-
221
FD-IDS: Federated Learning with Knowledge Distillation for Intrusion Detection in Non-IID IoT Environments
Published 2025-07-01Get full text
Article -
222
Smart Grid Security: Proactive Prediction of Advanced Persistent Threats
Published 2025-05-01Get full text
Article -
223
A speech-based convolutional neural network for human body posture classification
Published 2024-10-01Get full text
Article -
224
Legal aspects of functional security standardisation of the Internet of Things
Published 2023-09-01“…The single phenomenon of IoT security has been identified as a complex concept that includes functional security and information security with their interconnection, contradictions, challenges and risks. …”
Get full text
Article -
225
Research on Lightweight Model of Multi-person Pose Estimation Based on Improved YOLOv8s-Pose
Published 2025-03-01Get full text
Article -
226
-
227
-
228
Efficient Malware Classification using Transfer Learning and Stacked Ensemble Techniques
Published 2025-08-01Get full text
Article -
229
Machine Learning Techniques for Enhanced Intrusion Detection in IoT Security
Published 2025-01-01Get full text
Article -
230
A Novel Framework for Quantum-Enhanced Federated Learning with Edge Computing for Advanced Pain Assessment Using ECG Signals via Continuous Wavelet Transform Images
Published 2025-02-01“…The cornerstone of our system is a Quantum Convolutional Hybrid Neural Network (QCHNN) that harnesses quantum entanglement properties to enhance feature detection and classification robustness. …”
Get full text
Article -
231
Biometric cryptosystem to secure smart object communications in the internet of things
Published 2022-03-01“…Like any electronic application, the security aspect is one of the most difficult challenges in the creation and design of such networks. …”
Get full text
Article -
232
Considerations of Cloud Computing Contracts at the Conclusion Stage
Published 2025-03-01“…As a result, cloud computing is a model for providing services in information technology, which allows storing and processing information in It provides internet platform or private networks. …”
Get full text
Article -
233
-
234
X-FuseRLSTM: A Cross-Domain Explainable Intrusion Detection Framework in IoT Using the Attention-Guided Dual-Path Feature Fusion and Residual LSTM
Published 2025-06-01“…The suggested method is appropriate for practical IoT security applications since it provides strong domain generalization and explainability while preserving computational efficiency.…”
Get full text
Article -
235
Securing the CAN bus using deep learning for intrusion detection in vehicles
Published 2025-04-01Get full text
Article -
236
A Dual-Strategy Framework for Cyber Threat Detection in Imbalanced, High-Dimensional Data Across Heterogeneous Networks
Published 2025-01-01“…As cyber threats grow in complexity, ensuring robust network security has become increasingly critical. …”
Get full text
Article -
237
A Review of IEEE 802.15.6 MAC, PHY, and Security Specifications
Published 2013-04-01Get full text
Article -
238
UNIFIED MULTIMODAL BIOMETRICS FUSION USING DEEP LEARNING FOR SECURING IOT
Published 2024-12-01“…Our proposed approach employs “Convolutional Neural Network (CNN)” architectures, notable for their efficacy in computer vision tasks, to extract potent discriminative features from the input images. …”
Get full text
Article -
239
Ultra Wideband radar-based gait analysis for gender classification using artificial intelligence
Published 2025-09-01“…Gender classification plays a vital role in various applications, particularly in security and healthcare. While several biometric methods such as facial recognition, voice analysis, activity monitoring, and gait recognition are commonly used, their accuracy and reliability often suffer due to challenges like body part occlusion, high computational costs, and recognition errors. …”
Get full text
Article -
240