Search alternatives:
networks » network (Expand Search)
Showing 741 - 760 results of 836 for search 'Computer networks Security features.', query time: 0.09s Refine Results
  1. 741
  2. 742

    Technical, forensic and organisational aspects of work with Monero cryptocurrency by V. V. Nosov, O. V. Manzhai, V. O. Kovtun

    Published 2023-09-01
    “…The features of forensic investigation of computer equipment used to work with Monero are revealed. …”
    Get full text
    Article
  3. 743

    Continuous Gesture Sequences Recognition Based on Few-Shot Learning by Zhe Liu, Cao Pan, Hongyuan Wang

    Published 2022-01-01
    “…The scheme uses Mediapipe to detect the key points of each frame in the video stream, decomposes the basic components of gesture features based on certain human palm structure, and then extracts and combines the above basic gesture features by a lightweight autoencoder network. …”
    Get full text
    Article
  4. 744
  5. 745
  6. 746
  7. 747
  8. 748

    Ensemble Voting for Enhanced Robustness in DarkNet Traffic Detection by Varun Shinde, Kartik Singhal, Ahmad Almogren, Vineet Dhanawat, Vishal Karande, Ateeq Ur Rehman

    Published 2024-01-01
    “…The increasing prevalence of DarkNet traffic poses significant challenges for network security. Despite improvements in machine learning techniques, most of the existing studies have not applied appropriate ensemble voting models on newer datasets like CIC-Darknet 2020. …”
    Get full text
    Article
  9. 749
  10. 750
  11. 751

    An Improved Machine Learning-Based Model for Detecting and Classifying PQDs with High Noise Immunity in Renewable-Integrated Microgrids by Irfan Ali Channa, Dazi Li, Mohsin Ali Koondhar, Fida Hussain Dahri, Ibrahim Mahariq

    Published 2024-01-01
    “…Recently, renewable energy sources integrated with microgrid (MG) networks have provided safe, secure, and reliable power supply to both utility and industrial purposes. …”
    Get full text
    Article
  12. 752

    Certificateless aggregate signcryption scheme with multi-ciphertext equality test for the internet of vehicles. by Xiaodong Yang, Xilai Luo, Ruixia Liu, Songyu Li, Ke Yao

    Published 2025-01-01
    “…When compared to similar schemes, this approach exhibits reduced computational overhead while providing superior security features.…”
    Get full text
    Article
  13. 753
  14. 754
  15. 755
  16. 756
  17. 757
  18. 758
  19. 759
  20. 760