Showing 801 - 820 results of 836 for search 'Computer network Security features.', query time: 0.12s Refine Results
  1. 801

    Intrusion Detection Using Hybrid Pearson Correlation and GS-PSO Optimized Random Forest Technique for RPL-Based IoT by Wei Yang, Xinlong Wang, Zhiming Zhang, Shaolong Chen, Chengqi Hou, Siwei Luo

    Published 2025-01-01
    “…The escalating surge of cyberattacks targeting IoT systems has exposed critical security vulnerabilities in RPL-based networks. Attackers exploit routing spoofing, resource depletion tactics, and topology manipulation strategies, while inherent constraints of resource-limited devices and scalability challenges in mass deployments amplify these risks. …”
    Get full text
    Article
  2. 802
  3. 803
  4. 804
  5. 805
  6. 806
  7. 807

    An intelligent optimized object detection system for disabled people using advanced deep learning models with optimization algorithm by Marwa Obayya, Fahd N. Al-Wesabi, Menwa Alshammeri, Huda G. Iskandar

    Published 2025-05-01
    “…Furthermore, the MobileNetV3 model is utilized for the feature extraction process. The temporal convolutional network (TCN) model is implemented for classification. …”
    Get full text
    Article
  8. 808

    Certificateless aggregate signcryption scheme with multi-ciphertext equality test for the internet of vehicles. by Xiaodong Yang, Xilai Luo, Ruixia Liu, Songyu Li, Ke Yao

    Published 2025-01-01
    “…When compared to similar schemes, this approach exhibits reduced computational overhead while providing superior security features.…”
    Get full text
    Article
  9. 809
  10. 810

    Efficient Anomaly Detection for Edge Clouds: Mitigating Data and Resource Constraints by Javad Forough, Hamed Haddadi, Monowar Bhuyan, Erik Elmroth

    Published 2024-01-01
    “…Anomaly detection plays a vital role in ensuring the security and reliability of edge clouds, which are decentralized computing environments with limited resources. …”
    Get full text
    Article
  11. 811

    LiSA-MobileNetV2: an extremely lightweight deep learning model with Swish activation and attention mechanism for accurate rice disease classification by Yongqi Xu, Dongcheng Li, Changcheng Li, Zheming Yuan, Zhijun Dai

    Published 2025-08-01
    “…In the context of intelligent agriculture in China, rapid and accurate identification of crop diseases is essential for ensuring food security and improving crop yield. Although lightweight convolutional neural networks (CNNs) are widely adopted for plant disease recognition due to their computational efficiency, they often suffer from limited feature representation and classification accuracy. …”
    Get full text
    Article
  12. 812
  13. 813
  14. 814

    Robust Face Recognition Using Deep Learning and Ensemble Classification by Pavani Chitrapu, Mahesh Kumar Morampudi, Hemantha Kumar Kalluri

    Published 2025-01-01
    “…Existing methods often struggle to strike a balance between accuracy, computational efficiency, and robustness. Deep learning has become popular for automatically learning features through convolution layers. …”
    Get full text
    Article
  15. 815
  16. 816
  17. 817

    MA-YOLO: A Pest Target Detection Algorithm with Multi-Scale Fusion and Attention Mechanism by Yongzong Lu, Pengfei Liu, Chong Tan

    Published 2025-06-01
    “…To address the high computational complexity and inadequate feature representation in traditional convolutional networks, this study proposes MA-YOLO, an agricultural pest detection model based on multi-scale fusion and attention mechanisms. …”
    Get full text
    Article
  18. 818

    A survey of data-driven fault-diagnosis methods for large-scale industrial production processes by Qianxiang YU, Qing LI, Linlin LI, Yixuan WANG

    Published 2025-04-01
    “…The usual fault-diagnosis methods for large-scale systems rely on centralized sensor network monitoring. Centralization necessitates consolidated data processing, which can create immense computational stress. …”
    Get full text
    Article
  19. 819

    Evaluating Lightweight Transformers With Local Explainability for Android Malware Detection by Fatima Bourebaa, Mohamed Benmohammed

    Published 2025-01-01
    “…Mobile phones have evolved into powerful handheld computers, fostering a vast application ecosystem but also increasing security and privacy risks. …”
    Get full text
    Article
  20. 820