Littérature scientifique sur le sujet « Signal processing for network security »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Signal processing for network security ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Signal processing for network security"

1

Alapati, Yaswanth Kumar, and Suban Ravichandran. "An Efficient Signal Processing Model for Malicious Signal Identification and Energy Consumption Reduction for Improving Data Transmission Rate." Traitement du Signal 38, no. 3 (2021): 837–43. http://dx.doi.org/10.18280/ts.380330.

Texte intégral
Résumé :
One of the fields which needs the most security is Ad hoc Network (ANET). The term ANET guarantees that there is no central authority so as to administer the signals. Security is a basic issue while using ANET for establishing communication. A ANET is an assortment of remote signals that can progressively be set up at anyplace and whenever without utilizing any prior system framework. Because of its volatile nature, it has mobility issues to improve the arrangement of the system. One of the difficulties is to recognize the malicious signals in the system. Because of malicious signals, data los
Styles APA, Harvard, Vancouver, ISO, etc.
2

Gao, Feng, Yun Wu, and Shang Qiong Lu. "LabVIEW-Based Virtual Laboratory for Digital Signal Processing." Advanced Materials Research 268-270 (July 2011): 2150–57. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.2150.

Texte intégral
Résumé :
Based on National Instruments LabVIEW 2009, a network-edition virtual laboratory for digital signal processing (DSP) has been developed. Which is composed of three functional modules, that is, virtual experiment table, information management, and network communication. Hereinto, virtual experiment table is composed of two sub-modules, i.e. resource & document and simulation experiment; information management module is composed of four sub-modules, i.e. database, user registration, security verification and system management; network communication module is implemented by LabVIEW Web Server
Styles APA, Harvard, Vancouver, ISO, etc.
3

Kumar, Dr A. Pradeep. "Radar Based Security System Alert." International Journal for Research in Applied Science and Engineering Technology 12, no. 6 (2024): 2484–88. http://dx.doi.org/10.22214/ijraset.2024.63509.

Texte intégral
Résumé :
Abstract: Radar-based security systems are now a reliable option for both intruder detection and perimeter defence. This research presents a unique approach to integrate state-of-the-art signal processing methods to improve the performance of such systems. The suggested system tracks and detects moving objects inside an established region using radar technology. The system utilizes advanced processing of signals methods, such as fuzzy logic, neural networks, and wavelet analysis, to differentiate between everyday activities and possible security risks. The network of radar sensors that are pla
Styles APA, Harvard, Vancouver, ISO, etc.
4

Zhang, Hongwei, Haiyan Wang, Xuanming Liang, Yongsheng Yan, and Xiaohong Shen. "Remote passive acoustic signal detection using multi-scale correlation networks and network spectrum distance in marine environment." Journal of the Acoustical Society of America 154, no. 3 (2023): 1563–76. http://dx.doi.org/10.1121/10.0020907.

Texte intégral
Résumé :
Detecting acoustic signals in the ocean is crucial for port and coastal security, but existing methods often require informative priors. This paper introduces a new approach that transforms acoustic signal detection into network characterization using a MCN construction method. The method constructs a network representation of the acoustic signal by measuring pairwise correlations at different time scales. It proposes a network spectrum distance method that combines information geometry and graph signal processing theory to characterize these complex networks. By comparing the spectra of two n
Styles APA, Harvard, Vancouver, ISO, etc.
5

S.K., Rajesh, Mary P. Varghese, Lisa C, Rajkumar P, and Winson Rajaian. "SECURE SIGNAL PROCESSING FOR 6G LEO SATELLITE NETWORKS: A DEEP LEARNING APPROACH USING DRIVEN SECURE CHANNEL ESTIMATION MODEL." ICTACT Journal on Communication Technology 16, no. 1 (2025): 3413–18. https://doi.org/10.21917/ijct.2025.0506.

