Showing 701 - 720 results of 836 for search 'computer network security features.', query time: 0.12s Refine Results
  1. 701
  2. 702
  3. 703
  4. 704

    User authentication of industrial internet based on HHT transform of mouse behavior by Yigong ZHANG, Qian YI, Jian LI, Congbo LI, Aijun YIN, Shuping YI

    Published 2022-06-01
    “…The rapid development of the industrial internet had caused widespread concern about the network security, and the end-user authentication technology was considered a research hotspot.According to the characteristics of human-computer interaction in industrial internet, an experimental website was designed.24 users' mouse behavior data in an uncontrolled environment were collected within 2.5 years to conduct case studies.Hilbert-Huang transform (HHT) was used to extract frequency domain features of mouse behavior signals, combined with time domain features to form a time-frequency joint domain feature matrix of 163-dimensional to characterize user mouse behavior patterns.Bagged tree, support vector machine (SVM), Boost tree and K-nearest neighbor (KNN) were used to build a user authentication model, and the comparison result showed that the Bagged tree had the best internal detection effect in this case, with an average false acceptance rate (FAR) of 0.12% and an average false rejection rate (FRR) of 0.28%.In external detection, the FAR was 1.47%.Compared with the traditional mouse dynamics method, the frequency domain information of mouse behavior extracted by HHT can better realize the user authentication, and provide technical support the security of the industrial internet.…”
    Get full text
    Article
  5. 705
  6. 706

    A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis by Salman Muneer, Umer Farooq, Atifa Athar, Muhammad Ahsan Raza, Taher M. Ghazal, Shadman Sakib

    Published 2024-01-01
    “…Intrusion detection (ID) is critical in securing computer networks against various malicious attacks. …”
    Get full text
    Article
  7. 707

    Continuous Gesture Sequences Recognition Based on Few-Shot Learning by Zhe Liu, Cao Pan, Hongyuan Wang

    Published 2022-01-01
    “…The scheme uses Mediapipe to detect the key points of each frame in the video stream, decomposes the basic components of gesture features based on certain human palm structure, and then extracts and combines the above basic gesture features by a lightweight autoencoder network. …”
    Get full text
    Article
  8. 708

    UNION: A Trust Model Distinguishing Intentional and Unintentional Misbehavior in Inter-UAV Communication by Ezedin Barka, Chaker Abdelaziz Kerrache, Nasreddine Lagraa, Abderrahmane Lakas, Carlos T. Calafate, Juan-Carlos Cano

    Published 2018-01-01
    “…Hence, the communications interface used and that computation complexity are additional factors to consider when designing secure protocols for these networks. …”
    Get full text
    Article
  9. 709
  10. 710
  11. 711
  12. 712
  13. 713

    Ensemble Voting for Enhanced Robustness in DarkNet Traffic Detection by Varun Shinde, Kartik Singhal, Ahmad Almogren, Vineet Dhanawat, Vishal Karande, Ateeq Ur Rehman

    Published 2024-01-01
    “…The increasing prevalence of DarkNet traffic poses significant challenges for network security. Despite improvements in machine learning techniques, most of the existing studies have not applied appropriate ensemble voting models on newer datasets like CIC-Darknet 2020. …”
    Get full text
    Article
  14. 714
  15. 715
  16. 716
  17. 717
  18. 718
  19. 719
  20. 720