-
101
Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification
Published 2025-04-01Get full text
Article -
102
-
103
-
104
A deep Reinforcement learning-based robust Intrusion Detection System for securing IoMT Healthcare Networks
Published 2025-04-01“…However, the widespread deployment of these devices introduces significant security vulnerabilities due to limited resources and inadequate network protocols. …”
Get full text
Article -
105
Build with intrinsic security: Trusted autonomy security system
Published 2020-11-01“…Compared to traditional Internet of things networks, this architecture uses trusted computing technique to build the basic of security, and makes Internet of things network available to manage security automatically. …”
Get full text
Article -
106
Cyberterrorism: content, forms and promising countermeasures
Published 2023-10-01“…The main forms of cyber terrorism are revealed: the commission of terrorist acts by organisations, groups and individuals using computers and computer networks or by influencing the information processed (circulated) in them, as well as the use of cyberspace for other purposes of terrorist activities not directly related to the commission of terrorist acts. …”
Get full text
Article -
107
-
108
MW‐SAM:Mangrove wetland remote sensing image segmentation network based on segment anything model
Published 2024-12-01Get full text
Article -
109
-
110
Connected Vehicles Security: A Lightweight Machine Learning Model to Detect VANET Attacks
Published 2025-06-01“…Vehicular ad hoc networks (VANETs) aim to manage traffic, prevent accidents, and regulate various parts of traffic. …”
Get full text
Article -
111
Style Transfer and Topological Feature Analysis of Text-Based CAPTCHA via Generative Adversarial Networks
Published 2025-06-01“…The design and cracking of text-based CAPTCHAs are important topics in computer security. This study proposes a method for the style transfer of text-based CAPTCHAs using Generative Adversarial Networks (GANs). …”
Get full text
Article -
112
-
113
GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks
Published 2020-01-01“…Due to the dual constraints of the hybrid feature of edge computing networks and the uncertainty of new attack features, implementing active defence measures such as detection, evasion, trap, and control is essential for the security protection of edge computing networks with high real-time and continuity requirements. …”
Get full text
Article -
114
Fast anomalous traffic detection system for secure vehicular communications
Published 2024-12-01Get full text
Article -
115
PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing
Published 2021-05-01Get full text
Article -
116
-
117
A Verifiably Secure and Lightweight Device-to-Device (D2D) Authentication Protocol for the Resource-Constrained IoT Networks
Published 2025-01-01“…The protocol minimizes energy and computational costs while ensuring strong security by utilizing mutual authentication and effective cryptographic primitives. …”
Get full text
Article -
118
-
119
FE-DIoT: IoT Device Classification Through Dynamic Feature Selection and Adaptive Cross-Network Model
Published 2024-01-01Get full text
Article -
120
ConvGRU: A Lightweight Intrusion Detection System for Vehicle Networks Based on Shallow CNN and GRU
Published 2025-01-01“…To address these challenges, this study proposes ConvGRU, a lightweight vehicular network intrusion detection model that integrates a shallow Convolutional Neural Network (CNN) with a Gated Recurrent Unit (GRU). …”
Get full text
Article