Showing 401 - 420 results of 836 for search 'computer network security features.', query time: 0.13s Refine Results
  1. 401

    Explainability of Network Intrusion Detection Using Transformers: A Packet-Level Approach by Pahavalan Rajkumardheivanayahi, Ryan Berry, Nicholas U. Costagliola, Lance Fiondella, Nathaniel D. Bastian, Gokhan Kul

    Published 2025-01-01
    “…Network Intrusion Detection Systems (NIDS) are critical in ensuring the security of connected computer systems by actively detecting and preventing unauthorized activities and malicious attacks. …”
    Get full text
    Article
  2. 402
  3. 403
  4. 404

    Smart Grid Intrusion Detection for IEC 60870-5-104 With Feature Optimization, Privacy Protection, and Honeypot-Firewall Integration by Pedamallu Sai Mrudula, Rayappa David Amar Raj, Archana Pallakonda, Yanamala Rama Muni Reddy, K. Krishna Prakasha, V. Anandkumar

    Published 2025-01-01
    “…The experimental results demonstrate the framework’s operational capability and effectiveness for SCADA network security, achieving 99.29% accuracy, 94.8% recall and 4.1% false positive rates.…”
    Get full text
    Article
  5. 405
  6. 406
  7. 407
  8. 408

    A novel reconstruction-based video anomaly detection with idempotent generative network by Wenmin Dong, Lifeng Zhang, Wenjuan Shi, Xiangwei Zheng, Yuang Zhang

    Published 2025-06-01
    “…Finite Scalar Quantization (FSQ) layer is designed to discretize the encoder’s output, preserving key discriminative features. Meanwhile, the Pyramid Deformation Module (PDM), as an integral part of PSVAE, computes offset maps of original video frames for anomaly detection supplementation. …”
    Get full text
    Article
  9. 409
  10. 410
  11. 411
  12. 412
  13. 413

    Detecting eavesdropping nodes in the power Internet of Things based on Kolmogorov-Arnold networks. by Rong Wang, Weibin Jiang, Yanjin Shen, Qiqing Yue, Kan-Lin Hsiung

    Published 2025-01-01
    “…The rapid proliferation of the Power Internet of Things (PIoT) has given rise to severe network security threats, with eavesdropping attacks emerging as a paramount concern. …”
    Get full text
    Article
  14. 414
  15. 415

    Adaptive resource optimization mechanism for blockchain sharding in digital twin edge network by Li JIANG, Shengli XIE, Hui TIAN

    Published 2023-03-01
    “…To address the security and privacy issues for data sharing in digital twin edge networks, a new distributed and secure data sharing mechanism was developed by leveraging blockchain sharding.Considering dynamic and time varying features in digital twin edge networks and mapping errors of physic networks, an adaptive resource allocation model was formulated which jointly optimized cluster head selection, local base station (BS) consensus access selection, spectrum and computation consensus resources allocation, in order to maximize transactional throughput for the blockchain sharding.Moreover, a digital twin edge networks empowered two-layered proximal policy optimization (PPO) algorithm was designed to obtain the optimal solutions.Numerical results illustrate that the proposed algorithm can effectively improve the transactional throughput for the blockchain sharding.Meanwhile, it can well adapt to the mapping errors.…”
    Get full text
    Article
  16. 416
  17. 417

    Group Authentication Key Agreement Protocol Based on Certificateless Cryptography in UAV Network by Yuecheng WANG, Youwen ZHU, Zhiqiang ZHANG

    Published 2025-01-01
    “…If directly applied to multi-party interaction scenarios, traditional two-party key negotiation protocols require numerous interaction rounds, resulting in significant computational and communication overhead. Therefore, group key agreement protocols for UAV networks must provide a lighter computing process and stronger security guarantees.Methods This protocol adopts a certificateless key system. …”
    Get full text
    Article
  18. 418
  19. 419

    AUTOMATED ANALYSIS OF BREAKERS by E. M. Farhadzade, A. Z. Muradaliev, T. K. Rafieva, S. A. Abdullaeva

    Published 2014-12-01
    “…The main features of AISV are:· to provide the security and data base accuracy;· to carry out systematic control of breakers conformity with operating conditions;· to make the estimation of individual  reliability’s value and characteristics of its changing for given combination of characteristics variety;· to provide personnel, who is responsible for technical maintenance of breakers, not only with information but also with methodological support, including recommendations for the given problem solving  and advanced methods for its realization.…”
    Get full text
    Article
  20. 420