Showing 241 - 260 results of 836 for search 'computer network security features.', query time: 0.10s Refine Results
  1. 241

    Regional Short‐Term Wind Power Prediction Based on CEEMDAN‐FTC Feature Mapping and EC‐TCN‐BiLSTM Deep Learning by Guoyuan Qin, Xiaosheng Peng, Zimin Yang

    Published 2025-06-01
    “…Third, by combining the strengths of TCN and BiLSTM neural networks, the temporal and spatial correlations of input features can be captured effectively. …”
    Get full text
    Article
  2. 242
  3. 243
  4. 244

    Security monitoring via sound analysis and voice identification with artificial intelligence by Balabanova Ivelina, Sidorova Kristina, Georgiev Georgi

    Published 2024-08-01
    “…Successful correct recognition of the test voice profiles on access and security personalization with a quantitative equivalent of 100.0 % accuracy was achieved in the Linear transfer function for Cascade-Forward Neural Networks. …”
    Get full text
    Article
  5. 245

    HCAP: Hybrid cyber attack prediction model for securing healthcare applications. by Mohanad Faeq Ali, Mohammed Shakir Mohmood, Ban Salman Shukur, Rex Bacarra, Jamil Abedalrahim Jamil Alsayaydeh, Masrullizam Mat Ibrahim, Safarudin Gazali Herawan

    Published 2025-01-01
    “…The extracted features are fed into the lion-optimization technique to fine-tune the hyperparameters of the recurrent neural networks, enhancing the model's ability to efficiently predict cybersecurity threats with a maximum recognition rate in IoMT environments. …”
    Get full text
    Article
  6. 246
  7. 247

    A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data by Abdulrahman Hussian, Foud Murshed, Mohammed Nasser Alandoli, Ghalib Aljafari

    Published 2025-05-01
    “…Addressing these limitations is crucial for ensuring reliable biometric security in real-world applications, including law enforcement, financial transactions, and border security. …”
    Get full text
    Article
  8. 248

    DynBlock: dynamic data encryption with Toffoli gate for IoT by Mubasher Haq, Ijaz Ali Shoukat, Alamgir Naushad, Mohsin Raza Jafri, Moid Sandhu, Abd Ullah Khan, Hyundong Shin

    Published 2025-05-01
    “…We evaluate DynBlock with both 3 and 5 rounds to assess its security and computational efficiency. While the 5-round configuration offers stronger resistance to cryptanalytic attacks, the 3-round setup already delivers robust security, featuring high entropy and a strong avalanche effect, making it well-suited for resource-constrained environments. …”
    Get full text
    Article
  9. 249
  10. 250

    Overview of detection techniques for malicious social bots by Rong LIU, Bo CHEN, Ling YU, Ya-shang LIU, Si-yuan CHEN

    Published 2017-11-01
    “…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
    Get full text
    Article
  11. 251

    Overview of detection techniques for malicious social bots by Rong LIU, Bo CHEN, Ling YU, Ya-shang LIU, Si-yuan CHEN

    Published 2017-11-01
    “…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
    Get full text
    Article
  12. 252
  13. 253
  14. 254
  15. 255
  16. 256
  17. 257
  18. 258
  19. 259
  20. 260