Littérature scientifique sur le sujet « Signal processing for network security »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Signal processing for network security ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Signal processing for network security"
Alapati, Yaswanth Kumar, and Suban Ravichandran. "An Efficient Signal Processing Model for Malicious Signal Identification and Energy Consumption Reduction for Improving Data Transmission Rate." Traitement du Signal 38, no. 3 (2021): 837–43. http://dx.doi.org/10.18280/ts.380330.
Texte intégralGao, Feng, Yun Wu, and Shang Qiong Lu. "LabVIEW-Based Virtual Laboratory for Digital Signal Processing." Advanced Materials Research 268-270 (July 2011): 2150–57. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.2150.
Texte intégralKumar, Dr A. Pradeep. "Radar Based Security System Alert." International Journal for Research in Applied Science and Engineering Technology 12, no. 6 (2024): 2484–88. http://dx.doi.org/10.22214/ijraset.2024.63509.
Texte intégralZhang, Hongwei, Haiyan Wang, Xuanming Liang, Yongsheng Yan, and Xiaohong Shen. "Remote passive acoustic signal detection using multi-scale correlation networks and network spectrum distance in marine environment." Journal of the Acoustical Society of America 154, no. 3 (2023): 1563–76. http://dx.doi.org/10.1121/10.0020907.
Texte intégralS.K., Rajesh, Mary P. Varghese, Lisa C, Rajkumar P, and Winson Rajaian. "SECURE SIGNAL PROCESSING FOR 6G LEO SATELLITE NETWORKS: A DEEP LEARNING APPROACH USING DRIVEN SECURE CHANNEL ESTIMATION MODEL." ICTACT Journal on Communication Technology 16, no. 1 (2025): 3413–18. https://doi.org/10.21917/ijct.2025.0506.
Texte intégralElliot, Kizzy N., and Levi A.S Damingo. "Application of Blockchain Technology for Secure Signal Processing." Recent Innovations in Wireless Network Security 6, no. 2 (2024): 19–31. https://doi.org/10.5281/zenodo.10683541.
Texte intégralXue, Lian, and Cheng-song Hu. "A Vibration Signal Processing of Large-scale Structural Systems Based on Wireless Sensor." International Journal of Online Engineering (iJOE) 13, no. 05 (2017): 43. http://dx.doi.org/10.3991/ijoe.v13i05.7050.
Texte intégralAsiya, E. Asiya, and U. Onuu Michael. "Design of a Security Wireless Sensor Network for Emergency Response Centers (SWiSNERC)." Journal of Network Security and Data Mining 3, no. 3 (2020): 1–14. https://doi.org/10.5281/zenodo.4280334.
Texte intégralCao, Yunyu, Jinrui Tang, Shaohui Shi, Defu Cai, Li Zhang, and Ping Xiong. "Fault Diagnosis Techniques for Electrical Distribution Network Based on Artificial Intelligence and Signal Processing: A Review." Processes 13, no. 1 (2024): 48. https://doi.org/10.3390/pr13010048.
Texte intégralCheng, Jie, Bingjie Lin, Jiahui Wei, and Ang Xia. "The Compound Prediction Analysis of Information Network Security Situation based on Support Vector Combined with BP Neural Network Learning Algorithm." International Journal of Circuits, Systems and Signal Processing 16 (January 13, 2022): 489–96. http://dx.doi.org/10.46300/9106.2022.16.60.
Texte intégralThèses sur le sujet "Signal processing for network security"
Lu, Xiaotao. "Cost-effective signal processing algorithms for physical-layer security in wireless networks." Thesis, University of York, 2016. http://etheses.whiterose.ac.uk/16043/.
Texte intégralDi, Mauro Mario. "Statistical models for the characterization, identification and mitigation of distributed attacks in data networks." Doctoral thesis, Universita degli studi di Salerno, 2018. http://hdl.handle.net/10556/3088.
Texte intégralMynampati, Vittal Reddy, Dilip Kandula, Raghuram Garimilla, and Kalyan Srinivas. "Performance and Security of Wireless Mesh Networks." Thesis, Blekinge Tekniska Högskola, Avdelningen för telekommunikationssystem, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2901.
Texte intégralXu, Jingxin. "Unusual event detection in crowded scenes." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/76365/1/Jingxin_Xu_Thesis.pdf.
Texte intégralMoore, Patrick. "Architectural investigation into network security processing." Thesis, Queen's University Belfast, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.492519.
Texte intégralZhao, Wentao. "Genomic applications of statistical signal processing." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2952.
Texte intégralLiu, Jinshan. "Secure and reliable deep learning in signal processing." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/103740.
Texte intégralFarhat, Md Tanzin. "An Artificial Neural Network based Security Approach of Signal Verification in Cognitive Radio Network." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo153511563131623.
Texte intégralCARDOSO, LUIZ ALBERTO LISBOA DA SILVA. "ANALYSIS OF PLASTIC NEURAL NETWORK MODELLING APPROACH TO SIGNAL PROCESSING." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 1992. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=9512@1.
