Search alternatives:
networks » network (Expand Search)
Showing 481 - 500 results of 836 for search 'Computer networks Security features.', query time: 0.16s Refine Results
  1. 481
  2. 482
  3. 483
  4. 484
  5. 485
  6. 486
  7. 487
  8. 488

    Unseen Attack Detection in Software-Defined Networking Using a BERT-Based Large Language Model by Mohammed N. Swileh, Shengli Zhang

    Published 2025-07-01
    “…By utilizing Random Forest for feature selection, we optimize model performance and reduce computational overhead, ensuring efficient and accurate detection. …”
    Get full text
    Article
  9. 489
  10. 490

    HSTCN-NuSVC: A Homogeneous Stacked Deep Ensemble Learner for Classifying Human Actions Using Smartphones by Sarmela Raja Sekaran, Ying Han Pang, Ooi Shih Yin, Lim Zheng You

    Published 2025-02-01
    “…Smartphone-based human activity recognition (HAR) is an important research area due to its wide-ranging applications in health, security, gaming, etc. Existing HAR models face challenges such as tedious manual feature extraction/selection techniques, limited model generalisation, high computational cost, and inability to retain longer-term dependencies. …”
    Get full text
    Article
  11. 491
  12. 492
  13. 493
  14. 494

    Research on Small-Sample Credit Card Fraud Identification Based on Temporal Attention-Boundary-Enhanced Prototype Network by Boyu Liu, Longrui Wu, Shengdong Mu

    Published 2024-12-01
    “…Additionally, nearest-neighbor boundary loss is introduced after the computation of the prototype-like network model to adjust the overall distribution of features in the metric space and to clarify the representation boundaries of the prototype-like model. …”
    Get full text
    Article
  15. 495

    Highly accurate anomaly based intrusion detection through integration of the local outlier factor and convolutional neural network by Rahimullah Rabih, Hamed Vahdat-Nejad, Wathiq Mansoor, Javad Hassannataj Joloudari

    Published 2025-07-01
    “…Abstract Intrusion detection systems (IDS) are critical for safeguarding computer networks by identifying malicious activities. …”
    Get full text
    Article
  16. 496
  17. 497
  18. 498
  19. 499

    Digits Recognition for Arabic Handwritten through Convolutional Neural Networks, Local Binary Patterns, and Histogram of Oriented Gradients by Bushra Mahdi Hasan, Zahraa Jasim Jaber, Ahmad Adel Habeeb

    Published 2024-10-01
    “…In addition, a Histogram of Oriented Gradients (HOG) is a feature extraction technique that is used in computer vision and image processing for the purpose of object detection. …”
    Get full text
    Article
  20. 500