Search alternatives:
networks » network (Expand Search)
Showing 401 - 420 results of 836 for search 'Computer networks Security features.', query time: 0.18s Refine Results
  1. 401
  2. 402

    Lightweight machine learning framework for efficient DDoS attack detection in IoT networks by Mamoona Nawaz, Shireen Tahira, Dilawar Shah, Shujaat Ali, Muhammad Tahir

    Published 2025-07-01
    “…Abstract The rapid proliferation of Internet of Things (IoT) devices has introduced significant security challenges, with Distributed Denial of Service (DDoS) attacks posing a critical threat to network integrity. …”
    Get full text
    Article
  3. 403

    Explainability of Network Intrusion Detection Using Transformers: A Packet-Level Approach by Pahavalan Rajkumardheivanayahi, Ryan Berry, Nicholas U. Costagliola, Lance Fiondella, Nathaniel D. Bastian, Gokhan Kul

    Published 2025-01-01
    “…Network Intrusion Detection Systems (NIDS) are critical in ensuring the security of connected computer systems by actively detecting and preventing unauthorized activities and malicious attacks. …”
    Get full text
    Article
  4. 404
  5. 405
  6. 406
  7. 407
  8. 408
  9. 409
  10. 410

    A novel reconstruction-based video anomaly detection with idempotent generative network by Wenmin Dong, Lifeng Zhang, Wenjuan Shi, Xiangwei Zheng, Yuang Zhang

    Published 2025-06-01
    “…Finite Scalar Quantization (FSQ) layer is designed to discretize the encoder’s output, preserving key discriminative features. Meanwhile, the Pyramid Deformation Module (PDM), as an integral part of PSVAE, computes offset maps of original video frames for anomaly detection supplementation. …”
    Get full text
    Article
  11. 411

    Smart Grid Intrusion Detection for IEC 60870-5-104 With Feature Optimization, Privacy Protection, and Honeypot-Firewall Integration by Pedamallu Sai Mrudula, Rayappa David Amar Raj, Archana Pallakonda, Yanamala Rama Muni Reddy, K. Krishna Prakasha, V. Anandkumar

    Published 2025-01-01
    “…The experimental results demonstrate the framework’s operational capability and effectiveness for SCADA network security, achieving 99.29% accuracy, 94.8% recall and 4.1% false positive rates.…”
    Get full text
    Article
  12. 412
  13. 413
  14. 414
  15. 415
  16. 416
  17. 417

    Detecting eavesdropping nodes in the power Internet of Things based on Kolmogorov-Arnold networks. by Rong Wang, Weibin Jiang, Yanjin Shen, Qiqing Yue, Kan-Lin Hsiung

    Published 2025-01-01
    “…The rapid proliferation of the Power Internet of Things (PIoT) has given rise to severe network security threats, with eavesdropping attacks emerging as a paramount concern. …”
    Get full text
    Article
  18. 418
  19. 419

    Adaptive resource optimization mechanism for blockchain sharding in digital twin edge network by Li JIANG, Shengli XIE, Hui TIAN

    Published 2023-03-01
    “…To address the security and privacy issues for data sharing in digital twin edge networks, a new distributed and secure data sharing mechanism was developed by leveraging blockchain sharding.Considering dynamic and time varying features in digital twin edge networks and mapping errors of physic networks, an adaptive resource allocation model was formulated which jointly optimized cluster head selection, local base station (BS) consensus access selection, spectrum and computation consensus resources allocation, in order to maximize transactional throughput for the blockchain sharding.Moreover, a digital twin edge networks empowered two-layered proximal policy optimization (PPO) algorithm was designed to obtain the optimal solutions.Numerical results illustrate that the proposed algorithm can effectively improve the transactional throughput for the blockchain sharding.Meanwhile, it can well adapt to the mapping errors.…”
    Get full text
    Article
  20. 420