Texte intégral
Résumé :
The rapid evolution of 6G low Earth orbit (LEO) satellite networks presents new challenges in ensuring secure and efficient signal processing at the physical layer. The integration of massive connectivity, dynamic channel variations, and potential eavesdropping threats necessitates robust security mechanisms. Traditional channel estimation techniques struggle to adapt to the highly dynamic nature of LEO satellite channels, leading to degraded performance in secure communications. To address these challenges, a Secure Channel Estimation Model (SCEM) is proposed, leveraging Channel State Informa
Styles APA, Harvard, Vancouver, ISO, etc.
6

Elliot, Kizzy N., and Levi A.S Damingo. "Application of Blockchain Technology for Secure Signal Processing." Recent Innovations in Wireless Network Security 6, no. 2 (2024): 19–31. https://doi.org/10.5281/zenodo.10683541.

Texte intégral
Résumé :
<em>Blockchain technology is the modern-day solution for trust issues and eliminating or minimizing the role of the third party. In the context of signal processing with the attendant risk of intrusion and distortion of signal and data transmitted in the cloud computing environment, it expedient for the implementation of a more proactive, robust and secure framework to ensure integrity of the data transmitted irrespective of the domain. Using a systematic review methodology, the paper reviewed the efficiency of the application of blockchain technology for secure signal processing in a cloud-co
Styles APA, Harvard, Vancouver, ISO, etc.
7

Xue, Lian, and Cheng-song Hu. "A Vibration Signal Processing of Large-scale Structural Systems Based on Wireless Sensor." International Journal of Online Engineering (iJOE) 13, no. 05 (2017): 43. http://dx.doi.org/10.3991/ijoe.v13i05.7050.

Texte intégral
Résumé :
The inherent characteristics of large-scale structural system are also called modal parameters, which include natural frequency, damping ratio and vibration mode. They are the basis for analyzing dynamic characteristics of large-scale structural system. Modal Parameter Identification is a modern method, and it is used to identify the vibration signals. At present, the problem of large-scale structural system security is paid more and more attention to, so the method of modal parameter recognition is very significant. A fast integral method is put forward to eliminate the trend item of vibratio
Styles APA, Harvard, Vancouver, ISO, etc.
8

Asiya, E. Asiya, and U. Onuu Michael. "Design of a Security Wireless Sensor Network for Emergency Response Centers (SWiSNERC)." Journal of Network Security and Data Mining 3, no. 3 (2020): 1–14. https://doi.org/10.5281/zenodo.4280334.

Texte intégral
Résumé :
<em>The design and implementation of a security wireless sensor network capable of detecting physical intrusion was achieved following a survey of personal area networks and mesh networking. The security network engaged sensor nodes fortified with motion sensors and accelerometers. The sensor characteristics were analyzed and found useful for the design of security wireless sensor network in Cross River State Emergency Response Centre (ERC), in the Federal Republic of Nigeria, for examining and optimizing the State&rsquo;s environs. Technology trends that influence the advancement of such netw
Styles APA, Harvard, Vancouver, ISO, etc.
9

Cao, Yunyu, Jinrui Tang, Shaohui Shi, Defu Cai, Li Zhang, and Ping Xiong. "Fault Diagnosis Techniques for Electrical Distribution Network Based on Artificial Intelligence and Signal Processing: A Review." Processes 13, no. 1 (2024): 48. https://doi.org/10.3390/pr13010048.

Texte intégral
Résumé :
This paper provides a comprehensive and systematic review of fault diagnosis methods based on artificial intelligence (AI) in smart distribution networks described in the literature. For the first time, it systematically combs through the main fault diagnosis objectives and corresponding fault diagnosis methods for a smart distribution network from the perspective of combined signal processing and artificial intelligence algorithms. The paper provides an in-depth analysis of the advantages and disadvantages of various signal processing techniques and intelligent algorithms in different fault d
Styles APA, Harvard, Vancouver, ISO, etc.
10

Cheng, Jie, Bingjie Lin, Jiahui Wei, and Ang Xia. "The Compound Prediction Analysis of Information Network Security Situation based on Support Vector Combined with BP Neural Network Learning Algorithm." International Journal of Circuits, Systems and Signal Processing 16 (January 13, 2022): 489–96. http://dx.doi.org/10.46300/9106.2022.16.60.

