Articles de revues sur le sujet « Signal processing for network security »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Signal processing for network security ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.
Alapati, Yaswanth Kumar, and Suban Ravichandran. "An Efficient Signal Processing Model for Malicious Signal Identification and Energy Consumption Reduction for Improving Data Transmission Rate." Traitement du Signal 38, no. 3 (2021): 837–43. http://dx.doi.org/10.18280/ts.380330.
Texte intégralGao, Feng, Yun Wu, and Shang Qiong Lu. "LabVIEW-Based Virtual Laboratory for Digital Signal Processing." Advanced Materials Research 268-270 (July 2011): 2150–57. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.2150.
Texte intégralXue, Lian, and Cheng-song Hu. "A Vibration Signal Processing of Large-scale Structural Systems Based on Wireless Sensor." International Journal of Online Engineering (iJOE) 13, no. 05 (2017): 43. http://dx.doi.org/10.3991/ijoe.v13i05.7050.
Texte intégralCheng, Jie, Bingjie Lin, Jiahui Wei, and Ang Xia. "The Compound Prediction Analysis of Information Network Security Situation based on Support Vector Combined with BP Neural Network Learning Algorithm." International Journal of Circuits, Systems and Signal Processing 16 (January 13, 2022): 489–96. http://dx.doi.org/10.46300/9106.2022.16.60.
Texte intégralXiang, Zhongwu, Weiwei Yang, Gaofeng Pan, Yueming Cai, and Yi Song. "Physical Layer Security in Cognitive Radio Inspired NOMA Network." IEEE Journal of Selected Topics in Signal Processing 13, no. 3 (2019): 700–714. http://dx.doi.org/10.1109/jstsp.2019.2902103.
Texte intégralDemidov, R. A., P. D. Zegzhda, and M. O. Kalinin. "Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model." Automatic Control and Computer Sciences 52, no. 8 (2018): 971–76. http://dx.doi.org/10.3103/s0146411618080084.
Texte intégralJi, Cheongmin, Taehyoung Ko, and Manpyo Hong. "CA-CRE: Classification Algorithm-Based Controller Area Network Payload Format Reverse-Engineering Method." Electronics 10, no. 19 (2021): 2442. http://dx.doi.org/10.3390/electronics10192442.
Texte intégralTu, Jun, Willies Ogola, Dehong Xu, and Wei Xie. "Intrusion Detection Based on Generative Adversarial Network of Reinforcement Learning Strategy for Wireless Sensor Networks." International Journal of Circuits, Systems and Signal Processing 16 (January 13, 2022): 478–82. http://dx.doi.org/10.46300/9106.2022.16.58.
Texte intégralPeng, Qi Hua. "An Improved Abnormal Behavior Feature Detection Algorithm of Network Information Based on Fractional Fourier Transform." Applied Mechanics and Materials 513-517 (February 2014): 2408–11. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2408.
Texte intégralAhmed, Aseel K., and Abbas Akram Khorsheed. "Open network structure and smart network to sharing cybersecurity within the 5G network." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 1 (2022): 573. http://dx.doi.org/10.11591/ijeecs.v27.i1.pp573-582.
Texte intégralLin, Bingjie, Jie Cheng, Jiahui Wei, and Ang Xia. "A Sensing Method of Network Security Situation Based on Markov Game Model." International Journal of Circuits, Systems and Signal Processing 16 (January 14, 2022): 531–36. http://dx.doi.org/10.46300/9106.2022.16.66.
Texte intégralLee, Sanguk, Incheol Jeong, and Woo-Geun Ahn. "Study on Search and Rescue System for Military and Civil use by using COSPAS SARSAT and Terrestrial Communication Network." E3S Web of Conferences 94 (2019): 01018. http://dx.doi.org/10.1051/e3sconf/20199401018.
Texte intégralBehlilovic, Narves. "One Approach to Improving Smart Environment Communication via the Security Parameter." International Journal of Embedded and Real-Time Communication Systems 13, no. 1 (2022): 1–30. http://dx.doi.org/10.4018/ijertcs.313042.
Texte intégralTefera, Mulugeta Kassaw, Zengwang Jin, and Shengbing Zhang. "A Review of Fundamental Optimization Approaches and the Role of AI Enabling Technologies in Physical Layer Security." Sensors 22, no. 9 (2022): 3589. http://dx.doi.org/10.3390/s22093589.
Texte intégralHe, Jialuan, Zirui Xing, Tianqi Xiang, et al. "Wireless Signal Propagation Prediction Based on Computer Vision Sensing Technology for Forestry Security Monitoring." Sensors 21, no. 17 (2021): 5688. http://dx.doi.org/10.3390/s21175688.
Texte intégralWichary, Tomasz, Jordi Mongay Batalla, Constandinos X. Mavromoustakis, Jerzy Żurek, and George Mastorakis. "Network Slicing Security Controls and Assurance for Verticals." Electronics 11, no. 2 (2022): 222. http://dx.doi.org/10.3390/electronics11020222.
