Search alternatives:
networks » network (Expand Search)
Showing 521 - 540 results of 836 for search 'Computer networks Security features.', query time: 0.16s Refine Results
  1. 521
  2. 522
  3. 523
  4. 524
  5. 525
  6. 526

    DS-YOLO: A dense small object detection algorithm based on inverted bottleneck and multi-scale fusion network by Hongyu Zhang, Guoliang Li, Dapeng Wan, Ziyue Wang, Jinshun Dong, Shoujun Lin, Lixia Deng, Haiying Liu

    Published 2024-12-01
    “…Firstly, to enhance the dense small objects’ feature extraction capability of backbone network, the paper proposes a lightweight backbone. …”
    Get full text
    Article
  7. 527
  8. 528

    A big data analysis algorithm for massive sensor medical images by Sarah A. Alzakari, Nuha Alruwais, Shaymaa Sorour, Shouki A. Ebad, Asma Abbas Hassan Elnour, Ahmed Sayed

    Published 2024-11-01
    “…Current anomaly detection methods in healthcare systems, such as artificial intelligence and big data analytics-intracerebral hemorrhage (AIBDA-ICH) and parallel conformer neural network (PCNN), face several challenges, including high resource consumption, inefficient feature selection, and an inability to handle temporal data effectively for real-time monitoring. …”
    Get full text
    Article
  9. 529

    Regional experience in organizing the protection of minors from a destructive information environment (by the example of non-central regions) by S. E. Titor

    Published 2023-03-01
    “…Achievements in the field of new technologies, on which the formation of the modern information society is based, have led to the rapid development of the global computer network Internet. The Internet as a means of social communication has both a positive impact on the world community and has negative consequences. …”
    Get full text
    Article
  10. 530
  11. 531
  12. 532
  13. 533
  14. 534

    Lightweight authentication for IoT devices (LAID) in sustainable smart cities by Aqeel Khalique, Farheen Siddiqui, Mohd Abdul Ahad, Imran Hussain

    Published 2025-07-01
    “…Due to constrained nature of IoT, ensuring security in IoT enabled network is a challenge. However, growing urban population and exponential rise in IoT enabled devices make it challenging to implement and ensure security mechanisms. …”
    Get full text
    Article
  15. 535

    Distributed denial-of-service (DDoS) on the smart grids based on VGG19 deep neural network and Harris Hawks optimization algorithm by Abdurahim Alhashmi, H. Idwaib, Selçuk Alparslan Avci, Javad Rahebi, Raheleh Ghadami

    Published 2025-05-01
    “…The suggested approach uses the robust feature extraction capability of VGG19-DNN for network traffic pattern analysis to detect abnormal traffic flows indicative of DDoS attacks. …”
    Get full text
    Article
  16. 536
  17. 537

    Development of Various Stacking Ensemble-Based HIDS Using ADFA Datasets by Hami Satilmis, Sedat Akleylek, Zaliha Yuce Tok

    Published 2025-01-01
    “…The rapid increase in the number of cyber attacks and the emergence of various attack variations pose significant threats to the security of computer systems and networks. Various intrusion detection systems (IDS) are developed to defend computer systems and networks in response to these threats. …”
    Get full text
    Article
  18. 538
  19. 539

    Deep learning with leagues championship algorithm based intrusion detection on cybersecurity driven industrial IoT systems by Saud S. Alotaibi, Turki Ali Alghamdi

    Published 2025-08-01
    “…However, owing to the constraints of limited resources and computation abilities, IoT networks are subject to different cyber-attacks. …”
    Get full text
    Article
  20. 540