Texte intégral
Résumé :
In order to solve the problem of low security of data in network transmission and inaccurate prediction of future security situation, an improved neural network learning algorithm is proposed in this paper. The algorithm makes up for the shortcomings of the standard neural network learning algorithm, eliminates the redundant data by vector support, and realizes the effective clustering of information data. In addition, the improved neural network learning algorithm uses the order of data to optimize the "end" data in the standard neural network learning algorithm, so as to improve the accuracy
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Thèses sur le sujet "Signal processing for network security"

1

Lu, Xiaotao. "Cost-effective signal processing algorithms for physical-layer security in wireless networks." Thesis, University of York, 2016. http://etheses.whiterose.ac.uk/16043/.

Texte intégral
Résumé :
Data privacy in traditional wireless communications is accomplished by cryptography techniques at the upper layers of the protocol stack. This thesis aims at contributing to the critical security issue residing in the physical-layer of wireless networks, namely, secrecy rate in various transmission environments. Physical-layer security opens the gate to the exploitation of channel characteristics to achieve data secure transmission. Precoding techniques, as a critical aspect in pre-processing signals prior to transmission has become an effective approach and recently drawn significant attentio
Styles APA, Harvard, Vancouver, ISO, etc.
2

Di, Mauro Mario. "Statistical models for the characterization, identification and mitigation of distributed attacks in data networks." Doctoral thesis, Universita degli studi di Salerno, 2018. http://hdl.handle.net/10556/3088.

Texte intégral
Résumé :
2016 - 2017<br>The thesis focuses on statistical approaches to model, mitigate, and prevent distributed network attacks. When dealing with distributed network attacks (and, more in general, with cyber-security problems), three fundamental phases/issues emerge distinctly. The first issue concerns the threat propagation across the network, which entails an "avalanche" effect, with the number of infected nodes increasing exponentially as time elapses. The second issue regards the design of proper mitigation strategies (e.g., threat detection, attacker's identification) aimed at containing t
Styles APA, Harvard, Vancouver, ISO, etc.
3

Mynampati, Vittal Reddy, Dilip Kandula, Raghuram Garimilla, and Kalyan Srinivas. "Performance and Security of Wireless Mesh Networks." Thesis, Blekinge Tekniska Högskola, Avdelningen för telekommunikationssystem, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2901.

Texte intégral
Résumé :
The thesis aims to find issues that may affect the performance of meshed wireless networks. There is no denying the fact that out of the wireless technologies being used in today’s environment, the wireless meshed technology is one of the most advanced and can be viewed as the technology of the future. This thesis deals closely with aspects like throughput, security and performance as these metrics have a direct influence on the performance of the wireless mesh.The thesis is subdivided into various categories explaining the primary structure of wireless mesh networks. Performance of the networ
Styles APA, Harvard, Vancouver, ISO, etc.
4

Xu, Jingxin. "Unusual event detection in crowded scenes." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/76365/1/Jingxin_Xu_Thesis.pdf.

Texte intégral
Résumé :
Novel computer vision techniques have been developed to automatically detect unusual events in crowded scenes from video feeds of surveillance cameras. The research is useful in the design of the next generation intelligent video surveillance systems. Two major contributions are the construction of a novel machine learning model for multiple instance learning through compressive sensing, and the design of novel feature descriptors in the compressed video domain.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Moore, Patrick. "Architectural investigation into network security processing." Thesis, Queen's University Belfast, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.492519.

