Journal articles on the topic 'Signal processing for network security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Signal processing for network security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Alapati, Yaswanth Kumar, and Suban Ravichandran. "An Efficient Signal Processing Model for Malicious Signal Identification and Energy Consumption Reduction for Improving Data Transmission Rate." Traitement du Signal 38, no. 3 (June 30, 2021): 837–43. http://dx.doi.org/10.18280/ts.380330.
Full textGao, Feng, Yun Wu, and Shang Qiong Lu. "LabVIEW-Based Virtual Laboratory for Digital Signal Processing." Advanced Materials Research 268-270 (July 2011): 2150–57. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.2150.
Full textXue, Lian, and Cheng-song Hu. "A Vibration Signal Processing of Large-scale Structural Systems Based on Wireless Sensor." International Journal of Online Engineering (iJOE) 13, no. 05 (May 14, 2017): 43. http://dx.doi.org/10.3991/ijoe.v13i05.7050.
Full textCheng, Jie, Bingjie Lin, Jiahui Wei, and Ang Xia. "The Compound Prediction Analysis of Information Network Security Situation based on Support Vector Combined with BP Neural Network Learning Algorithm." International Journal of Circuits, Systems and Signal Processing 16 (January 13, 2022): 489–96. http://dx.doi.org/10.46300/9106.2022.16.60.
Full textXiang, Zhongwu, Weiwei Yang, Gaofeng Pan, Yueming Cai, and Yi Song. "Physical Layer Security in Cognitive Radio Inspired NOMA Network." IEEE Journal of Selected Topics in Signal Processing 13, no. 3 (June 2019): 700–714. http://dx.doi.org/10.1109/jstsp.2019.2902103.
Full textDemidov, R. A., P. D. Zegzhda, and M. O. Kalinin. "Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model." Automatic Control and Computer Sciences 52, no. 8 (December 2018): 971–76. http://dx.doi.org/10.3103/s0146411618080084.
Full textJi, Cheongmin, Taehyoung Ko, and Manpyo Hong. "CA-CRE: Classification Algorithm-Based Controller Area Network Payload Format Reverse-Engineering Method." Electronics 10, no. 19 (October 8, 2021): 2442. http://dx.doi.org/10.3390/electronics10192442.
Full textTu, Jun, Willies Ogola, Dehong Xu, and Wei Xie. "Intrusion Detection Based on Generative Adversarial Network of Reinforcement Learning Strategy for Wireless Sensor Networks." International Journal of Circuits, Systems and Signal Processing 16 (January 13, 2022): 478–82. http://dx.doi.org/10.46300/9106.2022.16.58.
Full textPeng, Qi Hua. "An Improved Abnormal Behavior Feature Detection Algorithm of Network Information Based on Fractional Fourier Transform." Applied Mechanics and Materials 513-517 (February 2014): 2408–11. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2408.
Full textAhmed, Aseel K., and Abbas Akram Khorsheed. "Open network structure and smart network to sharing cybersecurity within the 5G network." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 1 (July 1, 2022): 573. http://dx.doi.org/10.11591/ijeecs.v27.i1.pp573-582.
Full textLin, Bingjie, Jie Cheng, Jiahui Wei, and Ang Xia. "A Sensing Method of Network Security Situation Based on Markov Game Model." International Journal of Circuits, Systems and Signal Processing 16 (January 14, 2022): 531–36. http://dx.doi.org/10.46300/9106.2022.16.66.
Full textLee, Sanguk, Incheol Jeong, and Woo-Geun Ahn. "Study on Search and Rescue System for Military and Civil use by using COSPAS SARSAT and Terrestrial Communication Network." E3S Web of Conferences 94 (2019): 01018. http://dx.doi.org/10.1051/e3sconf/20199401018.
Full textBehlilovic, Narves. "One Approach to Improving Smart Environment Communication via the Security Parameter." International Journal of Embedded and Real-Time Communication Systems 13, no. 1 (January 1, 2022): 1–30. http://dx.doi.org/10.4018/ijertcs.313042.
