Showing 761 - 780 results of 836 for search 'computer network security features.', query time: 0.09s Refine Results
  1. 761
  2. 762
  3. 763
  4. 764

    Botnet Detection Using Support Vector Machines with Artificial Fish Swarm Algorithm by Kuan-Cheng Lin, Sih-Yang Chen, Jason C. Hung

    Published 2014-01-01
    “…The number of mobile devices used globally substantially increases daily; therefore, information security concerns are increasingly vital. The botnet virus is a major threat to both personal computers and mobile devices; therefore, a method of botnet feature characterization is proposed in this study. …”
    Get full text
    Article
  5. 765
  6. 766
  7. 767

    EmotionNet-X: An Optimized CNN Architecture for Robust Facial Emotion Analysis by Syed Muhammad Aqleem Abbas, Qaisar Abbas, Syed Muhammad Naqi

    Published 2025-01-01
    “…Facial emotions are expressions of people’s inner feelings. A computer’s ability to recognize emotions is known as emotion recognition (ER), which involves extracting facial characteristics or expressions from a person’s face in order to enable the computer to communicate emotionally with them. …”
    Get full text
    Article
  8. 768

    Review of malware detection and classification visualization techniques by Jinwei WANG, Zhengjia CHEN, Xue XIE, Xiangyang LUO, Bin MA

    Published 2023-10-01
    “…With the rapid advancement of technology, network security faces a significant challenge due to the proliferation of malicious software and its variants.These malicious software use various technical tactics to deceive or bypass traditional detection methods, rendering conventional non-visual detection techniques inadequate.In recent years, data visualization has gained considerable attention in the academic community as a powerful approach for detecting and classifying malicious software.By visually representing the key features of malicious software, these methods greatly enhance the accuracy of malware detection and classification, opening up extensive research opportunities in the field of cyber security.An overview of traditional non-visual detection techniques and visualization-based methods were provided in the realm of malicious software detection.Traditional non-visual approaches for malicious software detection, including static analysis, dynamic analysis, and hybrid techniques, were introduced.Subsequently, a comprehensive survey and evaluation of prominent contemporary visualization-based methods for detecting malicious software were undertaken.This primarily encompasses encompassed the integration of visualization with machine learning and visualization combined with deep learning, each of which exhibits distinct advantages and characteristics within the domain of malware detection and classification.Consequently, the holistic consideration of several factors, such as dataset size, computational resources, time constraints, model accuracy, and implementation complexity, is necessary for the selection of detection and classification methods.In conclusion, the challenges currently faced by detection technologies are summarized, and a forward-looking perspective on future research directions in the field is provided.…”
    Get full text
    Article
  9. 769
  10. 770

    Leveraging self attention driven gated recurrent unit with crocodile optimization algorithm for cyberattack detection using federated learning framework by Manal Abdullah Alohali, Hatim Dafaalla, Mohammed Baihan, Sultan Alahmari, Achraf Ben Miled, Othman Alrusaini, Ali Alqazzaz, Hanadi Alkhudhayr

    Published 2025-07-01
    “…Cybersecurity includes decreasing the risk of mischievous computer, software, and network attacks. Novel techniques have been combined into emerging artificial intelligence (AI) that attains cybersecurity. …”
    Get full text
    Article
  11. 771
  12. 772
  13. 773

    Fractional Artificial Protozoa Optimization Enabled Deep Learning for Intrusion Detection and Mitigation in Cyber-Physical Systems by Shaik Abdul Rahim, Arun Manoharan

    Published 2024-01-01
    “…CPSs are gradually growing and utilized in important infrastructure and industries for attaining smart grid, smart transportation, and smart healthcare, which assists governments and citizens. Nevertheless, the network and wireless communication technology creates high complexity, and the intelligence and dynamic of network intrusions make CPS more insecure to network intrusions and provide more critical threats to human life and national security. …”
    Get full text
    Article
  14. 774
  15. 775

    Interdisciplinary framework for cyber-attacks and anomaly detection in industrial control systems using deep learning by Qawsar Gulzar, Khurram Mustafa

    Published 2025-07-01
    “…In this study, we introduced an interdisciplinary framework that aims to enhance network intrusion detection systems (NIDSs). In this framework, we introduced an IDS via feature selection and feature reduction technique(s) with the attention-driven lightweight deep neural networks: Deep Recurrent Neural Networks (RNN), Deep Long Short-Term Memory (LSTM), and Deep Bi-directional Long Short-Term Memory (Bi-LSTM). …”
    Get full text
    Article
  16. 776
  17. 777
  18. 778
  19. 779
  20. 780