-
461
Detecting Zero-Day Web Attacks with an Ensemble of LSTM, GRU, and Stacked Autoencoders
Published 2025-05-01Get full text
Article -
462
RLEAFS: Reinforcement Learning-Based Energy Aware Forwarding Strategy for NDN-Based IoT Networks
Published 2024-01-01Get full text
Article -
463
Jordanian banknote data recognition: A CNN-based approach with attention mechanism
Published 2024-04-01Get full text
Article -
464
A novel routing protocol for content-based publish/subscribe model in mobile sensor networks
Published 2019-09-01Get full text
Article -
465
-
466
-
467
-
468
-
469
FRR: A Fast Routing Recovery mechanism minimizing network formation time in smart grids
Published 2025-03-01Get full text
Article -
470
Ensemble-based sesame disease detection and classification using deep convolutional neural networks (CNN)
Published 2025-08-01Get full text
Article -
471
SVMFN-FSAR: Semantic-Guided Video Multimodal Fusion Network for Few-Shot Action Recognition
Published 2025-05-01“…Few-Shot Action Recognition (FSAR) has been a heat topic in various areas, such as computer vision and forest ecosystem security. FSAR aims to recognize previously unseen classes using limited labeled video examples. …”
Get full text
Article -
472
MDPNet: a dual-path parallel fusion network for multi-modal MRI glioma genotyping
Published 2025-05-01Get full text
Article -
473
Laryngeal cancer diagnosis based on improved YOLOv8 algorithm
Published 2025-01-01Get full text
Article -
474
An efficient privacy-preserving multilevel fusion-based feature engineering framework for UAV-enabled land cover classification using remote sensing images
Published 2025-07-01“…Deep learning (DL) methods are essential for processing security problems in UAV networks. This paper presents a Privacy-Preserving Intrusion Detection Model for UAV-Based Remote Sensing Applications in Land Cover Classification Using Multilevel Fusion Feature Engineering (IDUAVRS-LCCMFFE) technique. …”
Get full text
Article -
475
-
476
-
477
Elliptic curve cryptography and biometrics for iot authentication
Published 2025-01-01“…Lastly, our protocol and other protocols are compared in terms of computational costs, communication costs, and security features.…”
Get full text
Article -
478
5G-Practical Byzantine Fault Tolerance: An Improved PBFT Consensus Algorithm for the 5G Network
Published 2025-03-01Get full text
Article -
479
Neurophysiological Approaches to Lie Detection: A Systematic Review
Published 2025-05-01Get full text
Article -
480
THE IMPACT OF ECONOMIC COMPANY DATA THEFT
Published 2018-05-01“…In terms of preventing internal threats, solutions have powerful encryption algorithms that protect important business information, application control tools, device control, web control and mobile device management features to implement IT security policies. The solutions created by specialists provide effective protection against all types of threats on the Internet and help maintain productivity at work with simple web policies that can limit employees‟ access to social networks, online gaming, or other sites during working hours. …”
Get full text
Article