-
341
FinSafeNet: securing digital transactions using optimized deep learning and multi-kernel PCA(MKPCA) with Nyström approximation
Published 2024-11-01“…These improvements further help the model to detect the relevant features in transaction data that may present a threat to the security of the system. …”
Get full text
Article -
342
The Human Voice as a Digital Health Solution Leveraging Artificial Intelligence
Published 2025-05-01Get full text
Article -
343
Trust-Based Anomaly Detection in Emerging Sensor Networks
Published 2015-10-01Get full text
Article -
344
Echoes From the Void: Detecting DNS Tunneling With Blackhole Features in Encrypted Scenarios With High Accuracy
Published 2025-01-01“…Integration within existing security information and event management (SIEM) systems or DNS infrastructures implies API compatibility, scaling for heterogeneous networks, and minimizing the disruption of established workflow. …”
Get full text
Article -
345
Assessment methodology for security of an automated control system of critical information infrastructure against DDoS attacks based on Monte Carlo simulation
Published 2023-05-01“…A possible direction for further research is to study the issue of computer network security, taking into account the features of a specific topology.…”
Get full text
Article -
346
Chaos-based audio encryption: Efficacy of 2D and 3D hyperchaotic systems
Published 2024-09-01“…Secure communication in the digital age is necessary; securing audio data becomes very critical since this is normally transmitted across susceptible networks. …”
Get full text
Article -
347
Lightweight Blockchain for Data Integrity and Traceability in IoT Networks
Published 2025-01-01“…In this regard, blockchain is a promising solution to enhance IoT security, but the implementation of a conventional blockchain requires high computational and network connectivity resources that are not compatible with IoT networks. …”
Get full text
Article -
348
-
349
Dual Attention Equivariant Network for Weakly Supervised Semantic Segmentation
Published 2025-06-01Get full text
Article -
350
An IoT intrusion detection framework based on feature selection and large language models fine-tuning
Published 2025-07-01“…Abstract The rapid proliferation of Internet of Things (IoT) devices has significantly expanded the network attack surface, necessitating the deployment of advanced AI (artificial intelligence)-based intrusion detection systems (IDS) to bolster IoT security. …”
Get full text
Article -
351
DANNET: deep attention neural network for efficient ear identification in biometrics
Published 2024-12-01Get full text
Article -
352
Energy-Efficient Secure Cell-Free Massive MIMO for Internet of Things: A Hybrid CNN–LSTM-Based Deep-Learning Approach
Published 2025-04-01“…However, the increasing demand for high-performance wireless networks necessitates advanced frameworks that optimize both energy efficiency (EE) and security. …”
Get full text
Article -
353
Towards a Scalable and Adaptive Learning Approach for Network Intrusion Detection
Published 2021-01-01“…Therefore, security experts are recommended to integrate intrusion detection in their network and computer systems, not only for well-being of their computer systems but also for the sake of improving their working process.…”
Get full text
Article -
354
-
355
A Survey for Blockchain-Enabled Resource Management in Edge Networks
Published 2025-01-01“…Blockchain, with its growing popularity, presents itself as a potential solution. The inherent features of blockchain, such as decentralization, transparency, security, and immutability, make it possible for network providers to manage network resources efficiently. …”
Get full text
Article -
356
Cancelable speaker identification system for the handicapped access to healthcare networks
Published 2025-07-01“…While these results demonstrate the potential effectiveness of the framework for securing networks through cancelable biometrics and fast processing time, the study does not include an evaluation of computational complexity and scalability in resource-constrained IoT environments. …”
Get full text
Article -
357
Wi-FiAG: Fine-Grained Abnormal Gait Recognition via CNN-BiGRU with Attention Mechanism from Wi-Fi CSI
Published 2025-04-01Get full text
Article -
358
-
359
Distracted driver behavior recognition using modified capsule networks
Published 2023-12-01Get full text
Article -
360
Dual decoding generative adversarial networks for infrared image enhancement
Published 2025-07-01Get full text
Article