Showing 1 - 20 results of 836 for search 'computer (networks OR network) security features.', query time: 0.17s Refine Results
  1. 1

    An optimization model of computer network security based on GABP neural network algorithm by Jiangang Wang, Xiaoyan Wang

    Published 2025-04-01
    “…Abstract Background Digital connectivity drives global innovation, ensuring computer network security is more critical than ever. …”
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5

    Analysis of features of implementing a “Port scanning” attack using a “Zombie” computer by N. V. Boldyrikhin, M. V. Karpenko, I. A. Sosnovsky, E. A. Yadrets

    Published 2024-07-01
    “…The method is based on computer simulation of a “port scanning” attack using a virtual infrastructure of the network.Result. …”
    Get full text
    Article
  6. 6

    Towards edge-collaborative,lightweight and secure region proposal network by Jinbo XIONG, Renwan BI, Qianxin CHEN, Ximeng LIU

    Published 2020-10-01
    “…Aiming at the problem of image privacy leakage and computing efficiency in edge environment,a lightweight and secure region proposal network (SecRPN) was proposed.A series of secure computing protocols were designed based on the additive secret sharing scheme.Two non-collusive edge servers cooperate to perform calculation modules such as secure feature processing,secure anchor transformation,secure bounding-box correction,and secure non-maximum suppression.Theoretical analysis guarantees the correctness and security of SecRPN.The actual performance evaluation shows that SecRPN is outstanding in the computational cost and communication overhead compared with the existing works.…”
    Get full text
    Article
  7. 7
  8. 8

    A Lightweight Intrusion Detection System with Dynamic Feature Fusion Federated Learning for Vehicular Network Security by Junjun Li, Yanyan Ma, Jiahui Bai, Congming Chen, Tingting Xu, Chi Ding

    Published 2025-07-01
    “…The rapid integration of complex sensors and electronic control units (ECUs) in autonomous vehicles significantly increases cybersecurity risks in vehicular networks. Although the Controller Area Network (CAN) is efficient, it lacks inherent security mechanisms and is vulnerable to various network attacks. …”
    Get full text
    Article
  9. 9

    Intelligent intrusion detection system based on crowd search optimization for attack classification in network security by Chetan Gupta, Amit Kumar, Neelesh Kumar Jain

    Published 2025-07-01
    “…We have developed the hybrid model based on crow search optimization (CSO) and random forest (RF) algorithm for identifying threats and irregularities in a computer network. In comparison to the various state-of-the-art classifiers, the CSO method was applied to the NSL-KDD dataset and the ROSPaCe dataset for the detection of the attacks. …”
    Get full text
    Article
  10. 10

    Anomaly Detection Approach Based on Deep Neural Network and Dropout by Zaid Hussien et al.

    Published 2020-06-01
    “…Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. …”
    Get full text
    Article
  11. 11

    Hybrid Convolutional Neural Network-Based Intrusion Detection System for Secure IoT Networks by Sami Qawasmeh, Ahmad Habboush, Bassam Elzaghmouri, Qasem Kharma, Da'ad Albalawneh

    Published 2025-08-01
    “…CNN-based intrusion detection in IoT networks is stressed in the study. It shows how hybrid CNN-based techniques can improve IoT network security and resilience. …”
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Intrusion Detection-Data Security Protection Scheme Based on Particle Swarm-BP Network Algorithm in Cloud Computing Environment by Zhun Wang, Xue Chen

    Published 2023-01-01
    “…Aiming at the problems of low detection rate and high false detection rate of intrusion detection algorithms in the traditional cloud computing environment, an intrusion detection-data security protection scheme based on particle swarm-BP network algorithm in a cloud computing environment is proposed. …”
    Get full text
    Article
  15. 15

    Network Security Situational Awareness Based on Improved Particle Swarm Algorithm and Bidirectional Long Short-Term Memory Modeling by Peng Zheng, Yun Cheng, Wei Zhu, Bo Liu, Shuhong Liu, Shijie Wang, Jinyin Bai

    Published 2025-02-01
    “…This indicates a high level of recognition and precision exhibited by the proposed model in detecting network security risk behaviors. Furthermore, in contrast to the traditional CNN neural network, the proposed model is more compact, which significantly reduces the computational overhead and allows for efficient network security situational awareness.…”
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Metaheuristic Algorithms for Optimization and Feature Selection in Cloud Data Classification Using Convolutional Neural Network by Nandita Goyal, Munesh Chandra Trivedi

    Published 2023-08-01
    “…Cloud forensics plays a vital role to address the security issues related to cloud computing by identifying, collecting and studying digital evidence in cloud environment.The aim of the research paper is to explore the concept of cloud forensic by applying optimization for feature selection before classification of data on cloud side. …”
    Get full text
    Article