-
281
Securing IoT Communications via Anomaly Traffic Detection: Synergy of Genetic Algorithm and Ensemble Method
Published 2025-06-01“…However, IoT systems face significant security challenges due to decentralized architectures, resource-constrained devices, and dynamic network environments. …”
Get full text
Article -
282
BERT-based network for intrusion detection system
Published 2025-03-01“…The BERT model, with its bidirectional encoder structure, captures complex contextual information in sequences, producing high-quality feature representations. After feature extraction is completed, we further perform classification using a classifier based on a bidirectional gated recurrent unit (GRU) network, which is able to efficiently process sequence data and reduce computational complexity while capturing temporal dependencies in the sequences. …”
Get full text
Article -
283
An Mcformer encoder integrating Mamba and Cgmlp for improved acoustic feature extraction
Published 2025-07-01Get full text
Article -
284
Refined Judgment of Urban Traffic State Based on Machine Learning and Edge Computing
Published 2022-01-01“…For providing short-distance services and applications, we should start from the edge of the program to create a faster network. Service response covers the basic needs of real-time processing industry, intelligent applications, and security and privacy protection. …”
Get full text
Article -
285
IoT‐Based Elderly Health Monitoring System Using Firebase Cloud Computing
Published 2025-03-01Get full text
Article -
286
-
287
Analysis and Identification of Students with Financial Difficulties: A Behavioural Feature Perspective
Published 2020-01-01Get full text
Article -
288
Botnets’ similarity analysis based on communication features and D-S evidence theory
Published 2011-01-01“…A potential hidden relationship may exist among different zombie groups.A method to analyze the relationship among botnets was proposed based on the communication activities.The method extracted several communication fea-tures of botnet,including the number of flows per hour,the number of packets per flow,the number of flows per IP and the packet payloads.It defined similarity statistical functions of the communication features,and built the analysis model of botnets relationship based on the advanced dempster-shafer(D-S) evidence theory to synthetically evaluate the simi-larities between different zombie groups.The experiments were conducted using several botnet traces.The results show that the method is valid and efficient,even in the case of encrypted botnet communication messages.Moreover,the ideal processing results is achieved by applying our method to analyze the data captured from the security monitoring platform of computer network,as well as compare with similar work.…”
Get full text
Article -
289
Design a new scheme for image security using a deep learning technique of hierarchical parameters
Published 2024-10-01Get full text
Article -
290
Advances to IoT security using a GRU-CNN deep learning model trained on SUCMO algorithm
Published 2025-05-01Get full text
Article -
291
VAE-Based Real-Time Anomaly Detection Approach for Enhanced V2X Communication Security
Published 2025-06-01Get full text
Article -
292
-
293
Real-time multi-level trust-based secure routing for improved QoS in WSN using blockchain
Published 2025-06-01Get full text
Article -
294
-
295
-
296
AgriChainSync: A Scalable and Secure Blockchain-Enabled Framework for IoT-Driven Precision Agriculture
Published 2024-01-01Get full text
Article -
297
CANGuard: An Enhanced Approach to the Detection of Anomalies in CAN-Enabled Vehicles
Published 2025-01-01Get full text
Article -
298
A computational enhancement of Base64 algorithm using Residue Number System algorithms
Published 2025-03-01Get full text
Article -
299
Detecting Cyber Threats in UWF-ZeekDataFall22 Using K-Means Clustering in the Big Data Environment
Published 2025-06-01Get full text
Article -
300
FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review
Published 2021-03-01“…Data security, integrity, and verification may be used due to these features. …”
Get full text
Article