Texte intégral
Résumé :
In this thesis, innovative techniques for accelerating and scaling cryptographic architectures for the provision of network security are presented. The first of these is a novel ASIP based interface, which allows for generic hardware block cipher cores to be used within a 32-bit ASIP platform. An example system consisting of the Altera Nios-II and an AES block cipher is described and how the interface can be extended to support additional encryption modes of operation is discussed. A figure of merit that can be utilised to determine the efficiency of interfaces is proposed. Following on from t
Styles APA, Harvard, Vancouver, ISO, etc.
6

Zhao, Wentao. "Genomic applications of statistical signal processing." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2952.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Liu, Jinshan. "Secure and reliable deep learning in signal processing." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/103740.

Texte intégral
Résumé :
In conventional signal processing approaches, researchers need to manually extract features from raw data that can better describe the underlying problem. Such a process requires strong domain knowledge about the given problems. On the contrary, deep learning-based signal processing algorithms can discover features and patterns that would not be apparent to humans by feeding a sufficient amount of training data. In the past decade, deep learning has proved to be efficient and effective at delivering high-quality results. Deep learning has demonstrated its great advantages in image processing
Styles APA, Harvard, Vancouver, ISO, etc.
8

Farhat, Md Tanzin. "An Artificial Neural Network based Security Approach of Signal Verification in Cognitive Radio Network." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo153511563131623.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

CARDOSO, LUIZ ALBERTO LISBOA DA SILVA. "ANALYSIS OF PLASTIC NEURAL NETWORK MODELLING APPROACH TO SIGNAL PROCESSING." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 1992. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=9512@1.

Texte intégral
Résumé :
MARINHA DO BRASIL<br>Os modelos plásticos de redes neurais são estudados e avaliados como uma interessante abordagem da neurocomputação ao processamento de sinais. Dentre estes, o modelo SONN, recentemente proposto por Tenório e Lee, é revisado e adotado como base para a implementação de um ambiente interativo de prototipagem e análise de redes, dada sua reduzida carga heurística. Como ilustração de seu emprego, um problema de detecção e classificação de sinais pulsados é solucionado, com resultados que preliminarmente indicam a adequação do modelo como ferramenta na filtragem não-li
Styles APA, Harvard, Vancouver, ISO, etc.
10

Harper, Scott Jeffery. "A Secure Adaptive Network Processor." Diss., Virginia Tech, 2003. http://hdl.handle.net/10919/28023.

Texte intégral
Résumé :
Network processors are becoming a predominant feature in the field of network hardware. As new network protocols emerge and data speeds increase, contemporary general-purpose network processors are entering their second generation and academic research is being actively conducted into new techniques for the design and implementation of these systems. At the same time, systems ranging from secured military communications equipment to consumer devices are being updated to provide network connectivity. Many of these devices require, or would benefit from, the inclusion of device security in addit
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Livres sur le sujet "Signal processing for network security"

1

International, Conference on Intelligent Information Hiding and Multimedia Signal Processing (4th 2008 Harbin Shi China). IIH-MSP 2008 : 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing : 15-17 August 2008, Harbin, China. IEEE Computer Society, 2008.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2nd 2006 Pasadena, Calif.). 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing: (IIH-MSP 2006) : proceedings ; 18-20 December, 2006, Pasadena, California, USA. IEEE Computer Society, 2006.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Pathak, Manas A. Privacy-Preserving Machine Learning for Speech Processing. Springer New York, 2013.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

International, Conference on E.-business and Telecommunication Networks (4th 2007 Barcelona Spain). E-business and telecommunications: 4th international conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, revised selected papers. Springer, 2008.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

International, Conference on E.-business and Telecommunication Networks (4th 2007 Barcelona Spain). E-business and telecommunications: 4th international conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, revised selected papers. Springer, 2008.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

International, Conference on E.-business and Telecommunication Networks (4th 2007 Barcelona Spain). E-business and telecommunications: 4th international conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, revised selected papers. Springer, 2008.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Dey, Nilanjan, and V. Santhi, eds. Intelligent Techniques in Signal Processing for Multimedia Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-44790-2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Iacobucci, Maria Stella. Reconfigurable radio systems: Network architectures and standards. John Wiley & Sons, Ltd Publication, 2013.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Takanami, Tetsuo, and Genshiro Kitagawa. Methods and Applications of Signal Processing in Seismic Network Operations. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/bfb0117693.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

missing], [name. Methods and applications of signal processing in seismic network operations. Springer, 2003.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Chapitres de livres sur le sujet "Signal processing for network security"

