Showing 121 - 140 results of 836 for search 'Computer network Security features.', query time: 0.17s Refine Results
  1. 121

    Encrypted Image Retrieval System based on Features Analysis by Methaq Talib GAATA, Fadya Fouad Hantoosh

    Published 2018-07-01
    “…However, since communication between digital products takes place in a public network, the necessity of security for digital images becomes vital. …”
    Get full text
    Article
  2. 122
  3. 123

    IMpc-PyrYOLO: Hybrid YOLO Based Feature Pyramidal Network for Pest Detection in Rice Leaves by Ramesh Shunmugam, Sumendra Yogarayan, Siti Fatimah Abdul Razak, Md. Shohel Sayeed

    Published 2025-06-01
    “…The model integrates an efficient channel attention (ECA) mechanism with the feature pyramidal network (FPN) in the YOLO network to improve multi-scale feature extraction and pest classification accuracy. …”
    Get full text
    Article
  4. 124
  5. 125
  6. 126
  7. 127
  8. 128

    Enhancing IoT device security: CNN-SVM hybrid approach for real-time detection of DoS and DDoS attacks by Al-Na’amneh Qais, Aljaidi Mohammad, Nasayreh Ahmad, Gharaibeh Hasan, Al Mamlook Rabia Emhamed, Jaradat Ameera S., Alsarhan Ayoub, Samara Ghassan

    Published 2024-11-01
    “…Therefore, developing a secure IoT system is vital, shielding against attackers leveraging IoT devices to obtain network access and maintaining data security during transmission between these devices. …”
    Get full text
    Article
  9. 129
  10. 130

    An adaptive hybrid framework for IIoT intrusion detection using neural networks and feature optimization using genetic algorithms by Mohammad Zubair Khan, Aijaz Ahmad Reshi, Shabana Shafi, Ibrahim Aljubayri

    Published 2025-05-01
    “…Abstract In Industrial Internet of Things (IIoT) networks, securing device connectivity through effective intrusion detection systems is essential for maintaining operational integrity. …”
    Get full text
    Article
  11. 131
  12. 132

    A topology-guided high-quality solution learning framework for security-constraint unit commitment based on graph convolutional network by Liqian Gao, Lishen Wei, Shichang Cui, Jiakun Fang, Xiaomeng Ai, Wei Yao, Jinyu Wen

    Published 2025-03-01
    “…In this sense, this paper proposes a topology-guided high-quality solution learning framework based on graph convolutional network (GCN) and neighborhood search (NS). Firstly, a GCN-based method is presented to learn the potential patterns between commitments and graph data associated with bus feature and power grid topology. …”
    Get full text
    Article
  13. 133

    Cross-stream attention enhanced central difference convolutional network for CG image detection by HUANG Jinkun, HUANG Yuanhang, HUANG Wenmin, LUO Weiqi

    Published 2024-12-01
    “…With the maturation of computer graphics (CG) technology in the field of image generation, the realism of created images has been improved significantly. …”
    Get full text
    Article
  14. 134
  15. 135
  16. 136
  17. 137
  18. 138
  19. 139

    SA3C-ID: a novel network intrusion detection model using feature selection and adversarial training by Wanwei Huang, Haobin Tian, Lei Wang, Sunan Wang, Kun Wang, Songze Li

    Published 2025-07-01
    “…Network intrusion detection systems, as a fundamental part of network security, have become increasingly significant. …”
    Get full text
    Article
  20. 140