Search alternatives:
networks » network (Expand Search)
Showing 141 - 160 results of 836 for search 'Computer networks Security features.', query time: 0.14s Refine Results
  1. 141
  2. 142

    SA3C-ID: a novel network intrusion detection model using feature selection and adversarial training by Wanwei Huang, Haobin Tian, Lei Wang, Sunan Wang, Kun Wang, Songze Li

    Published 2025-07-01
    “…Network intrusion detection systems, as a fundamental part of network security, have become increasingly significant. …”
    Get full text
    Article
  3. 143
  4. 144
  5. 145

    A Hybrid Deep Learning Framework for Deepfake Detection Using Temporal and Spatial Features by Fazeel Zafar, Talha Ahmed Khan, Salas Akbar, Muhammad Talha Ubaid, Sameena Javaid, Kushsairy Abdul Kadir

    Published 2025-01-01
    “…A Feature Pyramid Network (FPN) facilitates the fusion of scale features capturing intricate details as well, as broader context. …”
    Get full text
    Article
  6. 146
  7. 147
  8. 148
  9. 149

    FFT-RDNet: A Time–Frequency-Domain-Based Intrusion Detection Model for IoT Security by Bingjie Xiang, Renguang Zheng, Kunsan Zhang, Chaopeng Li, Jiachun Zheng

    Published 2025-07-01
    “…This network effectively captures complex periodic attack patterns with minimal computational overhead. …”
    Get full text
    Article
  10. 150
  11. 151

    Wireless Security Threats by Umair Jilani, Muhammad Umar Khan, Adnan Afroz, Khawaja Masood Ahmed

    Published 2013-12-01
    “…These entire devices store large amount of data and their wireless connection to network spectrum exhibit them as important source of computing. …”
    Get full text
    Article
  12. 152
  13. 153
  14. 154
  15. 155
  16. 156

    Smart framework for industrial IoT and cloud computing network intrusion detection using a ConvLSTM-based deep learning model by Ala' Abdulmajid Eshmawi, Asma Aldrees, Raed Alharthi

    Published 2025-08-01
    “…In the rapidly evolving landscape of the Industrial Internet of Things (IIoT) and cloud computing, ensuring robust network security has become a major challenge for the Internet of Everything (IoE). …”
    Get full text
    Article
  17. 157
  18. 158
  19. 159
  20. 160

    A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing by Rui Guo, Chaoyuan Zhuang, Huixian Shi, Yinghui Zhang, Dong Zheng

    Published 2020-02-01
    “…The proposal provides the verifiability of ciphertext that ensures the user to check the correctness efficiently. (2) The size of the ciphertext is constant that is not increased with the complexity of attribute and access structure. (3) For Internet of Things devices, it introduces the fog computing into our protocol for the purpose of low latency and relation interactions, which has virtually saved the bandwidth. (4) With the help of blockchain technique, we encapsulate the hash value of public parameter, original and transformed ciphertext and transformed key into a block, so that the tamper-resistance is facilitated against an adversary from inside and outside the system. (5) In the standard model, we prove that it is selectively chosen-plaintext attack-secure and verifiable provided that the computational bilinear Diffie–Hellman assumption holds. (6) It implements this protocol and shows the result of performance measurement, which indicates a significant reduction on communication and computation costs burden on every entity in wireless body area network.…”
    Get full text
    Article