-
141
A Risk Assessment Analysis to Enhance the Security of OT WAN with SD-WAN
Published 2024-10-01Get full text
Article -
142
Approach of detecting low-rate DoS attack based on combined features
Published 2017-05-01“…LDoS (low-rate denial of service) attack is a kind of RoQ (reduction of quality) attack which has the characteristics of low average rate and strong concealment.These characteristics pose great threats to the security of cloud computing platform and big data center.Based on network traffic analysis,three intrinsic characteristics of LDoS attack flow were extracted to be a set of input to BP neural network,which is a classifier for LDoS attack detection.Hence,an approach of detecting LDoS attacks was proposed based on novel combined feature value.The proposed approach can speedily and accurately model the LDoS attack flows by the efficient self-organizing learning process of BP neural network,in which a proper decision-making indicator is set to detect LDoS attack in accuracy at the end of output.The proposed detection approach was tested in NS2 platform and verified in test-bed network environment by using the Linux TCP-kernel source code,which is a widely accepted LDoS attack generation tool.The detection probability derived from hypothesis testing is 96.68%.Compared with available researches,analysis results show that the performance of combined features detection is better than that of single feature,and has high computational efficiency.…”
Get full text
Article -
143
A Hybrid Deep Learning Framework for Deepfake Detection Using Temporal and Spatial Features
Published 2025-01-01“…A Feature Pyramid Network (FPN) facilitates the fusion of scale features capturing intricate details as well, as broader context. …”
Get full text
Article -
144
Enhanced anomaly traffic detection framework using BiGAN and contrastive learning
Published 2024-11-01“…Abstract Abnormal traffic detection is a crucial topic in the field of network security. However, existing methods face many challenges when processing complex high-dimensional traffic data. …”
Get full text
Article -
145
LLM-Based Cyberattack Detection Using Network Flow Statistics
Published 2025-06-01Get full text
Article -
146
Explainable AI for zero-day attack detection in IoT networks using attention fusion model
Published 2025-07-01Get full text
Article -
147
-
148
Wireless Security Threats
Published 2013-12-01“…These entire devices store large amount of data and their wireless connection to network spectrum exhibit them as important source of computing. …”
Get full text
Article -
149
-
150
Facial Feature Recognition with Multi-task Learning and Attention-based Enhancements
Published 2025-01-01Get full text
Article -
151
Connected Vehicles Security: A Lightweight Machine Learning Model to Detect VANET Attacks
Published 2025-06-01“…Vehicular ad hoc networks (VANETs) aim to manage traffic, prevent accidents, and regulate various parts of traffic. …”
Get full text
Article -
152
On‐Chip Metamaterial‐Enhanced Mid‐Infrared Photodetectors with Built‐In Encryption Features
Published 2025-03-01Get full text
Article -
153
-
154
-
155
Smart framework for industrial IoT and cloud computing network intrusion detection using a ConvLSTM-based deep learning model
Published 2025-08-01“…In the rapidly evolving landscape of the Industrial Internet of Things (IIoT) and cloud computing, ensuring robust network security has become a major challenge for the Internet of Everything (IoE). …”
Get full text
Article -
156
Spatial attention-guided pre-trained networks for accurate identification of crop diseases
Published 2025-07-01Get full text
Article -
157
A Cross-Mamba Interaction Network for UAV-to-Satallite Geolocalization
Published 2025-06-01Get full text
Article -
158
Optimizing Intrusion Detection in IoMT Networks Through Interpretable and Cost-Aware Machine Learning
Published 2025-05-01Get full text
Article -
159
A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing
Published 2020-02-01“…The proposal provides the verifiability of ciphertext that ensures the user to check the correctness efficiently. (2) The size of the ciphertext is constant that is not increased with the complexity of attribute and access structure. (3) For Internet of Things devices, it introduces the fog computing into our protocol for the purpose of low latency and relation interactions, which has virtually saved the bandwidth. (4) With the help of blockchain technique, we encapsulate the hash value of public parameter, original and transformed ciphertext and transformed key into a block, so that the tamper-resistance is facilitated against an adversary from inside and outside the system. (5) In the standard model, we prove that it is selectively chosen-plaintext attack-secure and verifiable provided that the computational bilinear Diffie–Hellman assumption holds. (6) It implements this protocol and shows the result of performance measurement, which indicates a significant reduction on communication and computation costs burden on every entity in wireless body area network.…”
Get full text
Article -
160