Search alternatives:
networks » network (Expand Search)
Showing 101 - 120 results of 836 for search 'Computer networks Security features.', query time: 0.11s Refine Results
  1. 101
  2. 102
  3. 103
  4. 104

    A deep Reinforcement learning-based robust Intrusion Detection System for securing IoMT Healthcare Networks by Jamshed Ali Shaikh, Chengliang Wang, Muhammad Wajeeh Us Sima, Muhammad Arshad, Muhammad Owais, Dina S. M. Hassan, Reem Alkanhel, Mohammed Saleh Ali Muthanna

    Published 2025-04-01
    “…However, the widespread deployment of these devices introduces significant security vulnerabilities due to limited resources and inadequate network protocols. …”
    Get full text
    Article
  5. 105

    Build with intrinsic security: Trusted autonomy security system by Shen He, Jing Huang, Penglin Yang

    Published 2020-11-01
    “…Compared to traditional Internet of things networks, this architecture uses trusted computing technique to build the basic of security, and makes Internet of things network available to manage security automatically. …”
    Get full text
    Article
  6. 106

    Cyberterrorism: content, forms and promising countermeasures by D. S. Melnyk

    Published 2023-10-01
    “…The main forms of cyber terrorism are revealed: the commission of terrorist acts by organisations, groups and individuals using computers and computer networks or by influencing the information processed (circulated) in them, as well as the use of cyberspace for other purposes of terrorist activities not directly related to the commission of terrorist acts. …”
    Get full text
    Article
  7. 107
  8. 108
  9. 109
  10. 110

    Connected Vehicles Security: A Lightweight Machine Learning Model to Detect VANET Attacks by Muawia A. Elsadig, Abdelrahman Altigani, Yasir Mohamed, Abdul Hakim Mohamed, Akbar Kannan, Mohamed Bashir, Mousab A. E. Adiel

    Published 2025-06-01
    “…Vehicular ad hoc networks (VANETs) aim to manage traffic, prevent accidents, and regulate various parts of traffic. …”
    Get full text
    Article
  11. 111

    Style Transfer and Topological Feature Analysis of Text-Based CAPTCHA via Generative Adversarial Networks by Tao Xue, Zixuan Guo, Zehang Yin, Yu Rong

    Published 2025-06-01
    “…The design and cracking of text-based CAPTCHAs are important topics in computer security. This study proposes a method for the style transfer of text-based CAPTCHAs using Generative Adversarial Networks (GANs). …”
    Get full text
    Article
  12. 112
  13. 113

    GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks by Qianmu Li, Jun Hou, Shunmei Meng, Huaqiu Long

    Published 2020-01-01
    “…Due to the dual constraints of the hybrid feature of edge computing networks and the uncertainty of new attack features, implementing active defence measures such as detection, evasion, trap, and control is essential for the security protection of edge computing networks with high real-time and continuity requirements. …”
    Get full text
    Article
  14. 114
  15. 115
  16. 116
  17. 117

    A Verifiably Secure and Lightweight Device-to-Device (D2D) Authentication Protocol for the Resource-Constrained IoT Networks by Naif Alzahrani

    Published 2025-01-01
    “…The protocol minimizes energy and computational costs while ensuring strong security by utilizing mutual authentication and effective cryptographic primitives. …”
    Get full text
    Article
  18. 118
  19. 119
  20. 120

    ConvGRU: A Lightweight Intrusion Detection System for Vehicle Networks Based on Shallow CNN and GRU by Shaoqiang Wang, Jiahui Cheng, Yizhe Wang, Shutong Li, Lei Kang, Yinfei Dai

    Published 2025-01-01
    “…To address these challenges, this study proposes ConvGRU, a lightweight vehicular network intrusion detection model that integrates a shallow Convolutional Neural Network (CNN) with a Gated Recurrent Unit (GRU). …”
    Get full text
    Article