1

Wang, Wenting, Xin Liu, Xiaohong Zhao, Yang Zhao, Rui Wang, and Jianpo Li. "Design of Intelligent Substation Communication Network Security Audit System." In Advances in Intelligent Information Hiding and Multimedia Signal Processing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6420-2_48.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Wang, Wenting, Guilin Huang, Xin Liu, Hao Zhang, Rui Wang, and Jianpo Li. "Research on Security Auditing Scheme of Intelligent Substation Communication Network." In Advances in Intelligent Information Hiding and Multimedia Signal Processing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6420-2_49.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Sawlikar, Alka P., Z. J. Khan, and S. G. Akojwar. "Parametric Evaluation of Different Cryptographic Techniques for Enhancement of Energy Efficiency in Wireless Communication Network." In Intelligent Techniques in Signal Processing for Multimedia Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44790-2_9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Liu, Xin, He Wang, Xi Li, et al. "Research Review on Security Protection Scheme of Distributed Photovoltaic Grid-Connected Network." In Advances in Intelligent Information Hiding and Multimedia Signal Processing. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-0105-0_13.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Gao, Lifang, Zhihui Wang, Huifeng Yang, et al. "Network Security Situation Assessment of Power Information System Based on Improved Artificial Bee Colony Algorithm." In Advances in Intelligent Information Hiding and Multimedia Signal Processing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6420-2_42.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Yang, Yong, Jilin Wang, Rong Li, and Jinxiong Zhao. "Review of Constructing the Early Warning and Diagnosis Information Database of Power Plant Network Security Events." In 3D Imaging Technologies—Multidimensional Signal Processing and Deep Learning. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3180-1_37.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Wu, Ji, Qilian Liang, Baoju Zhang, and Xiaorong Wu. "Security Analysis of Distributed Compressive Sensing-Based Wireless Sensor Networks." In The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems. Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-00536-2_5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Benesty, Jacob, Tomas Gänsler, Dennis R. Morgan, M. Mohan Sondhi, and Steven L. Gay. "Dynamic Resource Allocation for Network Echo Cancellation." In Digital Signal Processing. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/978-3-662-04437-7_4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Marks, Friedrich, Ursula Klingmüller, and Karin Müller-Decker. "Supplying the Network with Energy: Basic Biochemistry of Signal Transduction." In Cellular Signal Processing. Garland Science, 2017. http://dx.doi.org/10.4324/9781315165479-2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Khattab, Ahmed, Zahra Jeddi, Esmaeil Amini, and Magdy Bayoumi. "RBS Security Analysis." In Analog Circuits and Signal Processing. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47545-5_5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Signal processing for network security"

1

Ribeiro Sena, Matheus, Abdelrahmane Moawad, Robert Emmerich, et al. "Beyond Optical Layer Monitoring: Exploring the Full Potential of Coherent Signal Processing." In Optical Fiber Communication Conference. Optica Publishing Group, 2025. https://doi.org/10.1364/ofc.2025.m4a.6.

Texte intégral
Résumé :
Extracting information from Rx-DSP can revolutionize optical fiber network monitoring. Beyond monitoring, it enhances QoT estimation, digital twin modeling, and network security. This talk explores the broader potential of coherent signal processing for optical networks. Full-text article not available; see video presentation
Styles APA, Harvard, Vancouver, ISO, etc.
2

