Showing 361 - 380 results of 836 for search 'Computer network Security features.', query time: 0.16s Refine Results
  1. 361

    Energy-Efficient Secure Cell-Free Massive MIMO for Internet of Things: A Hybrid CNN–LSTM-Based Deep-Learning Approach by Ali Vaziri, Pardis Sadatian Moghaddam, Mehrdad Shoeibi, Masoud Kaveh

    Published 2025-04-01
    “…However, the increasing demand for high-performance wireless networks necessitates advanced frameworks that optimize both energy efficiency (EE) and security. …”
    Get full text
    Article
  2. 362
  3. 363
  4. 364

    Network-based intrusion detection using deep learning technique by Muhammad Farhan, Hafiz Waheed ud din, Saadat Ullah, Muhammad Sajjad Hussain, Muhammad Amir Khan, Tehseen Mazhar, Umar Farooq Khattak, Ines Hilali Jaghdam

    Published 2025-07-01
    “…These findings underscore the effectiveness of deep learning architectures enhanced with optimized feature selection in detecting network intrusions, making the proposed system a promising solution for securing critical infrastructure in sectors such as finance, healthcare, and government networks.…”
    Get full text
    Article
  5. 365
  6. 366

    (IoT) Network intrusion detection system using optimization algorithms by Luo Shan

    Published 2025-07-01
    “…Compared with traditional models like the Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) and Support Vector Machine (SVM), the proposed framework significantly improves the sensitivity and generalization ability for detecting various types of attacks through dynamic feature selection and parameter optimization. …”
    Get full text
    Article
  7. 367
  8. 368
  9. 369
  10. 370
  11. 371
  12. 372
  13. 373

    Research on power data security full-link monitoring technology based on alternative evolutionary graph neural architecture search and multimodal data fusion by Zhenwan Zou, Bin Wang, Tao Chen, Jia Chen

    Published 2025-06-01
    “…The current evolutionary graph neural architecture search (GNAS) method mainly focuses on the topological connection and feature fusion between network layers, but it often requires a lot of computing resources, and the real-time performance of the GNN (graph neural network) model is difficult to meet the requirements when facing dynamic attacks and changing data. …”
    Get full text
    Article
  14. 374
  15. 375

    Anomaly detection in encrypted network traffic using self-supervised learning by Sadaf Sattar, Shumaila Khan, Muhammad Ismail Khan, Ainur Akhmediyarova, Orken Mamyrbayev, Dinara Kassymova, Dina Oralbekova, Janna Alimkulova

    Published 2025-07-01
    “…Abstract Privacy and security in network communication have been enhanced via encryption and traditional anomaly detection methods are no longer effective because of their payload inspection. …”
    Get full text
    Article
  16. 376
  17. 377
  18. 378

    Explainable AI for Lightweight Network Traffic Classification Using Depthwise Separable Convolutions by Mustafa Ghaleb, Mosab Hamdan, Abdulaziz Y. Barnawi, Muhammad Gambo, Abubakar Danasabe, Saheed Bello, Aliyu Habib

    Published 2025-01-01
    “…With the rapid growth of internet usage and the increasing number of connected devices, there is a critical need for advanced Network Traffic Classification (NTC) solutions to ensure optimal performance and robust security. …”
    Get full text
    Article
  19. 379
  20. 380