-
21
Resource-Efficient Traffic Classification Using Feature Selection for Message Queuing Telemetry Transport-Internet of Things Network-Based Security Attacks
Published 2025-04-01“…Anomaly detection, primarily through traffic classification supported by artificial intelligence and machine learning techniques, has emerged as a practical approach to enhancing IoT network security. Effective traffic classification requires efficient feature selection, which is critical for resource-constrained IoT devices with limited computational power, memory, and energy. …”
Get full text
Article -
22
Systematic Approach for Malware Detection in IoT Devices: Enhancing Security and Performance
Published 2025-07-01“…These include ensemble methods such as Bagging, Stacking, Voting, AdaBoost, and H2O AutoML, as well as advanced models such as sparse neural networks with pruning and feature selection and regularized classifiers L1. …”
Get full text
Article -
23
Machine learning based multi-stage intrusion detection system and feature selection ensemble security in cloud assisted vehicular ad hoc networks
Published 2025-07-01“…This research ensures next-generation transport networks’ secure and reliable functioning and prepares the path for VANET protection upgrades. …”
Get full text
Article -
24
Metaheuristic Algorithms for Optimization and Feature Selection in Cloud Data Classification Using Convolutional Neural Network
Published 2023-08-01“…Cloud forensics plays a vital role to address the security issues related to cloud computing by identifying, collecting and studying digital evidence in cloud environment.The aim of the research paper is to explore the concept of cloud forensic by applying optimization for feature selection before classification of data on cloud side. …”
Get full text
Article -
25
ENHANCING NETWORK INTRUSION DETECTION USING MACHINE LEARNING AND META-MODELLING FOR IMPROVED CYBER SECURITY PERFORMANCE
Published 2025-04-01“…This study is based on the analysis of network intrusion detection and the improvement of various machine learning methods that produce high accuracy and guarantee secure network traffic from malicious activities. …”
Get full text
Article -
26
-
27
-
28
Hybrid Convolutional Neural Network-Based Intrusion Detection System for Secure IoT Networks
Published 2025-08-01“…CNN-based intrusion detection in IoT networks is stressed in the study. It shows how hybrid CNN-based techniques can improve IoT network security and resilience. …”
Get full text
Article -
29
Research on performance optimizations for TCM-KNN network anomaly detection algorithm
Published 2009-01-01Get full text
Article -
30
Evaluating Features and Variations in Deepfake Videos Using the CoAtNet Model
Published 2025-06-01Get full text
Article -
31
Weapon detection with FMR-CNN and YOLOv8 for enhanced crime prevention and security
Published 2025-07-01Get full text
Article -
32
Image-Based Malicious Network Traffic Detection Framework: Data-Centric Approach
Published 2025-06-01Get full text
Article -
33
TriageHD: A Hyper-Dimensional Learning-to-Rank Framework for Dynamic Micro-Segmentation in Zero-Trust Network Security
Published 2025-01-01“…This paper presents TriageHD, a novel framework that integrates graph-based Hyper-Dimensional Computing (HDC) with a learning-to-rank algorithm to strengthen zero-trust network security. …”
Get full text
Article -
34
Research on SDN Architecture and Security
Published 2013-03-01“…With the rapid deve1opment of c1oud computing and mobi1e internet, the features that network exhibits, such as diversity, dec1are for urgent requirements for sca1abi1ity, manageabi1ity and security of the data center.The SDN architecture shows a promising way of dea1ing with the above requirements of network through revo1utionary innovation of the traditiona1 network architecture, which attracts great interest of companies and research institutes.However, according to the recent research and progress of SDN, security prob1em has not been addressed, which wi11 be a significant issue.Based on the situation, the basis of SDN, inc1uding the origination, architecture, standardization work and standardized protoco1, were described, and the security issue was a1so ana1yzed.In the security part, the exhibiting new features of security prob1em for SDN, were ana1yzed, by 1isting the undergoing work, and then the security threats in SDN were conc1uded.Fina11y, a suggested architecture for security research of SDN was proposed.…”
Get full text
Article -
35
-
36
Study and Developing a Network Security Prototype Based on Agent Technology
Published 2013-12-01Get full text
Article -
37
Minimising Security Deviations in Software-Defined Networks Using Deep Learning
Published 2025-06-01Get full text
Article -
38
-
39
Effects of feature selection and normalization on network intrusion detection
Published 2025-03-01“…However, the advent of larger IDS datasets has negatively impacted the performance and computational complexity of AI-based IDSs. Many researchers used data preprocessing techniques such as feature selection and normalization to overcome such issues. …”
Get full text
Article -
40
An Efficient and Secure Session Key Management Scheme in Wireless Sensor Network
Published 2021-01-01Get full text
Article