Search alternatives:
networks » network (Expand Search)
Showing 441 - 460 results of 836 for search 'Computer networks Security features.', query time: 0.10s Refine Results
  1. 441
  2. 442
  3. 443
  4. 444

    Spatial-Temporal Cooperative In-Vehicle Network Intrusion Detection Method Based on Federated Learning by Liu Tao, Zhao Xiyang

    Published 2025-01-01
    “…With the widespread adoption of intelligent connected vehicles (ICV) and the rapid development of the internet of vehicles (IoV), the security of in-vehicle network (IVN) has become increasingly critical. …”
    Get full text
    Article
  5. 445
  6. 446
  7. 447
  8. 448
  9. 449
  10. 450
  11. 451

    PlantNet: Scalable Convolutional Neural Network for Image-Based Plant Disease Detection by Sinha Anupa, Kumaraswamy Balasubramaniam

    Published 2025-01-01
    “…The model employs transfer learning, utilizing pre-trained networks on vast image repositories before fine-tuning on a specialized plant disease dataset, thereby enhancing feature extraction while minimizing computational complexity. …”
    Get full text
    Article
  12. 452

    Artificial Intelligence-based Rice Variety Classification: A State-of-the-art Review and Future Directions by Md. Masudul Islam, Galib Muhammad Shahriar Himel, Md. Golam Moazzam, Mohammad Shorif Uddin

    Published 2025-03-01
    “…The study examines key steps in the automation process, including image acquisition, pre-processing, feature extraction, and classification algorithms, with particular emphasis on machine learning and deep learning methods such as Convolutional Neural Networks (CNNs), which have demonstrated exceptional performance in recent research. …”
    Get full text
    Article
  13. 453

    Enhancing biometric identification using 12-lead ECG signals and graph convolutional networks by Maram Al Alfi, Pedro Peris-Lopez, Carmen Camara

    Published 2025-04-01
    “…This study presents a novel real-time biometric authentication system integrating Graph Convolutional Networks (GCN) with Mutual Information (MI) indices extracted from 12-lead ECG signals.MethodsThe MI index quantifies the statistical dependencies among ECG leads and is computed using entropy-based estimations. …”
    Get full text
    Article
  14. 454
  15. 455

    Optimizing IoT intrusion detection with cosine similarity based dataset balancing and hybrid deep learning by Arvind Prasad, Wael Mohammad Alenazy, Naved Ahmad, Gauhar Ali, Hanaa A. Abdallah, Sadique Ahmad

    Published 2025-08-01
    “…These findings establish CSMCR as a robust, scalable, and computationally efficient IDS balancing strategy tailored for IoT network security.…”
    Get full text
    Article
  16. 456
  17. 457
  18. 458
  19. 459

    Cluster Node Migration Oriented Holistic Trust Management Protocol for Ubiquitous and Pervasive IoT Network by Anup Patnaik, Banitamani Mallik, M. Vamsi Krishna

    Published 2021-01-01
    “…Unless security considerations are analyzed and implemented properly in real time then IoT cannot be perceived as a pervasive network for the possible stakeholders. …”
    Get full text
    Article
  20. 460