Showing 541 - 560 results of 836 for search 'computer network security features.', query time: 0.14s Refine Results
  1. 541

    A depth-wise separable VGG19-capsule network for enhanced bell pepper and grape leaf disease classification with ensemble activation by Midhun P Mathew, Sudheep Elayidom, Jagathy Raj V P, Abubeker K M

    Published 2025-01-01
    “…This ensures that the capsule network effectively captures spatial information and preserves the hierarchical relationships between features. …”
    Get full text
    Article
  2. 542
  3. 543
  4. 544
  5. 545

    Two stage malware detection model in internet of vehicles (IoV) using deep learning-based explainable artificial intelligence with optimization algorithms by Manal Abdullah Alohali, Sultan Alahmari, Mohammed Aljebreen, Mashael M. Asiri, Achraf Ben Miled, Sami Saad Albouq, Othman Alrusaini, Ali Alqazzaz

    Published 2025-07-01
    “…Numerous interaction activities occur among IoV entities to share significant information, which is essential for network operation. As part of intellectual transportation, IoV is a hot topic for researchers because it faces numerous unresolved challenges, particularly regarding privacy and security. …”
    Get full text
    Article
  6. 546
  7. 547
  8. 548

    PCA and PSO based optimized support vector machine for efficient intrusion detection in internet of things by Mutkule Prasad Raghunath, Shyam Deshmukh, Poonam Chaudhari, Sunil L. Bangare, Kishori Kasat, Mohan Awasthy, Batyrkhan Omarov, Rajesh R. Waghulde

    Published 2025-02-01
    “…The Internet of Things (IoT) is a network that interconnects many everyday objects, including computers, televisions, washing machines, and even whole urban areas. …”
    Get full text
    Article
  9. 549
  10. 550
  11. 551

    A Lightweight Intrusion Detection System for Internet of Things: Clustering and Monte Carlo Cross-Entropy Approach by Abdulmohsen Almalawi

    Published 2025-04-01
    “…To address these challenges, machine learning-based intrusion detection systems (IDSs)—traditionally considered a primary line of defense—have been deployed to monitor and detect malicious activities in IoT networks. Despite this, these IDS solutions often struggle with the inherent resource constraints of IoT devices, including limited computational power and memory. …”
    Get full text
    Article
  12. 552
  13. 553

    Mitigating cloud vulnerabilities using a blockchain platform by Dina Zoughbi, Kavitha Venkatachalam

    Published 2025-04-01
    “…Hence, the advanced neural networks, coupled with cloud and edge computing, can significantly optimize CBIR systems, making them more robust, scalable, and applicable to a wide range of industries such as healthcare, security, and e-commerce.…”
    Get full text
    Article
  14. 554

    Advancing the accuracy of clathrin protein prediction through multi-source protein language models by Watshara Shoombuatong, Nalini Schaduangrat, Pakpoom Mookdarsanit, Jaru Nikom, Lawankorn Mookdarsanit

    Published 2025-07-01
    “…Finally, we employed a long short-term memory (LSTM) neural network model coupled with the optimal feature subset to identify clathrins. …”
    Get full text
    Article
  15. 555

    CPS-IIoT-P2Attention: Explainable Privacy-Preserving With Scaled Dot-Product Attention in Cyber-Physical System-Industrial IoT Network by Yakub Kayode Saheed, Joshua Ebere Chukwuere

    Published 2025-01-01
    “…These mechanisms adaptively modify their emphasis to prioritize crucial features within the CPS-IIoT network traffic data, providing additional computational resources to data segments that are likely to include abnormalities and patterns that indicate security issues. …”
    Get full text
    Article
  16. 556
  17. 557
  18. 558
  19. 559
  20. 560