Full textTefera, Mulugeta Kassaw, Zengwang Jin, and Shengbing Zhang. "A Review of Fundamental Optimization Approaches and the Role of AI Enabling Technologies in Physical Layer Security." Sensors 22, no. 9 (May 9, 2022): 3589. http://dx.doi.org/10.3390/s22093589.
Full textHe, Jialuan, Zirui Xing, Tianqi Xiang, Xin Zhang, Yinghai Zhou, Chuanyu Xi, and Hai Lu. "Wireless Signal Propagation Prediction Based on Computer Vision Sensing Technology for Forestry Security Monitoring." Sensors 21, no. 17 (August 24, 2021): 5688. http://dx.doi.org/10.3390/s21175688.
Full textWichary, Tomasz, Jordi Mongay Batalla, Constandinos X. Mavromoustakis, Jerzy Żurek, and George Mastorakis. "Network Slicing Security Controls and Assurance for Verticals." Electronics 11, no. 2 (January 11, 2022): 222. http://dx.doi.org/10.3390/electronics11020222.
Full textWang, Huan, Jian Gu, Jianping Zhao, Dan Liu, Xin Sui, Xiaoqiang Di, and Bo Li. "Prediction Method of Network Security Situation Based on GA-LSSVM Time Series Analysis." Advances in Modelling and Analysis B 60, no. 2 (June 30, 2017): 372–90. http://dx.doi.org/10.18280/ama_b.600208.
Full textLazaar, Saiida. "Contribution of wavelets to cybersecurity: Intrusion detection systems using neural networks." General Letters in Mathematics 10, no. 2 (June 2021): 24–30. http://dx.doi.org/10.31559/glm2021.10.2.2.
Full textLafia, Diafale, Mistura Laide Sanni, Rasheed Ayodeji Adetona, Bodunde Odunola Akinyemi, and Ganiyu Adesola Aderounmu. "Signal Processing-based Model for Primary User Emulation Attacks Detection in Cognitive Radio Networks." Journal of Computing and Information Technology 29, no. 2 (July 4, 2022): 77–88. http://dx.doi.org/10.20532/cit.2021.1005297.
Full textKalinin, M. O., and A. A. Minin. "Security evaluation of a wireless ad-hoc network with dynamic topology." Automatic Control and Computer Sciences 51, no. 8 (December 2017): 899–901. http://dx.doi.org/10.3103/s0146411617080119.
Full textDu, Zhiqiang, Haitao Yao, Yanfang Fu, Zijian Cao, Hongtao Liang, and Jinkang Ren. "Network Situation Assessment Method Based on Improved BP Neural Network." Electronics 12, no. 3 (January 17, 2023): 483. http://dx.doi.org/10.3390/electronics12030483.
Full textKhonde, Shraddha R., and Venugopal Ulagamuthalvi. "Hybrid Architecture for Distributed Intrusion Detection System Using Semi-supervised Classifiers in Ensemble Approach." Advances in Modelling and Analysis B 63, no. 1-4 (December 31, 2020): 10–19. http://dx.doi.org/10.18280/ama_b.631-403.
Full textHeo, Jeonghwan, and Jechang Jeong. "Deceptive Techniques to Hide a Compressed Video Stream for Information Security." Sensors 21, no. 21 (October 29, 2021): 7200. http://dx.doi.org/10.3390/s21217200.
Full textSong, Wenzhan, Fangyu Li, Maria Valero, and Liang Zhao. "Toward Creating a Subsurface Camera." Sensors 19, no. 2 (January 14, 2019): 301. http://dx.doi.org/10.3390/s19020301.
Full textOlanrewaju, Rashidah Funke, Burhan Ul Islam Khan, Miss Laiha Binti Mat Kiah, Nor Aniza Abdullah, and Khang Wen Goh. "Decentralized Blockchain Network for Resisting Side-Channel Attacks in Mobility-Based IoT." Electronics 11, no. 23 (December 1, 2022): 3982. http://dx.doi.org/10.3390/electronics11233982.