Ferraro, Antonino, Valerio La Gatta, and Marco Postiglione. "Empowering Network Security with Autoencoders." In 2024 IEEE International Conference on Acoustics, Speech, and Signal Processing Workshops (ICASSPW). IEEE, 2024. http://dx.doi.org/10.1109/icasspw62465.2024.10627534.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Harsha Vardhan, S., Mahesh Kumar Jha, Raveesh Hegde, Monika Singh, P. Rubini, and Amar Choudhary. "Security and Threats in Aviation: Cryptographic Based Network Security System." In 2024 International Conference on Signal Processing and Advance Research in Computing (SPARC). IEEE, 2024. https://doi.org/10.1109/sparc61891.2024.10828771.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Huang, Yingchun, Fangshi Wu, and Xianxin Wei. "Network Security State Evaluation Based on BP Network Improved Fuzzy Evaluation Membership Function." In 2024 2nd International Conference on Signal Processing and Intelligent Computing (SPIC). IEEE, 2024. http://dx.doi.org/10.1109/spic62469.2024.10691585.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Malik, Shivank, and Samaresh Bera. "Security-as-a-Function in 5G Network: Implementation and Performance Evaluation." In 2024 International Conference on Signal Processing and Communications (SPCOM). IEEE, 2024. http://dx.doi.org/10.1109/spcom60851.2024.10631599.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Lin, Jia, Xiaoya Yang, Dingying Tan, Huiling Liu, and Pingping Chen. "Research and Application of Situational Awareness in Hospital Network Security." In 2024 4th International Signal Processing, Communications and Engineering Management Conference (ISPCEM). IEEE, 2024. https://doi.org/10.1109/ispcem64498.2024.00011.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Sun, Weize, Yonglong Zhang, Shaowu Chen, Lei Huang, and Jundong Qi. "Lightweight Target Detection Network for Security Radar and FPGA Acceleration." In 2024 7th International Conference on Information Communication and Signal Processing (ICICSP). IEEE, 2024. https://doi.org/10.1109/icicsp62589.2024.10809057.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Zhou, Yue, Zihan Gao, Xiaotong Zhou, and Xuanyu Li. "Design of Network Security Intrusion Detection System Based on NIDSeqFormer Framework." In 2024 2nd International Conference on Signal Processing and Intelligent Computing (SPIC). IEEE, 2024. http://dx.doi.org/10.1109/spic62469.2024.10691405.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Sharath, T., and A. Muthukumaravel. "Enhancing Network Security: Deep Learning-Powered Intrusion Detection with Data Engineering Techniques." In 2024 IEEE International Conference on Communication, Computing and Signal Processing (IICCCS). IEEE, 2024. http://dx.doi.org/10.1109/iicccs61609.2024.10763674.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Li, Zhiqi, Jie Cheng, Qin Yin, Ang Xia, Lijing Yan, and Shuai Li. "Knowledge Graph Construction of Network Security Domain Based on Bi-LSTM-GNN." In 2024 2nd International Conference on Signal Processing and Intelligent Computing (SPIC). IEEE, 2024. http://dx.doi.org/10.1109/spic62469.2024.10691407.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Signal processing for network security"

1

Tong, Lang. Network-Centric Distributed Signal Processing. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada519513.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Tayeb, Shahab. Taming the Data in the Internet of Vehicles. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2014.

Texte intégral
Résumé :
As an emerging field, the Internet of Vehicles (IoV) has a myriad of security vulnerabilities that must be addressed to protect system integrity. To stay ahead of novel attacks, cybersecurity professionals are developing new software and systems using machine learning techniques. Neural network architectures improve such systems, including Intrusion Detection System (IDSs), by implementing anomaly detection, which differentiates benign data packets from malicious ones. For an IDS to best predict anomalies, the model is trained on data that is typically pre-processed through normalization and f
Styles APA, Harvard, Vancouver, ISO, etc.
3

Author, Unknown. DTRS56-02-T-0005 Digital Mapping of Buried Pipelines with a Dual Array System. Pipeline Research Council International, Inc. (PRCI), 2005. http://dx.doi.org/10.55274/r0011943.

