Search alternatives:
networks » network (Expand Search)
Showing 541 - 560 results of 836 for search 'Computer networks Security features.', query time: 0.11s Refine Results
  1. 541
  2. 542

    Copula entropy regularization transformer with C2 variational autoencoder and fine-tuned hybrid DL model for network intrusion detection by Srinivas Akkepalli, Sagar K

    Published 2025-03-01
    “…In cyber security, Intrusion Detection Systems (IDS) act as a network security tool, in which computational complexity and dynamic IDS detection issues are observed by conventional studies. …”
    Get full text
    Article
  3. 543
  4. 544
  5. 545
  6. 546
  7. 547

    Graph Neural Network Classification in EEG-Based Biometric Identification: Evaluation of Functional Connectivity Methods Using Time-Frequency Metric by Roghaieh Ashenaei, Ali Asghar Beheshti Shirazi

    Published 2025-01-01
    “…Despite reduced setup complexity, our GCNN achieves over 98% identification accuracy, comparable to CNN-based studies using 64 channels, with significantly lower computational cost and trainable variables reduced to less than 0.25 of those in a Convolutional Neural Network (CNN). …”
    Get full text
    Article
  8. 548
  9. 549
  10. 550

    A depth-wise separable VGG19-capsule network for enhanced bell pepper and grape leaf disease classification with ensemble activation by Midhun P Mathew, Sudheep Elayidom, Jagathy Raj V P, Abubeker K M

    Published 2025-01-01
    “…This ensures that the capsule network effectively captures spatial information and preserves the hierarchical relationships between features. …”
    Get full text
    Article
  11. 551

    Reflective Distributed Denial of Service Detection: A Novel Model Utilizing Binary Particle Swarm Optimization—Simulated Annealing for Feature Selection and Gray Wolf Optimization-... by Daoqi Han, Honghui Li, Xueliang Fu

    Published 2024-09-01
    “…The fast growth of the Internet has made network security problems more noticeable, so intrusion detection systems (IDSs) have become a crucial tool for maintaining network security. …”
    Get full text
    Article
  12. 552
  13. 553
  14. 554
  15. 555

    Mitigating cloud vulnerabilities using a blockchain platform by Dina Zoughbi, Kavitha Venkatachalam

    Published 2025-04-01
    “…Hence, the advanced neural networks, coupled with cloud and edge computing, can significantly optimize CBIR systems, making them more robust, scalable, and applicable to a wide range of industries such as healthcare, security, and e-commerce.…”
    Get full text
    Article
  16. 556
  17. 557
  18. 558

    A Lightweight Intrusion Detection System for Internet of Things: Clustering and Monte Carlo Cross-Entropy Approach by Abdulmohsen Almalawi

    Published 2025-04-01
    “…To address these challenges, machine learning-based intrusion detection systems (IDSs)—traditionally considered a primary line of defense—have been deployed to monitor and detect malicious activities in IoT networks. Despite this, these IDS solutions often struggle with the inherent resource constraints of IoT devices, including limited computational power and memory. …”
    Get full text
    Article
  19. 559
  20. 560

    Two stage malware detection model in internet of vehicles (IoV) using deep learning-based explainable artificial intelligence with optimization algorithms by Manal Abdullah Alohali, Sultan Alahmari, Mohammed Aljebreen, Mashael M. Asiri, Achraf Ben Miled, Sami Saad Albouq, Othman Alrusaini, Ali Alqazzaz

    Published 2025-07-01
    “…Numerous interaction activities occur among IoV entities to share significant information, which is essential for network operation. As part of intellectual transportation, IoV is a hot topic for researchers because it faces numerous unresolved challenges, particularly regarding privacy and security. …”
    Get full text
    Article