Search alternatives:
networks » network (Expand Search)
Showing 381 - 400 results of 836 for search 'Computer networks Security features.', query time: 0.13s Refine Results
  1. 381
  2. 382

    Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities by Vincent Omollo Nyangaresi, Ahmad A. AlRababah, Ganesh Keshaorao Yenurkar, Ravikumar Chinthaginjala, Muhammad Yasir

    Published 2025-01-01
    “…In addition, the informal security analysis shows that it supports salient functional and security features such as mutual authentication, key agreement, perfect key secrecy, anonymity, and untraceability. …”
    Get full text
    Article
  3. 383
  4. 384
  5. 385

    Research on power data security full-link monitoring technology based on alternative evolutionary graph neural architecture search and multimodal data fusion by Zhenwan Zou, Bin Wang, Tao Chen, Jia Chen

    Published 2025-06-01
    “…The current evolutionary graph neural architecture search (GNAS) method mainly focuses on the topological connection and feature fusion between network layers, but it often requires a lot of computing resources, and the real-time performance of the GNN (graph neural network) model is difficult to meet the requirements when facing dynamic attacks and changing data. …”
    Get full text
    Article
  6. 386
  7. 387
  8. 388

    Detecting malicious code variants using convolutional neural network (CNN) with transfer learning by Nazish Younas, Shazia Riaz, Saqib Ali, Rafiullah Khan, Farman Ali, Daehan Kwak

    Published 2025-04-01
    “…We further improve the detection process by employing transfer learning to automatically identify and classify malware images based on their distinctive features. Empirical results demonstrate that MVDS achieves 97.98% accuracy with high detection speed, highlighting its potential for practical implementation in strengthening network security.…”
    Get full text
    Article
  9. 389
  10. 390
  11. 391
  12. 392
  13. 393

    Towards edge-collaborative, lightweight and privacy-preserving classification framework by Jinbo XIONG, Yongjie ZHOU, Renwan BI, Liang WAN, Youliang TIAN

    Published 2022-01-01
    “…Aiming at the problems of data leakage of perceptual image and computational inefficiency of privacy-preserving classification framework in edge-side computing environment, a lightweight and privacy-preserving classification framework (PPCF) was proposed to supports encryption feature extraction and classification, and achieve the goal of data transmission and computing security under the collaborative classification process of edge nodes.Firstly, a series of secure computing protocols were designed based on additive secret sharing.Furthermore, two non-collusive edge servers were used to perform secure convolution, secure batch normalization, secure activation, secure pooling and other deep neural network computing layers to realize PPCF.Theoretical and security analysis indicate that PPCF has excellent accuracy and proved to be security.Actual performance evaluation show that PPCF can achieve the same classification accuracy as plaintext environment.At the same time, compared with homomorphic encryption and multi-round iterative calculation schemes, PPCF has obvious advantages in terms of computational cost and communication overhead.…”
    Get full text
    Article
  14. 394
  15. 395

    FEXGBIDS: Federated XGBoost-Based Intrusion Detection System for In-Vehicle Network by Jie Li, Yuanyuan Song, Ming-Gang Zheng, Shuo Zhang, Han Liang

    Published 2025-01-01
    “…By integrating the Federated Learning (FL) framework with cryptographic optimization techniques, FEXGBIDS addresses data silo and security challenges in the vehicular network environment. …”
    Get full text
    Article
  16. 396
  17. 397

    Adversarial Hierarchical-Aware Edge Attention Learning Method for Network Intrusion Detection by Hao Yan, Jianming Li, Lei Du, Binxing Fang, Yan Jia, Zhaoquan Gu

    Published 2025-07-01
    “…The rapid development of information technology has made cyberspace security an increasingly critical issue. Network intrusion detection methods are practical approaches to protecting network systems from cyber attacks. …”
    Get full text
    Article
  18. 398

    A Chaotic Maps-Based Authentication Scheme for Wireless Body Area Networks by Gaimei Gao, Xinguang Peng, Ye Tian, Zefeng Qin

    Published 2016-07-01
    “…Compared with the previous schemes, our scheme not only enjoys more security features but also has reduced computational cost of client and application provider. …”
    Get full text
    Article
  19. 399
  20. 400

    Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data by Naglaa Ibrahim, Hana Usman

    Published 2013-07-01
    “…With the development of the Internet, technological innovation and the availability of information emerged new computer security threats. The researchers are developing new systems known as Intrusion Detection Systems IDSs for detecting the known and unknown attacks.  …”
    Get full text
    Article