-
21
Survey on data security and privacy-preserving for the research of edge computing
Published 2018-03-01“…With the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve such dilemma,the edge computing which deploys the cloud services in the edge network has envisioned to be the dominant cloud service paradigm in the era of IoT.Meanwhile,the unique features of edge computing,such as content perception,real-time computing,parallel processing and etc.…”
Get full text
Article -
22
DualAD: Dual adversarial network for image anomaly detection⋆
Published 2024-12-01Get full text
Article -
23
Resource-Efficient Traffic Classification Using Feature Selection for Message Queuing Telemetry Transport-Internet of Things Network-Based Security Attacks
Published 2025-04-01“…Anomaly detection, primarily through traffic classification supported by artificial intelligence and machine learning techniques, has emerged as a practical approach to enhancing IoT network security. Effective traffic classification requires efficient feature selection, which is critical for resource-constrained IoT devices with limited computational power, memory, and energy. …”
Get full text
Article -
24
Machine learning based multi-stage intrusion detection system and feature selection ensemble security in cloud assisted vehicular ad hoc networks
Published 2025-07-01“…This research ensures next-generation transport networks’ secure and reliable functioning and prepares the path for VANET protection upgrades. …”
Get full text
Article -
25
Metaheuristic Algorithms for Optimization and Feature Selection in Cloud Data Classification Using Convolutional Neural Network
Published 2023-08-01“…Cloud forensics plays a vital role to address the security issues related to cloud computing by identifying, collecting and studying digital evidence in cloud environment.The aim of the research paper is to explore the concept of cloud forensic by applying optimization for feature selection before classification of data on cloud side. …”
Get full text
Article -
26
ENHANCING NETWORK INTRUSION DETECTION USING MACHINE LEARNING AND META-MODELLING FOR IMPROVED CYBER SECURITY PERFORMANCE
Published 2025-04-01“…This study is based on the analysis of network intrusion detection and the improvement of various machine learning methods that produce high accuracy and guarantee secure network traffic from malicious activities. …”
Get full text
Article -
27
-
28
-
29
Minimising Security Deviations in Software-Defined Networks Using Deep Learning
Published 2025-06-01Get full text
Article -
30
Systematic Approach for Malware Detection in IoT Devices: Enhancing Security and Performance
Published 2025-07-01“…These include ensemble methods such as Bagging, Stacking, Voting, AdaBoost, and H2O AutoML, as well as advanced models such as sparse neural networks with pruning and feature selection and regularized classifiers L1. …”
Get full text
Article -
31
Hybrid Convolutional Neural Network-Based Intrusion Detection System for Secure IoT Networks
Published 2025-08-01“…CNN-based intrusion detection in IoT networks is stressed in the study. It shows how hybrid CNN-based techniques can improve IoT network security and resilience. …”
Get full text
Article -
32
Research on performance optimizations for TCM-KNN network anomaly detection algorithm
Published 2009-01-01Get full text
Article -
33
TriageHD: A Hyper-Dimensional Learning-to-Rank Framework for Dynamic Micro-Segmentation in Zero-Trust Network Security
Published 2025-01-01“…This paper presents TriageHD, a novel framework that integrates graph-based Hyper-Dimensional Computing (HDC) with a learning-to-rank algorithm to strengthen zero-trust network security. …”
Get full text
Article -
34
Study and Developing a Network Security Prototype Based on Agent Technology
Published 2013-12-01Get full text
Article -
35
Effects of feature selection and normalization on network intrusion detection
Published 2025-03-01“…However, the advent of larger IDS datasets has negatively impacted the performance and computational complexity of AI-based IDSs. Many researchers used data preprocessing techniques such as feature selection and normalization to overcome such issues. …”
Get full text
Article -
36
Weapon detection with FMR-CNN and YOLOv8 for enhanced crime prevention and security
Published 2025-07-01Get full text
Article -
37
An Efficient and Secure Session Key Management Scheme in Wireless Sensor Network
Published 2021-01-01Get full text
Article -
38
Literature Review on Using Internet Protocol Security (IPsec) on network Connectivity
Published 2024-12-01Get full text
Article -
39
-
40