Showing 161 - 180 results of 836 for search 'computer network security features.', query time: 0.07s Refine Results
  1. 161
  2. 162
  3. 163
  4. 164
  5. 165
  6. 166

    EfficientTransformer: A Dynamic Anomaly Detection Model for Industrial Control Networks by Jinyang Liu, Guogang Wang, Xuejun Zong, Bowei Ning, Kan He

    Published 2025-01-01
    “…As industrial control network threats become increasingly complex, traditional intrusion detection systems (IDS) struggle to capture implicit relationships due to feature redundancy and intricate feature interactions. …”
    Get full text
    Article
  7. 167
  8. 168
  9. 169
  10. 170
  11. 171

    Cyberterrorism: content, forms and promising countermeasures by D. S. Melnyk

    Published 2023-10-01
    “…The main forms of cyber terrorism are revealed: the commission of terrorist acts by organisations, groups and individuals using computers and computer networks or by influencing the information processed (circulated) in them, as well as the use of cyberspace for other purposes of terrorist activities not directly related to the commission of terrorist acts. …”
    Get full text
    Article
  12. 172
  13. 173
  14. 174
  15. 175

    Optimizing Fingerprint Identification: CNNs With Raw Images Versus Handcrafted Features for Real-Time Systems by Shaik Salma, Tauheed Ahmed, Garimella Ramamurthy

    Published 2025-01-01
    “…This study investigates the balance between accuracy and computational efficiency(thereby speed) by comparing two approaches: training a Convolutional Neural Network (CNN) with raw fingerprint images and training a CNN using handcrafted fingerprint features. …”
    Get full text
    Article
  16. 176
  17. 177
  18. 178
  19. 179
  20. 180

    YOLO-Ssboat: Super-Small Ship Detection Network for Large-Scale Aerial and Remote Sensing Scenes by Yiliang Zeng, Xiuhong Wang, Jinlin Zou, Hongtao Wu

    Published 2025-06-01
    “…Additionally, it employs a high-resolution feature layer and incorporates a Multi-Scale Weighted Pyramid Network (MSWPN) to enhance feature diversity. …”
    Get full text
    Article