-
121
Optimizing Cervical Cancer Diagnosis with Feature Selection and Deep Learning
Published 2025-01-01Get full text
Article -
122
Enhancing intrusion detection in IoT networks using machine learning-based feature selection and ensemble models
Published 2024-12-01“…Internet of Things (IoT) technology has evolved significantly, transitioning from personal devices to powering smart cities and global deployments across diverse industries. However, security challenges arise due to diverse devices using various protocols and having limited computational capabilities, leading to vulnerabilities and potential intrusions in IoT networks. …”
Get full text
Article -
123
A Proactive Model for Intrusion Detection Using Image Representation of Network Flows
Published 2024-01-01Get full text
Article -
124
IMpc-PyrYOLO: Hybrid YOLO Based Feature Pyramidal Network for Pest Detection in Rice Leaves
Published 2025-06-01“…The model integrates an efficient channel attention (ECA) mechanism with the feature pyramidal network (FPN) in the YOLO network to improve multi-scale feature extraction and pest classification accuracy. …”
Get full text
Article -
125
Encrypted Image Retrieval System based on Features Analysis
Published 2018-07-01“…However, since communication between digital products takes place in a public network, the necessity of security for digital images becomes vital. …”
Get full text
Article -
126
Analysis of Basic Compounds in a Network Intrusion Detection System using NSL-KDD Data
Published 2013-03-01Get full text
Article -
127
Encrypted malicious traffic detection based on neural network
Published 2025-03-01Get full text
Article -
128
Efficient IDS for IoT Networks Using Host-Based Data Aggregation and Multi-Entropy Analysis
Published 2025-01-01Get full text
Article -
129
Enhancing IoT device security: CNN-SVM hybrid approach for real-time detection of DoS and DDoS attacks
Published 2024-11-01“…Therefore, developing a secure IoT system is vital, shielding against attackers leveraging IoT devices to obtain network access and maintaining data security during transmission between these devices. …”
Get full text
Article -
130
Beyond Traditional Biometrics: Harnessing Chest X-Ray Features for Robust Person Identification
Published 2024-08-01Get full text
Article -
131
-
132
Multiscale Two-Stream Fusion Network for Benggang Classification in Multi-Source Images
Published 2025-05-01Get full text
Article -
133
An adaptive hybrid framework for IIoT intrusion detection using neural networks and feature optimization using genetic algorithms
Published 2025-05-01“…Abstract In Industrial Internet of Things (IIoT) networks, securing device connectivity through effective intrusion detection systems is essential for maintaining operational integrity. …”
Get full text
Article -
134
CSTAN: A Deepfake Detection Network with CST Attention for Superior Generalization
Published 2024-11-01Get full text
Article -
135
A topology-guided high-quality solution learning framework for security-constraint unit commitment based on graph convolutional network
Published 2025-03-01“…In this sense, this paper proposes a topology-guided high-quality solution learning framework based on graph convolutional network (GCN) and neighborhood search (NS). Firstly, a GCN-based method is presented to learn the potential patterns between commitments and graph data associated with bus feature and power grid topology. …”
Get full text
Article -
136
Intrusion Detection and Real-Time Adaptive Security in Medical IoT Using a Cyber-Physical System Design
Published 2025-07-01Get full text
Article -
137
Cross-stream attention enhanced central difference convolutional network for CG image detection
Published 2024-12-01“…With the maturation of computer graphics (CG) technology in the field of image generation, the realism of created images has been improved significantly. …”
Get full text
Article -
138
-
139
A low cost compact network TAP device with Raspberry Pi 4
Published 2025-10-01“…With this feature Network TAP devices play a main role in network security, network visibility, network monitoring, forensics, etc. …”
Get full text
Article -
140