-
161
-
162
-
163
-
164
-
165
CAN-GraphiT: A Graph-Based IDS for CAN Networks Using Transformer
Published 2025-01-01Get full text
Article -
166
EfficientTransformer: A Dynamic Anomaly Detection Model for Industrial Control Networks
Published 2025-01-01“…As industrial control network threats become increasingly complex, traditional intrusion detection systems (IDS) struggle to capture implicit relationships due to feature redundancy and intricate feature interactions. …”
Get full text
Article -
167
-
168
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
Published 2025-01-01Get full text
Article -
169
Controller Area Network (CAN) Bus Transceiver with Authentication Support and Enhanced Rail Converters
Published 2024-11-01Get full text
Article -
170
Optimizing Cervical Cancer Diagnosis with Feature Selection and Deep Learning
Published 2025-01-01Get full text
Article -
171
Cyberterrorism: content, forms and promising countermeasures
Published 2023-10-01“…The main forms of cyber terrorism are revealed: the commission of terrorist acts by organisations, groups and individuals using computers and computer networks or by influencing the information processed (circulated) in them, as well as the use of cyberspace for other purposes of terrorist activities not directly related to the commission of terrorist acts. …”
Get full text
Article -
172
-
173
Ergodic secrecy rate and outage probability in NOMA IRS massive MIMO networks with jamming
Published 2025-07-01Get full text
Article -
174
-
175
Optimizing Fingerprint Identification: CNNs With Raw Images Versus Handcrafted Features for Real-Time Systems
Published 2025-01-01“…This study investigates the balance between accuracy and computational efficiency(thereby speed) by comparing two approaches: training a Convolutional Neural Network (CNN) with raw fingerprint images and training a CNN using handcrafted fingerprint features. …”
Get full text
Article -
176
Intrusion Detection Framework for Internet of Things with Rule Induction for Model Explanation
Published 2025-03-01Get full text
Article -
177
Intrusion detection system based on machine learning using least square support vector machine
Published 2025-04-01Get full text
Article -
178
-
179
-
180
YOLO-Ssboat: Super-Small Ship Detection Network for Large-Scale Aerial and Remote Sensing Scenes
Published 2025-06-01“…Additionally, it employs a high-resolution feature layer and incorporates a Multi-Scale Weighted Pyramid Network (MSWPN) to enhance feature diversity. …”
Get full text
Article