Search alternatives:
networks » network (Expand Search)
Showing 21 - 40 results of 836 for search 'Computer networks Security features.', query time: 0.19s Refine Results
  1. 21

    Survey on data security and privacy-preserving for the research of edge computing by Jiale ZHANG, Yanchao ZHAO, Bing CHEN, Feng HU, Kun ZHU

    Published 2018-03-01
    “…With the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve such dilemma,the edge computing which deploys the cloud services in the edge network has envisioned to be the dominant cloud service paradigm in the era of IoT.Meanwhile,the unique features of edge computing,such as content perception,real-time computing,parallel processing and etc.…”
    Get full text
    Article
  2. 22
  3. 23

    Resource-Efficient Traffic Classification Using Feature Selection for Message Queuing Telemetry Transport-Internet of Things Network-Based Security Attacks by Emmanuel Tuyishime, Marco Martalò, Petru A. Cotfas, Vlad Popescu, Daniel T. Cotfas, Alexandre Rekeraho

    Published 2025-04-01
    “…Anomaly detection, primarily through traffic classification supported by artificial intelligence and machine learning techniques, has emerged as a practical approach to enhancing IoT network security. Effective traffic classification requires efficient feature selection, which is critical for resource-constrained IoT devices with limited computational power, memory, and energy. …”
    Get full text
    Article
  4. 24

    Machine learning based multi-stage intrusion detection system and feature selection ensemble security in cloud assisted vehicular ad hoc networks by C. Christy, A. Nirmala, A. Mary Odilya Teena, A. Isabella Amali

    Published 2025-07-01
    “…This research ensures next-generation transport networkssecure and reliable functioning and prepares the path for VANET protection upgrades. …”
    Get full text
    Article
  5. 25

    Metaheuristic Algorithms for Optimization and Feature Selection in Cloud Data Classification Using Convolutional Neural Network by Nandita Goyal, Munesh Chandra Trivedi

    Published 2023-08-01
    “…Cloud forensics plays a vital role to address the security issues related to cloud computing by identifying, collecting and studying digital evidence in cloud environment.The aim of the research paper is to explore the concept of cloud forensic by applying optimization for feature selection before classification of data on cloud side. …”
    Get full text
    Article
  6. 26

    ENHANCING NETWORK INTRUSION DETECTION USING MACHINE LEARNING AND META-MODELLING FOR IMPROVED CYBER SECURITY PERFORMANCE by Sunita, Pankaj Verma, Nitika, Jaspreet Kaur, Vijay Rana

    Published 2025-04-01
    “…This study is based on the analysis of network intrusion detection and the improvement of various machine learning methods that produce high accuracy and guarantee secure network traffic from malicious activities. …”
    Get full text
    Article
  7. 27
  8. 28
  9. 29
  10. 30

    Systematic Approach for Malware Detection in IoT Devices: Enhancing Security and Performance by Vasudeva Pai, B. H. Karthik Pai, G. S. Sudhiksha, Vandya Kamath, K. Varsha, S. Manjunatha

    Published 2025-07-01
    “…These include ensemble methods such as Bagging, Stacking, Voting, AdaBoost, and H2O AutoML, as well as advanced models such as sparse neural networks with pruning and feature selection and regularized classifiers L1. …”
    Get full text
    Article
  11. 31

    Hybrid Convolutional Neural Network-Based Intrusion Detection System for Secure IoT Networks by Sami Qawasmeh, Ahmad Habboush, Bassam Elzaghmouri, Qasem Kharma, Da'ad Albalawneh

    Published 2025-08-01
    “…CNN-based intrusion detection in IoT networks is stressed in the study. It shows how hybrid CNN-based techniques can improve IoT network security and resilience. …”
    Get full text
    Article
  12. 32
  13. 33

    TriageHD: A Hyper-Dimensional Learning-to-Rank Framework for Dynamic Micro-Segmentation in Zero-Trust Network Security by Ryozo Masukawa, Sanggeon Yun, Sungheon Jeong, Nathaniel D. Bastian, Mohsen Imani

    Published 2025-01-01
    “…This paper presents TriageHD, a novel framework that integrates graph-based Hyper-Dimensional Computing (HDC) with a learning-to-rank algorithm to strengthen zero-trust network security. …”
    Get full text
    Article
  14. 34
  15. 35

    Effects of feature selection and normalization on network intrusion detection by Mubarak Albarka Umar, Zhanfang Chen, Khaled Shuaib, Yan Liu

    Published 2025-03-01
    “…However, the advent of larger IDS datasets has negatively impacted the performance and computational complexity of AI-based IDSs. Many researchers used data preprocessing techniques such as feature selection and normalization to overcome such issues. …”
    Get full text
    Article
  16. 36
  17. 37
  18. 38
  19. 39
  20. 40