Texte intégral
Résumé :
The technical goal of the Dual Array Project was to develop new technology for non-invasive mapping of buried pipelines, down to depths of 10 meters or more, using modern electromagnetic sensors and signal processing. A major proposed innovation in the work was the integration of the sensor arrays and software into a mobile system capable of mapping underground utility networks (and other buried infrastructure) efficiently over large areas. Ultimately, the goal is to have a non-invasive system that can produce an accurate infrastructure map of an entire urban or suburban utility network in dig
Styles APA, Harvard, Vancouver, ISO, etc.
4

Friedman, Haya, Julia Vrebalov, and James Giovannoni. Elucidating the ripening signaling pathway in banana for improved fruit quality, shelf-life and food security. United States Department of Agriculture, 2014. http://dx.doi.org/10.32747/2014.7594401.bard.

Texte intégral
Résumé :
Background : Banana being a monocot and having distinct peel and pulp tissues is unique among the fleshy fruits and hence can provide a more comprehensive understanding of fruit ripening. Our previous research which translated ripening discoveries from tomato, led to the identification of six banana fruit-associated MADS-box genes, and we confirmed the positive role of MaMADS1/2 in banana ripening. The overall goal was to further elucidate the banana ripening signaling pathway as mediated by MADS-boxtranscriptional regulators. Specific objectives were: 1) characterize transcriptional profiles
Styles APA, Harvard, Vancouver, ISO, etc.
5

Kwon, Heeseo Rain, HeeAh Cho, Jongbok Kim, Sang Keon Lee, and Donju Lee. International Case Studies of Smart Cities: Namyangju, Republic of Korea. Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0007014.

Texte intégral
Résumé :
This case study is one of ten international studies developed by the Korea Research Institute for Human Settlements (KRIHS), in association with the Inter-American Development Bank (IDB), for the cities of Anyang, Medellin, Namyangju, Orlando, Pangyo, Rio de Janeiro, Santander, Singapore, Songdo, and Tel Aviv. At the IDB, the Competitiveness and Innovation Division (CTI), the Fiscal and Municipal Management Division (FMM), and the Emerging and Sustainable Cities Initiative (ESCI) coordinated the study. This project was part of technical cooperation ME-T1254, financed by the Knowledge Partnersh
Styles APA, Harvard, Vancouver, ISO, etc.
6

Phillips, Paul. The Application of Satellite-based Internet of Things for New Mobility. SAE International, 2024. http://dx.doi.org/10.4271/epr2024001.

Texte intégral
Résumé :
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;With the increased use of devices requiring the Internet of Things (IoT) to enable “New Mobility,” the demand for satellite-enabled IoT is growing steadily, owing to the extensive coverage provided by satellites (over existing ground-based infrastructure). Satellite-based IoT provides precise and real-time vehicle location and tracking services, large-scale geographical vehicle and/or infrastructure monitoring, and increased coverage for remote locations where it may not be possible to install ground-based solutions.&lt;
Styles APA, Harvard, Vancouver, ISO, etc.
7

Irudayaraj, Joseph, Ze'ev Schmilovitch, Amos Mizrach, Giora Kritzman, and Chitrita DebRoy. Rapid detection of food borne pathogens and non-pathogens in fresh produce using FT-IRS and raman spectroscopy. United States Department of Agriculture, 2004. http://dx.doi.org/10.32747/2004.7587221.bard.

Texte intégral
Résumé :
Rapid detection of pathogens and hazardous elements in fresh fruits and vegetables after harvest requires the use of advanced sensor technology at each step in the farm-to-consumer or farm-to-processing sequence. Fourier-transform infrared (FTIR) spectroscopy and the complementary Raman spectroscopy, an advanced optical technique based on light scattering will be investigated for rapid and on-site assessment of produce safety. Paving the way toward the development of this innovative methodology, specific original objectives were to (1) identify and distinguish different serotypes of Escherichi
Styles APA, Harvard, Vancouver, ISO, etc.
8

Federal Information Processing Standards Publication: guideline for the analysis of local area network security. National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.fips.191.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!