-
141
Embedding Trust in the Media Access Control Protocol for Wireless Networks
Published 2025-01-01Get full text
Article -
142
SA3C-ID: a novel network intrusion detection model using feature selection and adversarial training
Published 2025-07-01“…Network intrusion detection systems, as a fundamental part of network security, have become increasingly significant. …”
Get full text
Article -
143
-
144
Cross-Architecture Vulnerability Detection Combining Semantic and Attribute Feature
Published 2025-03-01Get full text
Article -
145
A Hybrid Deep Learning Framework for Deepfake Detection Using Temporal and Spatial Features
Published 2025-01-01“…A Feature Pyramid Network (FPN) facilitates the fusion of scale features capturing intricate details as well, as broader context. …”
Get full text
Article -
146
LLM-Based Cyberattack Detection Using Network Flow Statistics
Published 2025-06-01Get full text
Article -
147
Explainable AI for zero-day attack detection in IoT networks using attention fusion model
Published 2025-07-01Get full text
Article -
148
-
149
FFT-RDNet: A Time–Frequency-Domain-Based Intrusion Detection Model for IoT Security
Published 2025-07-01“…This network effectively captures complex periodic attack patterns with minimal computational overhead. …”
Get full text
Article -
150
-
151
Wireless Security Threats
Published 2013-12-01“…These entire devices store large amount of data and their wireless connection to network spectrum exhibit them as important source of computing. …”
Get full text
Article -
152
-
153
Hybrid Big Bang-Big crunch with cuckoo search for feature selection in credit card fraud detection
Published 2025-07-01Get full text
Article -
154
On‐Chip Metamaterial‐Enhanced Mid‐Infrared Photodetectors with Built‐In Encryption Features
Published 2025-03-01Get full text
Article -
155
A Risk Assessment Analysis to Enhance the Security of OT WAN with SD-WAN
Published 2024-10-01Get full text
Article -
156
Smart framework for industrial IoT and cloud computing network intrusion detection using a ConvLSTM-based deep learning model
Published 2025-08-01“…In the rapidly evolving landscape of the Industrial Internet of Things (IIoT) and cloud computing, ensuring robust network security has become a major challenge for the Internet of Everything (IoE). …”
Get full text
Article -
157
Spatial attention-guided pre-trained networks for accurate identification of crop diseases
Published 2025-07-01Get full text
Article -
158
A Cross-Mamba Interaction Network for UAV-to-Satallite Geolocalization
Published 2025-06-01Get full text
Article -
159
Optimizing Intrusion Detection in IoMT Networks Through Interpretable and Cost-Aware Machine Learning
Published 2025-05-01Get full text
Article -
160
A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing
Published 2020-02-01“…The proposal provides the verifiability of ciphertext that ensures the user to check the correctness efficiently. (2) The size of the ciphertext is constant that is not increased with the complexity of attribute and access structure. (3) For Internet of Things devices, it introduces the fog computing into our protocol for the purpose of low latency and relation interactions, which has virtually saved the bandwidth. (4) With the help of blockchain technique, we encapsulate the hash value of public parameter, original and transformed ciphertext and transformed key into a block, so that the tamper-resistance is facilitated against an adversary from inside and outside the system. (5) In the standard model, we prove that it is selectively chosen-plaintext attack-secure and verifiable provided that the computational bilinear Diffie–Hellman assumption holds. (6) It implements this protocol and shows the result of performance measurement, which indicates a significant reduction on communication and computation costs burden on every entity in wireless body area network.…”
Get full text
Article