Showing 461 - 480 results of 836 for search 'Computer network Security features.', query time: 0.14s Refine Results
  1. 461
  2. 462
  3. 463

    SVMFN-FSAR: Semantic-Guided Video Multimodal Fusion Network for Few-Shot Action Recognition by Ran Wei, Rui Yan, Hongyu Qu, Xing Li, Qiaolin Ye, Liyong Fu

    Published 2025-05-01
    “…Few-Shot Action Recognition (FSAR) has been a heat topic in various areas, such as computer vision and forest ecosystem security. FSAR aims to recognize previously unseen classes using limited labeled video examples. …”
    Get full text
    Article
  4. 464
  5. 465
  6. 466
  7. 467

    An efficient privacy-preserving multilevel fusion-based feature engineering framework for UAV-enabled land cover classification using remote sensing images by S. Nagadevi, G. Abirami, R. Brindha, T. Prabhakara Rao, Gyanendra Prasad Joshi, Woong Cho

    Published 2025-07-01
    “…Deep learning (DL) methods are essential for processing security problems in UAV networks. This paper presents a Privacy-Preserving Intrusion Detection Model for UAV-Based Remote Sensing Applications in Land Cover Classification Using Multilevel Fusion Feature Engineering (IDUAVRS-LCCMFFE) technique. …”
    Get full text
    Article
  8. 468
  9. 469
  10. 470
  11. 471
  12. 472
  13. 473
  14. 474
  15. 475

    THE IMPACT OF ECONOMIC COMPANY DATA THEFT by Ramona MARGE, Ştefan IOVAN

    Published 2018-05-01
    “…In terms of preventing internal threats, solutions have powerful encryption algorithms that protect important business information, application control tools, device control, web control and mobile device management features to implement IT security policies. The solutions created by specialists provide effective protection against all types of threats on the Internet and help maintain productivity at work with simple web policies that can limit employees‟ access to social networks, online gaming, or other sites during working hours. …”
    Get full text
    Article
  16. 476
  17. 477
  18. 478

    Elliptic curve cryptography and biometrics for iot authentication by Dargaoui Souhayla, Azrour Mourade, El Allaoui Ahmad, Guezzaz Azidine, Alabdulatif Abdulatif, Ahmad Sultan, Innab Nisreen

    Published 2025-01-01
    “…Lastly, our protocol and other protocols are compared in terms of computational costs, communication costs, and security features.…”
    Get full text
    Article
  19. 479
  20. 480