Texte intégralWang, Huan, Jian Gu, Jianping Zhao, et al. "Prediction Method of Network Security Situation Based on GA-LSSVM Time Series Analysis." Advances in Modelling and Analysis B 60, no. 2 (2017): 372–90. http://dx.doi.org/10.18280/ama_b.600208.
Texte intégralLazaar, Saiida. "Contribution of wavelets to cybersecurity: Intrusion detection systems using neural networks." General Letters in Mathematics 10, no. 2 (2021): 24–30. http://dx.doi.org/10.31559/glm2021.10.2.2.
Texte intégralLafia, Diafale, Mistura Laide Sanni, Rasheed Ayodeji Adetona, Bodunde Odunola Akinyemi, and Ganiyu Adesola Aderounmu. "Signal Processing-based Model for Primary User Emulation Attacks Detection in Cognitive Radio Networks." Journal of Computing and Information Technology 29, no. 2 (2022): 77–88. http://dx.doi.org/10.20532/cit.2021.1005297.
Texte intégralKalinin, M. O., and A. A. Minin. "Security evaluation of a wireless ad-hoc network with dynamic topology." Automatic Control and Computer Sciences 51, no. 8 (2017): 899–901. http://dx.doi.org/10.3103/s0146411617080119.
Texte intégralDu, Zhiqiang, Haitao Yao, Yanfang Fu, Zijian Cao, Hongtao Liang, and Jinkang Ren. "Network Situation Assessment Method Based on Improved BP Neural Network." Electronics 12, no. 3 (2023): 483. http://dx.doi.org/10.3390/electronics12030483.
Texte intégralKhonde, Shraddha R., and Venugopal Ulagamuthalvi. "Hybrid Architecture for Distributed Intrusion Detection System Using Semi-supervised Classifiers in Ensemble Approach." Advances in Modelling and Analysis B 63, no. 1-4 (2020): 10–19. http://dx.doi.org/10.18280/ama_b.631-403.
Texte intégralHeo, Jeonghwan, and Jechang Jeong. "Deceptive Techniques to Hide a Compressed Video Stream for Information Security." Sensors 21, no. 21 (2021): 7200. http://dx.doi.org/10.3390/s21217200.
Texte intégralSong, Wenzhan, Fangyu Li, Maria Valero, and Liang Zhao. "Toward Creating a Subsurface Camera." Sensors 19, no. 2 (2019): 301. http://dx.doi.org/10.3390/s19020301.
Texte intégralOlanrewaju, Rashidah Funke, Burhan Ul Islam Khan, Miss Laiha Binti Mat Kiah, Nor Aniza Abdullah, and Khang Wen Goh. "Decentralized Blockchain Network for Resisting Side-Channel Attacks in Mobility-Based IoT." Electronics 11, no. 23 (2022): 3982. http://dx.doi.org/10.3390/electronics11233982.
Texte intégralChen, Xiangqian, Kia Makki, Kang Yen, and Niki Pissinou. "Attack Distribution Modeling and Its Applications in Sensor Network Security." EURASIP Journal on Wireless Communications and Networking 2008 (2008): 1–11. http://dx.doi.org/10.1155/2008/754252.
Texte intégralAngelini, Marco, Graziano Blasilli, Tiziana Catarci, Simone Lenti, and Giuseppe Santucci. "Vulnus: Visual Vulnerability Analysis for Network Security." IEEE Transactions on Visualization and Computer Graphics 25, no. 1 (2019): 183–92. http://dx.doi.org/10.1109/tvcg.2018.2865028.
Texte intégralKhatri, Narayan, Rakesh Shrestha, and Seung Yeob Nam. "Security Issues with In-Vehicle Networks, and Enhanced Countermeasures Based on Blockchain." Electronics 10, no. 8 (2021): 893. http://dx.doi.org/10.3390/electronics10080893.
Texte intégralAl Ahmed, Mahmoud Tayseer, Fazirulhisyam Hashim, Shaiful Jahari Hashim, and Azizol Abdullah. "Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks." Electronics 12, no. 4 (2023): 867. http://dx.doi.org/10.3390/electronics12040867.
Texte intégralDasic, Dejan, Miljan Vucetic, Nemanja Ilic, Milos Stankovic, and Marko Beko. "Application of deep learning algorithms and architectures in the new generation of mobile networks." Serbian Journal of Electrical Engineering 18, no. 3 (2021): 397–426. http://dx.doi.org/10.2298/sjee2103397d.
Texte intégralLi, Wenchao, Ping Yi, Yue Wu, Li Pan, and Jianhua Li. "A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network." Journal of Electrical and Computer Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/240217.
Texte intégralZhu, Ying, Caixia Liu, Wei You, Yiming Zhang, and Weicheng Zhang. "A Business Process-Based Security Enhancement Scheme for the Network Function Service Access Procedure in the 5G Core Network." Electronics 12, no. 3 (2023): 576. http://dx.doi.org/10.3390/electronics12030576.
