Search alternatives:
networks » network (Expand Search)
Showing 81 - 100 results of 836 for search 'Computer networks Security features.', query time: 0.13s Refine Results
  1. 81
  2. 82
  3. 83
  4. 84
  5. 85

    An Effective Network Intrusion Detection System Using Recursive Feature Elimination Technique by Narendra Singh Yadav, Vijay Prakash Sharma, D. Sikha Datta Reddy, Saswati Mishra

    Published 2023-12-01
    “…Machine learning facilitates the growth of an intrusion detection system (IDS) in the context of cyber security. These systems are proposed to identify and classify cyber-attacks on the network. …”
    Get full text
    Article
  6. 86

    Security and Fairness in Multiparty Quantum Secret Sharing Protocol by Alessio Di Santo, Walter Tiberti, Dajana Cassioli

    Published 2025-01-01
    “…However, none of these works account for redundancy, enhanced security/privacy features, or authentication mechanisms able to fingerprint players. …”
    Get full text
    Article
  7. 87
  8. 88
  9. 89
  10. 90
  11. 91
  12. 92
  13. 93

    Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging by Ikram Benfarhat, Vik Tor Goh, Chun Lim Siow, Muhammad Sheraz, Teong Chee Chuah

    Published 2025-01-01
    “…Securing data transactions across computer networks presents significant challenges, particularly concerning data privacy and cybersecurity threats. …”
    Get full text
    Article
  14. 94
  15. 95
  16. 96

    An Effective Method for Detecting Cyber Attacks on Computer Networks from the NSL-KDD Data Set by Shaik Aseena Babu, Reddy Rajeswara, Vullam Nagagopi Raju, Reddy Gondi Konda, Shaik Subhani

    Published 2025-01-01
    “…Logistic regression models can fully favor network traffic structure information to capture features more comprehensively. …”
    Get full text
    Article
  17. 97

    Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques by Hanaa Attou, Azidine Guezzaz, Said Benkirane, Mourade Azrour, Yousef Farhaoui

    Published 2023-09-01
    “…Cloud computing (CC) is a novel technology that has made it easier to access network and computer resources on demand such as storage and data management services. …”
    Get full text
    Article
  18. 98

    Restricted Boltzmann machine with Sobel filter dense adversarial noise secured layer framework for flower species recognition by Shyamala Devi M, Sundaravadivazhagan Balasubaramanian, Balasubramaniam S, Mohd Asif Shah

    Published 2025-04-01
    “…The Flowers Recognition KAGGLE dataset preprocessing was done to extract only the important features using the Sobel filter that computes the image intensity gradient at every pixel in the image. …”
    Get full text
    Article
  19. 99
  20. 100