Search alternatives:
networks » network (Expand Search)
Showing 221 - 240 results of 836 for search 'Computer networks Security features.', query time: 0.13s Refine Results
  1. 221
  2. 222

    A novel speaker verification approach featuring multidomain acoustics based on the weighted city-block Minkowski distance by Khushboo Jha, Sumit Srivastava, Aruna Jain

    Published 2025-04-01
    “…Access control is vital in interconnected environments like the Internet of Things, Industry 4.0, and smart connectivity, ensuring authorized access for security. Biometric-based access, particularly speaker verification (SV), enhances security with unique vocal features, offering nonintrusive authenti-cation with continuous monitoring. …”
    Get full text
    Article
  3. 223

    A comprehensive survey on techniques, challenges, evaluation metrics and applications of deep learning models for anomaly detection by Mudita Kohli, Indu Chhabra

    Published 2025-07-01
    “…Abstract Connected devices improve life quality and generate a large amount of data which require computation and transfer; the need for security becomes a major concern with networks evolving in complexity and scale. …”
    Get full text
    Article
  4. 224
  5. 225

    Biometric cryptosystem to secure smart object communications in the internet of things by Abdallah Meraoumia, Mohamed Amroune, Lakhadr Laimeche, Hakiml Bendjenna

    Published 2022-03-01
    “…Like any electronic application, the security aspect is one of the most difficult challenges in the creation and design of such networks. …”
    Get full text
    Article
  6. 226
  7. 227

    Considerations of Cloud Computing Contracts at the Conclusion Stage by Mohammadali Hasanian, Esmaeil Shahsavandi, Amirabbas Bozorgmehr

    Published 2025-03-01
    “…On the other hand, studies show that data security and privacy are among the most important challenges of cloud computing contracts. …”
    Get full text
    Article
  8. 228
  9. 229
  10. 230
  11. 231
  12. 232

    A Dual-Strategy Framework for Cyber Threat Detection in Imbalanced, High-Dimensional Data Across Heterogeneous Networks by T. Saranya, S. Indra Priyadharshini

    Published 2025-01-01
    “…As cyber threats grow in complexity, ensuring robust network security has become increasingly critical. …”
    Get full text
    Article
  13. 233
  14. 234
  15. 235

    HCAP: Hybrid cyber attack prediction model for securing healthcare applications. by Mohanad Faeq Ali, Mohammed Shakir Mohmood, Ban Salman Shukur, Rex Bacarra, Jamil Abedalrahim Jamil Alsayaydeh, Masrullizam Mat Ibrahim, Safarudin Gazali Herawan

    Published 2025-01-01
    “…The extracted features are fed into the lion-optimization technique to fine-tune the hyperparameters of the recurrent neural networks, enhancing the model's ability to efficiently predict cybersecurity threats with a maximum recognition rate in IoMT environments. …”
    Get full text
    Article
  16. 236
  17. 237

    Security monitoring via sound analysis and voice identification with artificial intelligence by Balabanova Ivelina, Sidorova Kristina, Georgiev Georgi

    Published 2024-08-01
    “…Subsequently, steps were taken to reduce the informative features when searching for similar levels of accuracy in order to limit the necessary computational procedures in neural training, but maintain the threshold of successful user authentication. …”
    Get full text
    Article
  18. 238
  19. 239

    UNIFIED MULTIMODAL BIOMETRICS FUSION USING DEEP LEARNING FOR SECURING IOT by Prabhjot Kaur, Chander Kaur

    Published 2024-12-01
    “…Our proposed approach employs “Convolutional Neural Network (CNN)” architectures, notable for their efficacy in computer vision tasks, to extract potent discriminative features from the input images. …”
    Get full text
    Article
  20. 240