Texte intégralHarper, Scott Jeffery. "A Secure Adaptive Network Processor." Diss., Virginia Tech, 2003. http://hdl.handle.net/10919/28023.
Texte intégralLivres sur le sujet "Signal processing for network security"
International, Conference on Intelligent Information Hiding and Multimedia Signal Processing (4th 2008 Harbin Shi China). IIH-MSP 2008 : 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing : 15-17 August 2008, Harbin, China. IEEE Computer Society, 2008.
Trouver le texte intégralInternational Conference on Intelligent Information Hiding and Multimedia Signal Processing (2nd 2006 Pasadena, Calif.). 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing: (IIH-MSP 2006) : proceedings ; 18-20 December, 2006, Pasadena, California, USA. IEEE Computer Society, 2006.
Trouver le texte intégralPathak, Manas A. Privacy-Preserving Machine Learning for Speech Processing. Springer New York, 2013.
Trouver le texte intégralInternational, Conference on E.-business and Telecommunication Networks (4th 2007 Barcelona Spain). E-business and telecommunications: 4th international conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, revised selected papers. Springer, 2008.
Trouver le texte intégralInternational, Conference on E.-business and Telecommunication Networks (4th 2007 Barcelona Spain). E-business and telecommunications: 4th international conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, revised selected papers. Springer, 2008.
Trouver le texte intégralInternational, Conference on E.-business and Telecommunication Networks (4th 2007 Barcelona Spain). E-business and telecommunications: 4th international conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, revised selected papers. Springer, 2008.
Trouver le texte intégralDey, Nilanjan, and V. Santhi, eds. Intelligent Techniques in Signal Processing for Multimedia Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-44790-2.
Texte intégralIacobucci, Maria Stella. Reconfigurable radio systems: Network architectures and standards. John Wiley & Sons, Ltd Publication, 2013.
Trouver le texte intégralTakanami, Tetsuo, and Genshiro Kitagawa. Methods and Applications of Signal Processing in Seismic Network Operations. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/bfb0117693.
Texte intégralmissing], [name. Methods and applications of signal processing in seismic network operations. Springer, 2003.
Trouver le texte intégralChapitres de livres sur le sujet "Signal processing for network security"
Wang, Wenting, Xin Liu, Xiaohong Zhao, Yang Zhao, Rui Wang, and Jianpo Li. "Design of Intelligent Substation Communication Network Security Audit System." In Advances in Intelligent Information Hiding and Multimedia Signal Processing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6420-2_48.
Texte intégralWang, Wenting, Guilin Huang, Xin Liu, Hao Zhang, Rui Wang, and Jianpo Li. "Research on Security Auditing Scheme of Intelligent Substation Communication Network." In Advances in Intelligent Information Hiding and Multimedia Signal Processing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6420-2_49.
Texte intégralSawlikar, Alka P., Z. J. Khan, and S. G. Akojwar. "Parametric Evaluation of Different Cryptographic Techniques for Enhancement of Energy Efficiency in Wireless Communication Network." In Intelligent Techniques in Signal Processing for Multimedia Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44790-2_9.
Texte intégralLiu, Xin, He Wang, Xi Li, et al. "Research Review on Security Protection Scheme of Distributed Photovoltaic Grid-Connected Network." In Advances in Intelligent Information Hiding and Multimedia Signal Processing. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-0105-0_13.
Texte intégralGao, Lifang, Zhihui Wang, Huifeng Yang, et al. "Network Security Situation Assessment of Power Information System Based on Improved Artificial Bee Colony Algorithm." In Advances in Intelligent Information Hiding and Multimedia Signal Processing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6420-2_42.
Texte intégralYang, Yong, Jilin Wang, Rong Li, and Jinxiong Zhao. "Review of Constructing the Early Warning and Diagnosis Information Database of Power Plant Network Security Events." In 3D Imaging Technologies—Multidimensional Signal Processing and Deep Learning. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3180-1_37.
Texte intégralWu, Ji, Qilian Liang, Baoju Zhang, and Xiaorong Wu. "Security Analysis of Distributed Compressive Sensing-Based Wireless Sensor Networks." In The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems. Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-00536-2_5.
Texte intégralBenesty, Jacob, Tomas Gänsler, Dennis R. Morgan, M. Mohan Sondhi, and Steven L. Gay. "Dynamic Resource Allocation for Network Echo Cancellation." In Digital Signal Processing. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/978-3-662-04437-7_4.
Texte intégralMarks, Friedrich, Ursula Klingmüller, and Karin Müller-Decker. "Supplying the Network with Energy: Basic Biochemistry of Signal Transduction." In Cellular Signal Processing. Garland Science, 2017. http://dx.doi.org/10.4324/9781315165479-2.
Texte intégralKhattab, Ahmed, Zahra Jeddi, Esmaeil Amini, and Magdy Bayoumi. "RBS Security Analysis." In Analog Circuits and Signal Processing. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47545-5_5.
Texte intégralActes de conférences sur le sujet "Signal processing for network security"
Ribeiro Sena, Matheus, Abdelrahmane Moawad, Robert Emmerich, et al. "Beyond Optical Layer Monitoring: Exploring the Full Potential of Coherent Signal Processing." In Optical Fiber Communication Conference. Optica Publishing Group, 2025. https://doi.org/10.1364/ofc.2025.m4a.6.
