We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Computer network security and information security technology optimization by using Bayesian classification algorithm

    The naive Bayesian classification algorithm is known for its perfect theoretical system, clear and simple star structure, good adaptability and high...

    Article 24 June 2023
  2. Design of Computer Network Security Defense System Based on Artificial Intelligence and Neural Network

    In order to improve the effect of computer security defense, this paper applies artificial intelligence technology and neural network technology to...

    Article 28 August 2023
  3. Challenges and Potential Approaches in Wireless Sensor Network Security

    A remarkable new technology called a wireless sensor network offers communication services for environmental monitoring and target tracking for the...

    Article 22 December 2023
  4. Risk Prediction Techniques for Power Control System Network Security

    As a fundamental energy infrastructure, the power system has a direct impact on people’s daily lives and production. If the security of the...

    Article 18 April 2024
  5. RETRACTED ARTICLE: Network security threat detection technology based on EPSO-BP algorithm

    With the development of Internet technology, the large number of network nodes and dynamic structure makes network security detection more complex,...

    Article Open access 24 February 2024
  6. Development of computer network security management technology based on artificial intelligence under big data

    With the growth of network technology, network security issues have gradually emerged, and people have gradually begun to focus on network security...

    **uhong Xu, Zhongming Liao, Zhaosheng Xu in Wireless Networks
    Article 16 October 2023
  7. Exploring the landscape of network security: a comparative analysis of attack detection strategies

    The field of computer networking is experiencing rapid growth, accompanied by the swift advancement of internet tools. As a result, people are...

    Article 05 May 2024
  8. A network security situation assessment method based on fusion model

    This research introduces an innovative network security situation assessment (NSSA) model, designed to overcome the shortcomings in feature...

    Article Open access 28 February 2024
  9. Fog computing network security based on resources management

    Fog computing paradigm is designed as an extension of cloud computing due to the need for a supporting platform that is capable of providing the...

    Wided Ben Daoud, Salwa Othmen, ... Habib Hamam in EURASIP Journal on Wireless Communications and Networking
    Article Open access 14 June 2023
  10. Threat analysis for space information network based on network security attributes: a review

    Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to the large-scale of SIN, its secure and stable operation is...

    Xuesong Wu, Ye Du, ... Tianshuai Zheng in Complex & Intelligent Systems
    Article Open access 28 November 2022
  11. Prediction and evaluation of wireless network data transmission security risk based on machine learning

    The security of wireless network transmission data is an important technical index to ensure the reliable transmission of information in local areas,...

    Bo Huang, Huidong Yao, Qing Bin Wu in Wireless Networks
    Article 28 May 2024
  12. An Interactive Visualization System for Network Security Data

    Data visualization is an important approach for data analysis, which can reveal the patterns and characteristics of complex datasets through visual...

    Li Zheng, Gang Yu, Yuntian Zheng in Journal of Signal Processing Systems
    Article 31 January 2023
  13. Quantum deep learning-based anomaly detection for enhanced network security

    Identifying and mitigating aberrant activities within the network traffic is important to prevent adverse consequences caused by cyber security...

    Moe Hdaib, Sutharshan Rajasegarar, Lei Pan in Quantum Machine Intelligence
    Article Open access 02 May 2024
  14. Privacy and security of advanced metering infrastructure (AMI) data and network: a comprehensive review

    The traditional electrical grid has to be digitally improved as digitalization and effective integration of renewable energy bring better efficiency,...

    Priscilla Oyeladun Ajiboye, Kwame Opuni-Boachie Obour Agyekum, Emmanuel Asuming Frimpong in Journal of Engineering and Applied Science
    Article Open access 12 April 2024
  15. Research on campus network security protection system framework based on cloud data and intrusion detection algorithm

    The continuous progress of society has created conditions for the widespread use of information technology. People rely more and more on information...

    Wang Shaorong, Long Guiling in Soft Computing
    Article 07 April 2023
  16. RETRACTED ARTICLE: The design of network security protection trust management system based on an improved hidden Markov model

    With the growth of the Internet, network security issues have become increasingly complex, and the importance of node interaction security is also...

    Article Open access 23 November 2023
  17. Network Security and Trustworthiness

    In 6G, a range of new technologies will emerge based on intelligent network structures. The connection between 6G technology and AI-based intelligent...
    Soyi Jung, Soohyun Park, ... Joongheon Kim in Fundamentals of 6G Communications and Networking
    Chapter 2024
  18. Network-on-Chip Trust Validation Using Security Assertions

    Recent technological advancements enabled integration of a wide variety of Intellectual Property (IP) cores in a single chip, popularly known as...

    Aruna Jayasena, Binod Kumar, ... Prabhat Mishra in Journal of Hardware and Systems Security
    Article 07 December 2022
  19. Efficient security framework against sybil attack in mobile adhoc network using EE-OLSR protocol scheme

    This paper proposes a novel approach for enhancing the authentication and power optimization of Wireless Sensor Networks (WSNs) by using an Energy...

    P. Mohanraj, S. Anbu Karuppusamy in Wireless Networks
    Article 03 October 2023
  20. Deep Learning Based Hybrid Security Model in Wireless Sensor Network

    Spatial positioning of the sensor nodes in the Wireless Sensor Networks (WSN) promotes remote monitoring of assets or target area in terms of...

    N. M. Saravana Kumar, E. Suryaprabha, ... V. Vijayakumar in Wireless Personal Communications
    Article 06 March 2023
Did you find what you were looking for? Share feedback.