-
41
-
42
Literature Review on Using Internet Protocol Security (IPsec) on network Connectivity
Published 2024-12-01Get full text
Article -
43
-
44
Securing Automotive Networks from DoS and Fuzzy Attacks with Optimized LSTM Models
Published 2025-04-01Get full text
Article -
45
-
46
Evaluating Security Anomalies by Classifying Traffic Using a Multi-Layered Model
Published 2023-01-01Get full text
Article -
47
A secured and fault-tolerant algorithm for electing an efficient coordinator in distributed networks
Published 2024-12-01Get full text
Article -
48
A Secure and Energy-Efficient Cross-Layer Network Architecture for the Internet of Things
Published 2025-05-01Get full text
Article -
49
Neuro-Driven Agent-Based Security for Quantum-Safe 6G Networks
Published 2025-06-01“…Around the same time that 6G networks will be launched, advances in quantum computing could challenge existing cryptographic security. …”
Get full text
Article -
50
Securing face images in UAV networks using chaos and DNA cryptography approach
Published 2025-07-01Get full text
Article -
51
A Comprehensive Analysis of Security Challenges in ZigBee 3.0 Networks
Published 2025-07-01Get full text
Article -
52
DeepSpoofNet: a framework for securing UAVs against GPS spoofing attacks
Published 2025-03-01Get full text
Article -
53
Design of Network Security Anomaly Detection Model Based on SLNA Cell Structure
Published 2024-01-01Get full text
Article -
54
TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks
Published 2014-01-01“…In recent years, trust-aware routing protocol plays a vital role in security of wireless sensor networks (WSNs), which is one of the most popular network technologies for smart city. …”
Get full text
Article -
55
Enhancing Network Security: A Study on Classification Models for Intrusion Detection Systems
Published 2025-06-01Get full text
Article -
56
An optimized ensemble model with advanced feature selection for network intrusion detection
Published 2024-11-01Get full text
Article -
57
CAA-RF: An Anomaly Detection Algorithm for Computing Power Blockchain Networks
Published 2025-05-01“…As a distributed communication and storage system, blockchain forms a Computing Power Blockchain Network (CPBN) by integrating computing nodes and network resources. …”
Get full text
Article -
58
Analysis of security and privacy challenges of smart health and sensing systems
Published 2024-12-01Get full text
Article -
59
Securing Unmanned Aerial Vehicles Networks Using Pairing Free Aggregate Signcryption Scheme
Published 2024-01-01“…Multiple groups of UAVs, through appropriate interaction and concerted procedures, can achieve these objectives. The unpredictable features of UAVs and their reliance on unprotected and widely available wireless networks create challenges in establishing secure communication between a private edge cloud and a UAV. …”
Get full text
Article -
60
Secure and efficient cloudlet networks: blockchain integration with agent-based proof of trust mechanism
Published 2025-03-01“…Experimental results demonstrate that this solution significantly enhances security, mitigates latency, and improves network performance compared to existing methods. …”
Get full text
Article