Showing 101 - 120 results of 836 for search 'computer network security features.', query time: 0.11s Refine Results
  1. 101
  2. 102
  3. 103
  4. 104

    A deep Reinforcement learning-based robust Intrusion Detection System for securing IoMT Healthcare Networks by Jamshed Ali Shaikh, Chengliang Wang, Muhammad Wajeeh Us Sima, Muhammad Arshad, Muhammad Owais, Dina S. M. Hassan, Reem Alkanhel, Mohammed Saleh Ali Muthanna

    Published 2025-04-01
    “…However, the widespread deployment of these devices introduces significant security vulnerabilities due to limited resources and inadequate network protocols. …”
    Get full text
    Article
  5. 105

    Build with intrinsic security: Trusted autonomy security system by Shen He, Jing Huang, Penglin Yang

    Published 2020-11-01
    “…Compared to traditional Internet of things networks, this architecture uses trusted computing technique to build the basic of security, and makes Internet of things network available to manage security automatically. …”
    Get full text
    Article
  6. 106
  7. 107
  8. 108
  9. 109

    Style Transfer and Topological Feature Analysis of Text-Based CAPTCHA via Generative Adversarial Networks by Tao Xue, Zixuan Guo, Zehang Yin, Yu Rong

    Published 2025-06-01
    “…The design and cracking of text-based CAPTCHAs are important topics in computer security. This study proposes a method for the style transfer of text-based CAPTCHAs using Generative Adversarial Networks (GANs). …”
    Get full text
    Article
  10. 110
  11. 111

    GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks by Qianmu Li, Jun Hou, Shunmei Meng, Huaqiu Long

    Published 2020-01-01
    “…Due to the dual constraints of the hybrid feature of edge computing networks and the uncertainty of new attack features, implementing active defence measures such as detection, evasion, trap, and control is essential for the security protection of edge computing networks with high real-time and continuity requirements. …”
    Get full text
    Article
  12. 112
  13. 113
  14. 114
  15. 115

    A Verifiably Secure and Lightweight Device-to-Device (D2D) Authentication Protocol for the Resource-Constrained IoT Networks by Naif Alzahrani

    Published 2025-01-01
    “…The protocol minimizes energy and computational costs while ensuring strong security by utilizing mutual authentication and effective cryptographic primitives. …”
    Get full text
    Article
  16. 116
  17. 117
  18. 118

    FFT-RDNet: A Time–Frequency-Domain-Based Intrusion Detection Model for IoT Security by Bingjie Xiang, Renguang Zheng, Kunsan Zhang, Chaopeng Li, Jiachun Zheng

    Published 2025-07-01
    “…This network effectively captures complex periodic attack patterns with minimal computational overhead. …”
    Get full text
    Article
  19. 119

    ConvGRU: A Lightweight Intrusion Detection System for Vehicle Networks Based on Shallow CNN and GRU by Shaoqiang Wang, Jiahui Cheng, Yizhe Wang, Shutong Li, Lei Kang, Yinfei Dai

    Published 2025-01-01
    “…To address these challenges, this study proposes ConvGRU, a lightweight vehicular network intrusion detection model that integrates a shallow Convolutional Neural Network (CNN) with a Gated Recurrent Unit (GRU). …”
    Get full text
    Article
  20. 120

    Enhancing intrusion detection in IoT networks using machine learning-based feature selection and ensemble models by Ayoob Almotairi, Samer Atawneh, Osama A. Khashan, Nour M. Khafajah

    Published 2024-12-01
    “…Internet of Things (IoT) technology has evolved significantly, transitioning from personal devices to powering smart cities and global deployments across diverse industries. However, security challenges arise due to diverse devices using various protocols and having limited computational capabilities, leading to vulnerabilities and potential intrusions in IoT networks. …”
    Get full text
    Article