Texte intégralFerraro, Antonino, Valerio La Gatta, and Marco Postiglione. "Empowering Network Security with Autoencoders." In 2024 IEEE International Conference on Acoustics, Speech, and Signal Processing Workshops (ICASSPW). IEEE, 2024. http://dx.doi.org/10.1109/icasspw62465.2024.10627534.
Texte intégralHarsha Vardhan, S., Mahesh Kumar Jha, Raveesh Hegde, Monika Singh, P. Rubini, and Amar Choudhary. "Security and Threats in Aviation: Cryptographic Based Network Security System." In 2024 International Conference on Signal Processing and Advance Research in Computing (SPARC). IEEE, 2024. https://doi.org/10.1109/sparc61891.2024.10828771.
Texte intégralHuang, Yingchun, Fangshi Wu, and Xianxin Wei. "Network Security State Evaluation Based on BP Network Improved Fuzzy Evaluation Membership Function." In 2024 2nd International Conference on Signal Processing and Intelligent Computing (SPIC). IEEE, 2024. http://dx.doi.org/10.1109/spic62469.2024.10691585.
Texte intégralMalik, Shivank, and Samaresh Bera. "Security-as-a-Function in 5G Network: Implementation and Performance Evaluation." In 2024 International Conference on Signal Processing and Communications (SPCOM). IEEE, 2024. http://dx.doi.org/10.1109/spcom60851.2024.10631599.
Texte intégralLin, Jia, Xiaoya Yang, Dingying Tan, Huiling Liu, and Pingping Chen. "Research and Application of Situational Awareness in Hospital Network Security." In 2024 4th International Signal Processing, Communications and Engineering Management Conference (ISPCEM). IEEE, 2024. https://doi.org/10.1109/ispcem64498.2024.00011.
Texte intégralSun, Weize, Yonglong Zhang, Shaowu Chen, Lei Huang, and Jundong Qi. "Lightweight Target Detection Network for Security Radar and FPGA Acceleration." In 2024 7th International Conference on Information Communication and Signal Processing (ICICSP). IEEE, 2024. https://doi.org/10.1109/icicsp62589.2024.10809057.
Texte intégralZhou, Yue, Zihan Gao, Xiaotong Zhou, and Xuanyu Li. "Design of Network Security Intrusion Detection System Based on NIDSeqFormer Framework." In 2024 2nd International Conference on Signal Processing and Intelligent Computing (SPIC). IEEE, 2024. http://dx.doi.org/10.1109/spic62469.2024.10691405.
Texte intégralSharath, T., and A. Muthukumaravel. "Enhancing Network Security: Deep Learning-Powered Intrusion Detection with Data Engineering Techniques." In 2024 IEEE International Conference on Communication, Computing and Signal Processing (IICCCS). IEEE, 2024. http://dx.doi.org/10.1109/iicccs61609.2024.10763674.
Texte intégralLi, Zhiqi, Jie Cheng, Qin Yin, Ang Xia, Lijing Yan, and Shuai Li. "Knowledge Graph Construction of Network Security Domain Based on Bi-LSTM-GNN." In 2024 2nd International Conference on Signal Processing and Intelligent Computing (SPIC). IEEE, 2024. http://dx.doi.org/10.1109/spic62469.2024.10691407.
Texte intégralRapports d'organisations sur le sujet "Signal processing for network security"
Tong, Lang. Network-Centric Distributed Signal Processing. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada519513.
Texte intégralTayeb, Shahab. Taming the Data in the Internet of Vehicles. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2014.
Texte intégralAuthor, Unknown. DTRS56-02-T-0005 Digital Mapping of Buried Pipelines with a Dual Array System. Pipeline Research Council International, Inc. (PRCI), 2005. http://dx.doi.org/10.55274/r0011943.
Texte intégralFriedman, Haya, Julia Vrebalov, and James Giovannoni. Elucidating the ripening signaling pathway in banana for improved fruit quality, shelf-life and food security. United States Department of Agriculture, 2014. http://dx.doi.org/10.32747/2014.7594401.bard.
Texte intégralKwon, Heeseo Rain, HeeAh Cho, Jongbok Kim, Sang Keon Lee, and Donju Lee. International Case Studies of Smart Cities: Namyangju, Republic of Korea. Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0007014.
Texte intégralPhillips, Paul. The Application of Satellite-based Internet of Things for New Mobility. SAE International, 2024. http://dx.doi.org/10.4271/epr2024001.
Texte intégralIrudayaraj, Joseph, Ze'ev Schmilovitch, Amos Mizrach, Giora Kritzman, and Chitrita DebRoy. Rapid detection of food borne pathogens and non-pathogens in fresh produce using FT-IRS and raman spectroscopy. United States Department of Agriculture, 2004. http://dx.doi.org/10.32747/2004.7587221.bard.
Texte intégralFederal Information Processing Standards Publication: guideline for the analysis of local area network security. National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.fips.191.
Texte intégral