Search alternatives:
networks » network (Expand Search)
Showing 121 - 140 results of 836 for search 'Computer networks Security features.', query time: 0.15s Refine Results
  1. 121
  2. 122

    Enhancing intrusion detection in IoT networks using machine learning-based feature selection and ensemble models by Ayoob Almotairi, Samer Atawneh, Osama A. Khashan, Nour M. Khafajah

    Published 2024-12-01
    “…Internet of Things (IoT) technology has evolved significantly, transitioning from personal devices to powering smart cities and global deployments across diverse industries. However, security challenges arise due to diverse devices using various protocols and having limited computational capabilities, leading to vulnerabilities and potential intrusions in IoT networks. …”
    Get full text
    Article
  3. 123
  4. 124

    IMpc-PyrYOLO: Hybrid YOLO Based Feature Pyramidal Network for Pest Detection in Rice Leaves by Ramesh Shunmugam, Sumendra Yogarayan, Siti Fatimah Abdul Razak, Md. Shohel Sayeed

    Published 2025-06-01
    “…The model integrates an efficient channel attention (ECA) mechanism with the feature pyramidal network (FPN) in the YOLO network to improve multi-scale feature extraction and pest classification accuracy. …”
    Get full text
    Article
  5. 125

    Encrypted Image Retrieval System based on Features Analysis by Methaq Talib GAATA, Fadya Fouad Hantoosh

    Published 2018-07-01
    “…However, since communication between digital products takes place in a public network, the necessity of security for digital images becomes vital. …”
    Get full text
    Article
  6. 126
  7. 127
  8. 128
  9. 129

    Enhancing IoT device security: CNN-SVM hybrid approach for real-time detection of DoS and DDoS attacks by Al-Na’amneh Qais, Aljaidi Mohammad, Nasayreh Ahmad, Gharaibeh Hasan, Al Mamlook Rabia Emhamed, Jaradat Ameera S., Alsarhan Ayoub, Samara Ghassan

    Published 2024-11-01
    “…Therefore, developing a secure IoT system is vital, shielding against attackers leveraging IoT devices to obtain network access and maintaining data security during transmission between these devices. …”
    Get full text
    Article
  10. 130
  11. 131
  12. 132
  13. 133

    An adaptive hybrid framework for IIoT intrusion detection using neural networks and feature optimization using genetic algorithms by Mohammad Zubair Khan, Aijaz Ahmad Reshi, Shabana Shafi, Ibrahim Aljubayri

    Published 2025-05-01
    “…Abstract In Industrial Internet of Things (IIoT) networks, securing device connectivity through effective intrusion detection systems is essential for maintaining operational integrity. …”
    Get full text
    Article
  14. 134
  15. 135

    A topology-guided high-quality solution learning framework for security-constraint unit commitment based on graph convolutional network by Liqian Gao, Lishen Wei, Shichang Cui, Jiakun Fang, Xiaomeng Ai, Wei Yao, Jinyu Wen

    Published 2025-03-01
    “…In this sense, this paper proposes a topology-guided high-quality solution learning framework based on graph convolutional network (GCN) and neighborhood search (NS). Firstly, a GCN-based method is presented to learn the potential patterns between commitments and graph data associated with bus feature and power grid topology. …”
    Get full text
    Article
  16. 136
  17. 137

    Cross-stream attention enhanced central difference convolutional network for CG image detection by HUANG Jinkun, HUANG Yuanhang, HUANG Wenmin, LUO Weiqi

    Published 2024-12-01
    “…With the maturation of computer graphics (CG) technology in the field of image generation, the realism of created images has been improved significantly. …”
    Get full text
    Article
  18. 138
  19. 139

    A low cost compact network TAP device with Raspberry Pi 4 by Murat Varol, Murat İskefiyeli

    Published 2025-10-01
    “…With this feature Network TAP devices play a main role in network security, network visibility, network monitoring, forensics, etc. …”
    Get full text
    Article
  20. 140