-
41
Image-Based Malicious Network Traffic Detection Framework: Data-Centric Approach
Published 2025-06-01Get full text
Article -
42
Securing Automotive Networks from DoS and Fuzzy Attacks with Optimized LSTM Models
Published 2025-04-01Get full text
Article -
43
-
44
Research on SDN Architecture and Security
Published 2013-03-01“…With the rapid deve1opment of c1oud computing and mobi1e internet, the features that network exhibits, such as diversity, dec1are for urgent requirements for sca1abi1ity, manageabi1ity and security of the data center.The SDN architecture shows a promising way of dea1ing with the above requirements of network through revo1utionary innovation of the traditiona1 network architecture, which attracts great interest of companies and research institutes.However, according to the recent research and progress of SDN, security prob1em has not been addressed, which wi11 be a significant issue.Based on the situation, the basis of SDN, inc1uding the origination, architecture, standardization work and standardized protoco1, were described, and the security issue was a1so ana1yzed.In the security part, the exhibiting new features of security prob1em for SDN, were ana1yzed, by 1isting the undergoing work, and then the security threats in SDN were conc1uded.Fina11y, a suggested architecture for security research of SDN was proposed.…”
Get full text
Article -
45
A secured and fault-tolerant algorithm for electing an efficient coordinator in distributed networks
Published 2024-12-01Get full text
Article -
46
A Secure and Energy-Efficient Cross-Layer Network Architecture for the Internet of Things
Published 2025-05-01Get full text
Article -
47
Neuro-Driven Agent-Based Security for Quantum-Safe 6G Networks
Published 2025-06-01“…Around the same time that 6G networks will be launched, advances in quantum computing could challenge existing cryptographic security. …”
Get full text
Article -
48
Securing face images in UAV networks using chaos and DNA cryptography approach
Published 2025-07-01Get full text
Article -
49
A Comprehensive Analysis of Security Challenges in ZigBee 3.0 Networks
Published 2025-07-01Get full text
Article -
50
Design of Network Security Anomaly Detection Model Based on SLNA Cell Structure
Published 2024-01-01Get full text
Article -
51
TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks
Published 2014-01-01“…In recent years, trust-aware routing protocol plays a vital role in security of wireless sensor networks (WSNs), which is one of the most popular network technologies for smart city. …”
Get full text
Article -
52
Enhancing Network Security: A Study on Classification Models for Intrusion Detection Systems
Published 2025-06-01Get full text
Article -
53
-
54
-
55
An optimized ensemble model with advanced feature selection for network intrusion detection
Published 2024-11-01Get full text
Article -
56
CAA-RF: An Anomaly Detection Algorithm for Computing Power Blockchain Networks
Published 2025-05-01“…As a distributed communication and storage system, blockchain forms a Computing Power Blockchain Network (CPBN) by integrating computing nodes and network resources. …”
Get full text
Article -
57
Securing Unmanned Aerial Vehicles Networks Using Pairing Free Aggregate Signcryption Scheme
Published 2024-01-01“…Multiple groups of UAVs, through appropriate interaction and concerted procedures, can achieve these objectives. The unpredictable features of UAVs and their reliance on unprotected and widely available wireless networks create challenges in establishing secure communication between a private edge cloud and a UAV. …”
Get full text
Article -
58
Secure and efficient cloudlet networks: blockchain integration with agent-based proof of trust mechanism
Published 2025-03-01“…Experimental results demonstrate that this solution significantly enhances security, mitigates latency, and improves network performance compared to existing methods. …”
Get full text
Article -
59
Deep learning for network security: an Attention-CNN-LSTM model for accurate intrusion detection
Published 2025-07-01Get full text
Article -
60
Federal Deep Learning Approach of Intrusion Detection System for In-Vehicle Communication Network Security
Published 2025-01-01Get full text
Article