Showing 521 - 540 results of 836 for search 'computer network security features.', query time: 0.15s Refine Results
  1. 521

    Regional experience in organizing the protection of minors from a destructive information environment (by the example of non-central regions) by S. E. Titor

    Published 2023-03-01
    “…Achievements in the field of new technologies, on which the formation of the modern information society is based, have led to the rapid development of the global computer network Internet. The Internet as a means of social communication has both a positive impact on the world community and has negative consequences. …”
    Get full text
    Article
  2. 522

    Lightweight authentication for IoT devices (LAID) in sustainable smart cities by Aqeel Khalique, Farheen Siddiqui, Mohd Abdul Ahad, Imran Hussain

    Published 2025-07-01
    “…Due to constrained nature of IoT, ensuring security in IoT enabled network is a challenge. However, growing urban population and exponential rise in IoT enabled devices make it challenging to implement and ensure security mechanisms. …”
    Get full text
    Article
  3. 523
  4. 524
  5. 525
  6. 526

    Distributed denial-of-service (DDoS) on the smart grids based on VGG19 deep neural network and Harris Hawks optimization algorithm by Abdurahim Alhashmi, H. Idwaib, Selçuk Alparslan Avci, Javad Rahebi, Raheleh Ghadami

    Published 2025-05-01
    “…The suggested approach uses the robust feature extraction capability of VGG19-DNN for network traffic pattern analysis to detect abnormal traffic flows indicative of DDoS attacks. …”
    Get full text
    Article
  7. 527
  8. 528
  9. 529

    Reflective Distributed Denial of Service Detection: A Novel Model Utilizing Binary Particle Swarm Optimization—Simulated Annealing for Feature Selection and Gray Wolf Optimization-... by Daoqi Han, Honghui Li, Xueliang Fu

    Published 2024-09-01
    “…The fast growth of the Internet has made network security problems more noticeable, so intrusion detection systems (IDSs) have become a crucial tool for maintaining network security. …”
    Get full text
    Article
  10. 530
  11. 531
  12. 532
  13. 533
  14. 534

    Copula entropy regularization transformer with C2 variational autoencoder and fine-tuned hybrid DL model for network intrusion detection by Srinivas Akkepalli, Sagar K

    Published 2025-03-01
    “…In cyber security, Intrusion Detection Systems (IDS) act as a network security tool, in which computational complexity and dynamic IDS detection issues are observed by conventional studies. …”
    Get full text
    Article
  15. 535
  16. 536
  17. 537

    Deep learning with leagues championship algorithm based intrusion detection on cybersecurity driven industrial IoT systems by Saud S. Alotaibi, Turki Ali Alghamdi

    Published 2025-08-01
    “…However, owing to the constraints of limited resources and computation abilities, IoT networks are subject to different cyber-attacks. …”
    Get full text
    Article
  18. 538

    Development of Various Stacking Ensemble-Based HIDS Using ADFA Datasets by Hami Satilmis, Sedat Akleylek, Zaliha Yuce Tok

    Published 2025-01-01
    “…The rapid increase in the number of cyber attacks and the emergence of various attack variations pose significant threats to the security of computer systems and networks. Various intrusion detection systems (IDS) are developed to defend computer systems and networks in response to these threats. …”
    Get full text
    Article
  19. 539
  20. 540

    Graph Neural Network Classification in EEG-Based Biometric Identification: Evaluation of Functional Connectivity Methods Using Time-Frequency Metric by Roghaieh Ashenaei, Ali Asghar Beheshti Shirazi

    Published 2025-01-01
    “…Despite reduced setup complexity, our GCNN achieves over 98% identification accuracy, comparable to CNN-based studies using 64 channels, with significantly lower computational cost and trainable variables reduced to less than 0.25 of those in a Convolutional Neural Network (CNN). …”
    Get full text
    Article