-
521
Regional experience in organizing the protection of minors from a destructive information environment (by the example of non-central regions)
Published 2023-03-01“…Achievements in the field of new technologies, on which the formation of the modern information society is based, have led to the rapid development of the global computer network Internet. The Internet as a means of social communication has both a positive impact on the world community and has negative consequences. …”
Get full text
Article -
522
Lightweight authentication for IoT devices (LAID) in sustainable smart cities
Published 2025-07-01“…Due to constrained nature of IoT, ensuring security in IoT enabled network is a challenge. However, growing urban population and exponential rise in IoT enabled devices make it challenging to implement and ensure security mechanisms. …”
Get full text
Article -
523
EVMCSDLT: Electric vehicle mobile charging system using distributed ledger technology
Published 2025-12-01Get full text
Article -
524
A multi-class hybrid variational autoencoder and vision transformer model for enhanced plant disease identification
Published 2025-06-01“…It enhances agricultural productivity and supports food security efforts.…”
Get full text
Article -
525
A Hybrid Deep Learning Model for Network Intrusion Detection System Using Seq2Seq and ConvLSTM-Subnets
Published 2025-01-01Get full text
Article -
526
Distributed denial-of-service (DDoS) on the smart grids based on VGG19 deep neural network and Harris Hawks optimization algorithm
Published 2025-05-01“…The suggested approach uses the robust feature extraction capability of VGG19-DNN for network traffic pattern analysis to detect abnormal traffic flows indicative of DDoS attacks. …”
Get full text
Article -
527
-
528
Face morphing detection in the presence of printing/scanning and heterogeneous image sources
Published 2021-05-01Get full text
Article -
529
Reflective Distributed Denial of Service Detection: A Novel Model Utilizing Binary Particle Swarm Optimization—Simulated Annealing for Feature Selection and Gray Wolf Optimization-...
Published 2024-09-01“…The fast growth of the Internet has made network security problems more noticeable, so intrusion detection systems (IDSs) have become a crucial tool for maintaining network security. …”
Get full text
Article -
530
-
531
-
532
-
533
-
534
Copula entropy regularization transformer with C2 variational autoencoder and fine-tuned hybrid DL model for network intrusion detection
Published 2025-03-01“…In cyber security, Intrusion Detection Systems (IDS) act as a network security tool, in which computational complexity and dynamic IDS detection issues are observed by conventional studies. …”
Get full text
Article -
535
-
536
-
537
Deep learning with leagues championship algorithm based intrusion detection on cybersecurity driven industrial IoT systems
Published 2025-08-01“…However, owing to the constraints of limited resources and computation abilities, IoT networks are subject to different cyber-attacks. …”
Get full text
Article -
538
Development of Various Stacking Ensemble-Based HIDS Using ADFA Datasets
Published 2025-01-01“…The rapid increase in the number of cyber attacks and the emergence of various attack variations pose significant threats to the security of computer systems and networks. Various intrusion detection systems (IDS) are developed to defend computer systems and networks in response to these threats. …”
Get full text
Article -
539
Research Progress of Dangerous Driving Behavior Recognition Methods Based on Deep Learning
Published 2025-01-01Get full text
Article -
540
Graph Neural Network Classification in EEG-Based Biometric Identification: Evaluation of Functional Connectivity Methods Using Time-Frequency Metric
Published 2025-01-01“…Despite reduced setup complexity, our GCNN achieves over 98% identification accuracy, comparable to CNN-based studies using 64 channels, with significantly lower computational cost and trainable variables reduced to less than 0.25 of those in a Convolutional Neural Network (CNN). …”
Get full text
Article