attention neural network for efficient ear identification in biometrics
Published 2024-12-01Get full text
Article -
353
Towards a Scalable and Adaptive Learning Approach for Network Intrusion Detection
Published 2021-01-01“…Therefore, security experts are recommended to integrate intrusion detection in their network and computer systems, not only for well-being of their computer systems but also for the sake of improving their working process.…”
Get full text
Article -
354
A Survey for Blockchain-Enabled Resource Management in Edge Networks
Published 2025-01-01“…Blockchain, with its growing popularity, presents itself as a potential solution. The inherent features of blockchain, such as decentralization, transparency, security, and immutability, make it possible for network providers to manage network resources efficiently. …”
Get full text
Article -
355
Wi-FiAG: Fine-Grained Abnormal Gait Recognition via CNN-BiGRU with Attention Mechanism from Wi-Fi CSI
Published 2025-04-01Get full text
Article -
356
Cancelable speaker identification system for the handicapped access to healthcare networks
Published 2025-07-01“…While these results demonstrate the potential effectiveness of the framework for securing networks through cancelable biometrics and fast processing time, the study does not include an evaluation of computational complexity and scalability in resource-constrained IoT environments. …”
Get full text
Article -
357
-
358
Metode Deteksi Intrusi Menggunakan Algoritme Extreme Learning Machine dengan Correlation-based Feature Selection
Published 2021-02-01“…Abstract Intrusion detection of computer networks is a very important activity carried out to maintain data and information security. …”
Get full text
Article -
359
Distracted driver behavior recognition using modified capsule networks
Published 2023-12-01Get full text
Article -
360
Dual decoding generative adversarial networks for infrared image enhancement
Published 2025-07-01Get full text
Article