Search alternatives:
networks » network (Expand Search)
Showing 721 - 740 results of 836 for search 'Computer networks Security features.', query time: 0.10s Refine Results
  1. 721
  2. 722
  3. 723
  4. 724
  5. 725
  6. 726
  7. 727
  8. 728
  9. 729
  10. 730
  11. 731
  12. 732

    Hybrid deep learning model for accurate and efficient android malware detection using DBN-GRU. by Heena Kauser Sk, Maria Anu V

    Published 2025-01-01
    “…The model extracts static features (permissions, API calls, intent filters) and dynamic features (system calls, network activity, inter-process communication) from Android APKs, enabling a comprehensive analysis of application behavior.The proposed model was trained and tested on the Drebin dataset, which includes 129,013 applications (5,560 malware and 123,453 benign).Performance evaluation against NMLA-AMDCEF, MalVulDroid, and LinRegDroid demonstrated that DBN-GRU achieved 98.7% accuracy, 98.5% precision, 98.9% recall, and an AUC of 0.99, outperforming conventional models.In addition, it exhibits faster preprocessing, feature extraction, and malware classification times, making it suitable for real-time deployment.By bridging static and dynamic detection methodologies, the DBN-GRU enhances malware detection capabilities while reducing false positives and computational overhead.These findings confirm the applicability of the proposed model in real-world Android security applications, offering a scalable and high-performance malware detection solution.…”
    Get full text
    Article
  13. 733
  14. 734
  15. 735
  16. 736

    Intrusion Detection Using Hybrid Pearson Correlation and GS-PSO Optimized Random Forest Technique for RPL-Based IoT by Wei Yang, Xinlong Wang, Zhiming Zhang, Shaolong Chen, Chengqi Hou, Siwei Luo

    Published 2025-01-01
    “…The Pearson correlation can effectively extract key data features for different routing attacks. And the hybrid GS-PSO algorithm can optimize the hyperparameters of IDS model and enhance the accuracy of the detection mechanism while significantly reducing computational overhead. …”
    Get full text
    Article
  17. 737

    Interdisciplinary framework for cyber-attacks and anomaly detection in industrial control systems using deep learning by Qawsar Gulzar, Khurram Mustafa

    Published 2025-07-01
    “…In this study, we introduced an interdisciplinary framework that aims to enhance network intrusion detection systems (NIDSs). In this framework, we introduced an IDS via feature selection and feature reduction technique(s) with the attention-driven lightweight deep neural networks: Deep Recurrent Neural Networks (RNN), Deep Long Short-Term Memory (LSTM), and Deep Bi-directional Long Short-Term Memory (Bi-LSTM). …”
    Get full text
    Article
  18. 738

    User authentication of industrial internet based on HHT transform of mouse behavior by Yigong ZHANG, Qian YI, Jian LI, Congbo LI, Aijun YIN, Shuping YI

    Published 2022-06-01
    “…The rapid development of the industrial internet had caused widespread concern about the network security, and the end-user authentication technology was considered a research hotspot.According to the characteristics of human-computer interaction in industrial internet, an experimental website was designed.24 users' mouse behavior data in an uncontrolled environment were collected within 2.5 years to conduct case studies.Hilbert-Huang transform (HHT) was used to extract frequency domain features of mouse behavior signals, combined with time domain features to form a time-frequency joint domain feature matrix of 163-dimensional to characterize user mouse behavior patterns.Bagged tree, support vector machine (SVM), Boost tree and K-nearest neighbor (KNN) were used to build a user authentication model, and the comparison result showed that the Bagged tree had the best internal detection effect in this case, with an average false acceptance rate (FAR) of 0.12% and an average false rejection rate (FRR) of 0.28%.In external detection, the FAR was 1.47%.Compared with the traditional mouse dynamics method, the frequency domain information of mouse behavior extracted by HHT can better realize the user authentication, and provide technical support the security of the industrial internet.…”
    Get full text
    Article
  19. 739

    Peculiarities of evidence in the course of investigation of criminal offences under parts 1, 2 of Article 111-1 of the Criminal Code of Ukraine by S. Ye. Ablamskyi, O. V. Kovtun, V. V. Ablamska

    Published 2024-09-01
    “…It is substantiated that in modern conditions, evidence in the course of investigation of criminal offences under Parts 1, 2 of Art. 111-1 of the Criminal Code of Ukraine is inseparable from taking into account the features of modern equipment which can be used for information transmission, analysis of computer information and information from correspondence, channels and groups in social networks containing valuable information, samples of signatures, seals and other details of documents which reflect information about the collaboration activities of individuals and groups. …”
    Get full text
    Article
  20. 740