Showing 141 - 160 results of 836 for search 'computer network security features.', query time: 0.10s Refine Results
  1. 141
  2. 142

    Approach of detecting low-rate DoS attack based on combined features by Zhi-jun WU, Jing-an ZHANG, Meng YUE, Cai-feng ZHANG

    Published 2017-05-01
    “…LDoS (low-rate denial of service) attack is a kind of RoQ (reduction of quality) attack which has the characteristics of low average rate and strong concealment.These characteristics pose great threats to the security of cloud computing platform and big data center.Based on network traffic analysis,three intrinsic characteristics of LDoS attack flow were extracted to be a set of input to BP neural network,which is a classifier for LDoS attack detection.Hence,an approach of detecting LDoS attacks was proposed based on novel combined feature value.The proposed approach can speedily and accurately model the LDoS attack flows by the efficient self-organizing learning process of BP neural network,in which a proper decision-making indicator is set to detect LDoS attack in accuracy at the end of output.The proposed detection approach was tested in NS2 platform and verified in test-bed network environment by using the Linux TCP-kernel source code,which is a widely accepted LDoS attack generation tool.The detection probability derived from hypothesis testing is 96.68%.Compared with available researches,analysis results show that the performance of combined features detection is better than that of single feature,and has high computational efficiency.…”
    Get full text
    Article
  3. 143

    A Hybrid Deep Learning Framework for Deepfake Detection Using Temporal and Spatial Features by Fazeel Zafar, Talha Ahmed Khan, Salas Akbar, Muhammad Talha Ubaid, Sameena Javaid, Kushsairy Abdul Kadir

    Published 2025-01-01
    “…A Feature Pyramid Network (FPN) facilitates the fusion of scale features capturing intricate details as well, as broader context. …”
    Get full text
    Article
  4. 144

    Enhanced anomaly traffic detection framework using BiGAN and contrastive learning by Haoran Yu, Wenchuan Yang, Baojiang Cui, Runqi Sui, Xuedong Wu

    Published 2024-11-01
    “…Abstract Abnormal traffic detection is a crucial topic in the field of network security. However, existing methods face many challenges when processing complex high-dimensional traffic data. …”
    Get full text
    Article
  5. 145
  6. 146
  7. 147
  8. 148

    Wireless Security Threats by Umair Jilani, Muhammad Umar Khan, Adnan Afroz, Khawaja Masood Ahmed

    Published 2013-12-01
    “…These entire devices store large amount of data and their wireless connection to network spectrum exhibit them as important source of computing. …”
    Get full text
    Article
  9. 149
  10. 150
  11. 151

    Connected Vehicles Security: A Lightweight Machine Learning Model to Detect VANET Attacks by Muawia A. Elsadig, Abdelrahman Altigani, Yasir Mohamed, Abdul Hakim Mohamed, Akbar Kannan, Mohamed Bashir, Mousab A. E. Adiel

    Published 2025-06-01
    “…Vehicular ad hoc networks (VANETs) aim to manage traffic, prevent accidents, and regulate various parts of traffic. …”
    Get full text
    Article
  12. 152
  13. 153
  14. 154
  15. 155

    Smart framework for industrial IoT and cloud computing network intrusion detection using a ConvLSTM-based deep learning model by Ala' Abdulmajid Eshmawi, Asma Aldrees, Raed Alharthi

    Published 2025-08-01
    “…In the rapidly evolving landscape of the Industrial Internet of Things (IIoT) and cloud computing, ensuring robust network security has become a major challenge for the Internet of Everything (IoE). …”
    Get full text
    Article
  16. 156
  17. 157
  18. 158
  19. 159

    A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing by Rui Guo, Chaoyuan Zhuang, Huixian Shi, Yinghui Zhang, Dong Zheng

    Published 2020-02-01
    “…The proposal provides the verifiability of ciphertext that ensures the user to check the correctness efficiently. (2) The size of the ciphertext is constant that is not increased with the complexity of attribute and access structure. (3) For Internet of Things devices, it introduces the fog computing into our protocol for the purpose of low latency and relation interactions, which has virtually saved the bandwidth. (4) With the help of blockchain technique, we encapsulate the hash value of public parameter, original and transformed ciphertext and transformed key into a block, so that the tamper-resistance is facilitated against an adversary from inside and outside the system. (5) In the standard model, we prove that it is selectively chosen-plaintext attack-secure and verifiable provided that the computational bilinear Diffie–Hellman assumption holds. (6) It implements this protocol and shows the result of performance measurement, which indicates a significant reduction on communication and computation costs burden on every entity in wireless body area network.…”
    Get full text
    Article
  20. 160