-
361
Metode Deteksi Intrusi Menggunakan Algoritme Extreme Learning Machine dengan Correlation-based Feature Selection
Published 2021-02-01“…Abstract Intrusion detection of computer networks is a very important activity carried out to maintain data and information security. …”
Get full text
Article -
362
Flash Attack Prognosis by Ensemble Supervised Learning for IoT Networks
Published 2023-03-01Get full text
Article -
363
-
364
Network-based intrusion detection using deep learning technique
Published 2025-07-01“…These findings underscore the effectiveness of deep learning architectures enhanced with optimized feature selection in detecting network intrusions, making the proposed system a promising solution for securing critical infrastructure in sectors such as finance, healthcare, and government networks.…”
Get full text
Article -
365
Transformer-based tokenization for IoT traffic classification across diverse network environments
Published 2025-08-01Get full text
Article -
366
(IoT) Network intrusion detection system using optimization algorithms
Published 2025-07-01“…Experimental results demonstrate that the hybrid algorithm exhibits superior real-time responsiveness in binary classification tasks, thanks to its lightweight design that reduces dependency on computational resources. In multi-class attack identification scenarios, the framework mitigates feature confusion between rare attacks (e.g., user-to-root attacks) and normal traffic through adaptive feature weight allocation. …”
Get full text
Article -
367
-
368
Advanced intrusion detection in internet of things using graph attention networks
Published 2025-03-01Get full text
Article -
369
A comprehensive review on the users’ identity privacy for 5G networks
Published 2022-03-01Get full text
Article -
370
Dynamic Hypergraph Convolutional Networks for Hand Motion Gesture Sequence Recognition
Published 2025-06-01Get full text
Article -
371
Anomaly detection in encrypted network traffic using self-supervised learning
Published 2025-07-01“…Abstract Privacy and security in network communication have been enhanced via encryption and traditional anomaly detection methods are no longer effective because of their payload inspection. …”
Get full text
Article -
372
-
373
RMFKAN: Network Spammers Detection Method Based on Improved Graph Mamba
Published 2025-05-01Get full text
Article -
374
-
375
-
376
An Open Conformance Test System towards the Standardization of Wireless Sensor Networks
Published 2012-11-01Get full text
Article -
377
Explainable AI for Lightweight Network Traffic Classification Using Depthwise Separable Convolutions
Published 2025-01-01“…With the rapid growth of internet usage and the increasing number of connected devices, there is a critical need for advanced Network Traffic Classification (NTC) solutions to ensure optimal performance and robust security. …”
Get full text
Article -
378
CGTS: graph transformer-based anomaly detection in controller area networks
Published 2025-08-01Get full text
Article -
379
A deep decentralized privacy-preservation framework for online social networks
Published 2024-12-01Get full text
Article -
380
Trust Model for Underwater Wireless Sensor Networks Based on Variational Autoencoders
Published 2025-04-01Get full text
Article