Showing 261 - 280 results of 836 for search 'computer network security features.', query time: 0.13s Refine Results
  1. 261
  2. 262

    A survey on secure communication technologies for smart grid cyber physical system by Giriraj Sharma

    Published 2024-12-01
    “…A CPS combines physical components, computational elements, and communication networks. The smart grid CPS (SG-CPS) is an example of such a system, featuring physical devices with diverse communication needs and intermediary networks. …”
    Get full text
    Article
  3. 263

    A lightweight framework to secure IoT devices with limited resources in cloud environments by Vivek Kumar Pandey, Dinesh Sahu, Shiv Prakash, Rajkumar Singh Rathore, Pratibha Dixit, Iryna Hunko

    Published 2025-07-01
    “…Finally, the model also makes use of a novel leaf-cut feature optimization strategy and tight adaptive cloud edge intelligence to achieve high accuracy while minimizing memory and computation demand. …”
    Get full text
    Article
  4. 264
  5. 265

    Machine learning based intrusion detection framework for detecting security attacks in internet of things by V. Kantharaju, H. Suresh, M. Niranjanamurthy, Syed Immamul Ansarullah, Farhan Amin, Amerah Alabrah

    Published 2024-12-01
    “…Thus, to solve this issue, herein, we propose an advance Intrusion detection framework using Self-Attention Progressive Generative Adversarial Network (SAPGAN) framework for detecting security threats in IoT networks. …”
    Get full text
    Article
  6. 266

    Design of an iterative method for disease prediction in finger millet leaves using graph networks, dyna networks, autoencoders, and recurrent neural networks by Shailendra Tiwari, Anita Gehlot, Rajesh Singh, Bhekisipho Twala, Neeraj Priyadarshi

    Published 2024-12-01
    “…This work proposes a comprehensive framework for detection and prediction of the disease in Finger Millet leaves using a combination of Graph Networks, Dyna Networks, Autoencoders, and Recurrent Neural Networks. …”
    Get full text
    Article
  7. 267

    Securing IoT-Cloud Applications with AQ-KGMO-DMG Enhanced SVM for Intrusion Detection by Konduru Siva Naga Narasimharao, P. V. Lakshmi

    Published 2025-02-01
    “…Intrusion detection, as a cornerstone of information security, plays a pivotal role in fortifying networks against potential threats, emphasizing the necessity for robust and reliable methods capable of discerning and mitigating network vulnerabilities effectively. …”
    Get full text
    Article
  8. 268
  9. 269

    Deep Complex Gated Recurrent Networks-Based IoT Network Intrusion Detection Systems by Engy El-Shafeiy, Walaa M. Elsayed, Haitham Elwahsh, Maazen Alsabaan, Mohamed I. Ibrahem, Gamal Farouk Elhady

    Published 2024-09-01
    “…Convolutional neural networks (CNN) are used for spatial feature extraction and superfluous data are filtered to improve computing efficiency. …”
    Get full text
    Article
  10. 270
  11. 271

    Improvement of the Regulatory Framework of Information Security for Terminal Access Devices of the State Information System by V. A. Sizov, D. M. Malinichev, V. V. Mochalov

    Published 2020-04-01
    “…Such diversity and heterogeneity of state information systems, on the one hand, and the need for high-quality state regulation in the field of information security in these systems, on the other hand, require the study and development of legal acts that take into account primarily the features of systems that have a typical modern architecture of “thin customer". …”
    Get full text
    Article
  12. 272
  13. 273

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  14. 274
  15. 275

    A secure and efficient deep learning-based intrusion detection framework for the internet of vehicles by Hasim Khan, Ghanshyam G. Tejani, Rayed AlGhamdi, Sultan Alasmari, Naveen Kumar Sharma, Sunil Kumar Sharma

    Published 2025-04-01
    “…Vision Transformer (ViT), wavelet transforms, and GAT ensure effective feature extraction, and a novel hybrid optimization known as Crayfish-Mother secure Optimization (CMSO) method is proposed to optimize feature selection to its maximum and reduce computational cost. …”
    Get full text
    Article
  16. 276

    Edge computing privacy protection method based on blockchain and federated learning by Chen FANG, Yuanbo GUO, Yifeng WANG, Yongjin HU, Jiali MA, Han ZHANG, Yangyang HU

    Published 2021-11-01
    “…Aiming at the needs of edge computing for data privacy, the correctness of calculation results and the auditability of data processing, a privacy protection method for edge computing based on blockchain and federated learning was proposed, which can realize collaborative training with multiple devices at the edge of the network without a trusted environment and special hardware facilities.The blockchain was used to endow the edge computing with features such as tamper-proof and resistance to single-point-of-failure attacks, and the gradient verification and incentive mechanism were incorporated into the consensus protocol to encourage more local devices to honestly contribute computing power and data to the federated learning.For the potential privacy leakage problems caused by sharing model parameters, an adaptive differential privacy mechanism was designed to protect parameter privacy while reducing the impact of noise on the model accuracy, and moments accountant was used to accurately track the privacy loss during the training process.Experimental results show that the proposed method can resist 30% of poisoning attacks, and can achieve privacy protection with high model accuracy, and is suitable for edge computing scenarios that require high level of security and accuracy.…”
    Get full text
    Article
  17. 277

    Security-Enhanced Lightweight Authentication Key-Agreement Protocol for Unmanned Aerial Vehicle Communication by Zhoucan He, Yilong Zheng, Sisi Chen, Zhongze Du, Shuyuan Liu, Kailong Zhang

    Published 2025-04-01
    “…Unmanned aerial vehicles have been widely employed in recent years owing to their remarkable features such as low environmental requirements and high survivability, and a new tendency towards networking, intelligence, and collaboration has emerged. …”
    Get full text
    Article
  18. 278
  19. 279
  20. 280