Full textChen, Xiangqian, Kia Makki, Kang Yen, and Niki Pissinou. "Attack Distribution Modeling and Its Applications in Sensor Network Security." EURASIP Journal on Wireless Communications and Networking 2008 (2008): 1–11. http://dx.doi.org/10.1155/2008/754252.
Full textAngelini, Marco, Graziano Blasilli, Tiziana Catarci, Simone Lenti, and Giuseppe Santucci. "Vulnus: Visual Vulnerability Analysis for Network Security." IEEE Transactions on Visualization and Computer Graphics 25, no. 1 (January 2019): 183–92. http://dx.doi.org/10.1109/tvcg.2018.2865028.
Full textKhatri, Narayan, Rakesh Shrestha, and Seung Yeob Nam. "Security Issues with In-Vehicle Networks, and Enhanced Countermeasures Based on Blockchain." Electronics 10, no. 8 (April 8, 2021): 893. http://dx.doi.org/10.3390/electronics10080893.
Full textAl Ahmed, Mahmoud Tayseer, Fazirulhisyam Hashim, Shaiful Jahari Hashim, and Azizol Abdullah. "Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks." Electronics 12, no. 4 (February 8, 2023): 867. http://dx.doi.org/10.3390/electronics12040867.
Full textDasic, Dejan, Miljan Vucetic, Nemanja Ilic, Milos Stankovic, and Marko Beko. "Application of deep learning algorithms and architectures in the new generation of mobile networks." Serbian Journal of Electrical Engineering 18, no. 3 (2021): 397–426. http://dx.doi.org/10.2298/sjee2103397d.
Full textLi, Wenchao, Ping Yi, Yue Wu, Li Pan, and Jianhua Li. "A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network." Journal of Electrical and Computer Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/240217.
Full textZhu, Ying, Caixia Liu, Wei You, Yiming Zhang, and Weicheng Zhang. "A Business Process-Based Security Enhancement Scheme for the Network Function Service Access Procedure in the 5G Core Network." Electronics 12, no. 3 (January 23, 2023): 576. http://dx.doi.org/10.3390/electronics12030576.
Full textD.N., Kolegov. "DP-MODEL APPLICATION FOR NETWORK SECURITY ANALYSIS." Prikladnaya diskretnaya matematika, no. 1 (June 1, 2008): 71–87. http://dx.doi.org/10.17223/20710410/1/12.
Full textChen, Yue, Zi-Long Wu, and Ying-Ke Lei. "Individual Identification of Radar Emitters Based on a One-Dimensional LeNet Neural Network." Symmetry 13, no. 7 (July 7, 2021): 1215. http://dx.doi.org/10.3390/sym13071215.
Full textLavrova, D. S., I. V. Alekseev, and A. A. Shtyrkina. "Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation." Automatic Control and Computer Sciences 52, no. 8 (December 2018): 931–35. http://dx.doi.org/10.3103/s0146411618080187.
Full textStatkus, Arūnas, Šarūnas Paulikas, and Audrius Krukonis. "TCP Acknowledgment Optimization in Low Power and Embedded Devices." Electronics 10, no. 6 (March 10, 2021): 639. http://dx.doi.org/10.3390/electronics10060639.
Full textZhu, Zhen, and Guofei Chai. "An Intrusion Intention Analysis Algorithm Based on Attack Graph." International Journal of Circuits, Systems and Signal Processing 15 (July 20, 2021): 643–50. http://dx.doi.org/10.46300/9106.2021.15.71.
Full textHuang, Tongyuan, Jia Xu, Shixin Tu, and Baoru Han. "Robust zero-watermarking scheme based on a depthwise overparameterized VGG network in healthcare information security." Biomedical Signal Processing and Control 81 (March 2023): 104478. http://dx.doi.org/10.1016/j.bspc.2022.104478.
