-
221
Protecting Industrial Control Systems From Shodan Exploitation Through Advanced Traffic Analysis
Published 2025-01-01Get full text
Article -
222
A novel speaker verification approach featuring multidomain acoustics based on the weighted city-block Minkowski distance
Published 2025-04-01“…Access control is vital in interconnected environments like the Internet of Things, Industry 4.0, and smart connectivity, ensuring authorized access for security. Biometric-based access, particularly speaker verification (SV), enhances security with unique vocal features, offering nonintrusive authenti-cation with continuous monitoring. …”
Get full text
Article -
223
A comprehensive survey on techniques, challenges, evaluation metrics and applications of deep learning models for anomaly detection
Published 2025-07-01“…Abstract Connected devices improve life quality and generate a large amount of data which require computation and transfer; the need for security becomes a major concern with networks evolving in complexity and scale. …”
Get full text
Article -
224
Machine Learning Techniques for Enhanced Intrusion Detection in IoT Security
Published 2025-01-01Get full text
Article -
225
Biometric cryptosystem to secure smart object communications in the internet of things
Published 2022-03-01“…Like any electronic application, the security aspect is one of the most difficult challenges in the creation and design of such networks. …”
Get full text
Article -
226
-
227
Considerations of Cloud Computing Contracts at the Conclusion Stage
Published 2025-03-01“…On the other hand, studies show that data security and privacy are among the most important challenges of cloud computing contracts. …”
Get full text
Article -
228
-
229
Botnet detection in internet of things using stacked ensemble learning model
Published 2025-07-01Get full text
Article -
230
-
231
-
232
A Dual-Strategy Framework for Cyber Threat Detection in Imbalanced, High-Dimensional Data Across Heterogeneous Networks
Published 2025-01-01“…As cyber threats grow in complexity, ensuring robust network security has become increasingly critical. …”
Get full text
Article -
233
A Review of IEEE 802.15.6 MAC, PHY, and Security Specifications
Published 2013-04-01Get full text
Article -
234
-
235
HCAP: Hybrid cyber attack prediction model for securing healthcare applications.
Published 2025-01-01“…The extracted features are fed into the lion-optimization technique to fine-tune the hyperparameters of the recurrent neural networks, enhancing the model's ability to efficiently predict cybersecurity threats with a maximum recognition rate in IoMT environments. …”
Get full text
Article -
236
-
237
Security monitoring via sound analysis and voice identification with artificial intelligence
Published 2024-08-01“…Subsequently, steps were taken to reduce the informative features when searching for similar levels of accuracy in order to limit the necessary computational procedures in neural training, but maintain the threshold of successful user authentication. …”
Get full text
Article -
238
Securing the CAN bus using deep learning for intrusion detection in vehicles
Published 2025-04-01Get full text
Article -
239
UNIFIED MULTIMODAL BIOMETRICS FUSION USING DEEP LEARNING FOR SECURING IOT
Published 2024-12-01“…Our proposed approach employs “Convolutional Neural Network (CNN)” architectures, notable for their efficacy in computer vision tasks, to extract potent discriminative features from the input images. …”
Get full text
Article -
240
A hybrid model for fake news detection: Leveraging news content and user comments in fake news
Published 2021-03-01Get full text
Article