Full textHameed, Bilal Hashim, Anmar Yahya Taher, Raed Khalid Ibrahim, Adnan Hussein Ali, and Yasser Adnan Hussein. "Based on mesh sensor network: design and implementation of security monitoring system with Bluetooth technology." Indonesian Journal of Electrical Engineering and Computer Science 26, no. 3 (June 1, 2022): 1781. http://dx.doi.org/10.11591/ijeecs.v26.i3.pp1781-1790.
Full textShi, Wei, Meichen Duan, Hui He, Liangliang Lin, Chen Yang, Chenhao Li, and Jizhong Zhao. "Location Adaptive Motion Recognition Based on Wi-Fi Feature Enhancement." Applied Sciences 13, no. 3 (January 18, 2023): 1320. http://dx.doi.org/10.3390/app13031320.
Full textMemon, Mudasar, Navrati Saxena, Abhishek Roy, and Dong Shin. "Backscatter Communications: Inception of the Battery-Free Era—A Comprehensive Survey." Electronics 8, no. 2 (January 26, 2019): 129. http://dx.doi.org/10.3390/electronics8020129.
Full textChugh, Neeraj, Geetam Singh Tomar, Robin Singh Bhadoria, and Neetesh Saxena. "A Novel Anomaly Behavior Detection Scheme for Mobile Ad Hoc Networks." Electronics 10, no. 14 (July 9, 2021): 1635. http://dx.doi.org/10.3390/electronics10141635.
Full textRehman, Attique Ur, Muhammad Sajid Mahmood, Shoaib Zafar, Muhammad Ahsan Raza, Fahad Qaswar, Sumayh S. Aljameel, Irfan Ullah Khan, and Nida Aslam. "A Survey on MAC-Based Physical Layer Security over Wireless Sensor Network." Electronics 11, no. 16 (August 12, 2022): 2529. http://dx.doi.org/10.3390/electronics11162529.
Full textWang, Weizheng, Zhuo Deng, and Jin Wang. "Enhancing Sensor Network Security with Improved Internal Hardware Design." Sensors 19, no. 8 (April 12, 2019): 1752. http://dx.doi.org/10.3390/s19081752.
Full textAlgarni, Sultan, Fathy Eassa, Khalid Almarhabi, Abdullah Algarni, and Aiiad Albeshri. "BCNBI: A Blockchain-Based Security Framework for Northbound Interface in Software-Defined Networking." Electronics 11, no. 7 (March 23, 2022): 996. http://dx.doi.org/10.3390/electronics11070996.
Full textRuchkin, V. N., B. V. Kostrov, and V. A. Fulin. "Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture." Automatic Control and Computer Sciences 56, no. 8 (December 2022): 970–80. http://dx.doi.org/10.3103/s014641162208020x.
Full textZhu, Mengyun, Ximin Fan, Weijing Liu, Jianying Shen, Wei Chen, Yawei Xu, and Xuejing Yu. "Artificial Intelligence-Based Echocardiographic Left Atrial Volume Measurement with Pulmonary Vein Comparison." Journal of Healthcare Engineering 2021 (December 6, 2021): 1–11. http://dx.doi.org/10.1155/2021/1336762.
Full textMohtadzar, Nur Alia Athirah, and Shigeru Takayama. "Revelation of Body Behavior Based on Arm Motion Measurement in Wireless Body Area Network System." Applied Mechanics and Materials 833 (April 2016): 179–84. http://dx.doi.org/10.4028/www.scientific.net/amm.833.179.
Full textSun, Hongzhe, Jian Wang, Chen Chen, Zhi Li, and Jinjin Li. "ISSA-ELM: A Network Security Situation Prediction Model." Electronics 12, no. 1 (December 21, 2022): 25. http://dx.doi.org/10.3390/electronics12010025.
Full textHussain, Muhammad Zunnurain, and Zurina Mohd Hanapi. "Efficient Secure Routing Mechanisms for the Low-Powered IoT Network: A Literature Review." Electronics 12, no. 3 (January 17, 2023): 482. http://dx.doi.org/10.3390/electronics12030482.
Full text