Texte intégralD.N., Kolegov. "DP-MODEL APPLICATION FOR NETWORK SECURITY ANALYSIS." Prikladnaya diskretnaya matematika, no. 1 (June 1, 2008): 71–87. http://dx.doi.org/10.17223/20710410/1/12.
Texte intégralChen, Yue, Zi-Long Wu, and Ying-Ke Lei. "Individual Identification of Radar Emitters Based on a One-Dimensional LeNet Neural Network." Symmetry 13, no. 7 (2021): 1215. http://dx.doi.org/10.3390/sym13071215.
Texte intégralLavrova, D. S., I. V. Alekseev, and A. A. Shtyrkina. "Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation." Automatic Control and Computer Sciences 52, no. 8 (2018): 931–35. http://dx.doi.org/10.3103/s0146411618080187.
Texte intégralStatkus, Arūnas, Šarūnas Paulikas, and Audrius Krukonis. "TCP Acknowledgment Optimization in Low Power and Embedded Devices." Electronics 10, no. 6 (2021): 639. http://dx.doi.org/10.3390/electronics10060639.
Texte intégralZhu, Zhen, and Guofei Chai. "An Intrusion Intention Analysis Algorithm Based on Attack Graph." International Journal of Circuits, Systems and Signal Processing 15 (July 20, 2021): 643–50. http://dx.doi.org/10.46300/9106.2021.15.71.
Texte intégralHuang, Tongyuan, Jia Xu, Shixin Tu, and Baoru Han. "Robust zero-watermarking scheme based on a depthwise overparameterized VGG network in healthcare information security." Biomedical Signal Processing and Control 81 (March 2023): 104478. http://dx.doi.org/10.1016/j.bspc.2022.104478.
Texte intégralHameed, Bilal Hashim, Anmar Yahya Taher, Raed Khalid Ibrahim, Adnan Hussein Ali, and Yasser Adnan Hussein. "Based on mesh sensor network: design and implementation of security monitoring system with Bluetooth technology." Indonesian Journal of Electrical Engineering and Computer Science 26, no. 3 (2022): 1781. http://dx.doi.org/10.11591/ijeecs.v26.i3.pp1781-1790.
Texte intégralShi, Wei, Meichen Duan, Hui He, et al. "Location Adaptive Motion Recognition Based on Wi-Fi Feature Enhancement." Applied Sciences 13, no. 3 (2023): 1320. http://dx.doi.org/10.3390/app13031320.
Texte intégralMemon, Mudasar, Navrati Saxena, Abhishek Roy, and Dong Shin. "Backscatter Communications: Inception of the Battery-Free Era—A Comprehensive Survey." Electronics 8, no. 2 (2019): 129. http://dx.doi.org/10.3390/electronics8020129.
Texte intégralChugh, Neeraj, Geetam Singh Tomar, Robin Singh Bhadoria, and Neetesh Saxena. "A Novel Anomaly Behavior Detection Scheme for Mobile Ad Hoc Networks." Electronics 10, no. 14 (2021): 1635. http://dx.doi.org/10.3390/electronics10141635.
Texte intégralRehman, Attique Ur, Muhammad Sajid Mahmood, Shoaib Zafar, et al. "A Survey on MAC-Based Physical Layer Security over Wireless Sensor Network." Electronics 11, no. 16 (2022): 2529. http://dx.doi.org/10.3390/electronics11162529.
Texte intégralWang, Weizheng, Zhuo Deng, and Jin Wang. "Enhancing Sensor Network Security with Improved Internal Hardware Design." Sensors 19, no. 8 (2019): 1752. http://dx.doi.org/10.3390/s19081752.
Texte intégralAlgarni, Sultan, Fathy Eassa, Khalid Almarhabi, Abdullah Algarni, and Aiiad Albeshri. "BCNBI: A Blockchain-Based Security Framework for Northbound Interface in Software-Defined Networking." Electronics 11, no. 7 (2022): 996. http://dx.doi.org/10.3390/electronics11070996.
Texte intégralRuchkin, V. N., B. V. Kostrov, and V. A. Fulin. "Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture." Automatic Control and Computer Sciences 56, no. 8 (2022): 970–80. http://dx.doi.org/10.3103/s014641162208020x.
Texte intégralZhu, Mengyun, Ximin Fan, Weijing Liu, et al. "Artificial Intelligence-Based Echocardiographic Left Atrial Volume Measurement with Pulmonary Vein Comparison." Journal of Healthcare Engineering 2021 (December 6, 2021): 1–11. http://dx.doi.org/10.1155/2021/1336762.
Texte intégralMohtadzar, Nur Alia Athirah, and Shigeru Takayama. "Revelation of Body Behavior Based on Arm Motion Measurement in Wireless Body Area Network System." Applied Mechanics and Materials 833 (April 2016): 179–84. http://dx.doi.org/10.4028/www.scientific.net/amm.833.179.
Texte intégralSun, Hongzhe, Jian Wang, Chen Chen, Zhi Li, and Jinjin Li. "ISSA-ELM: A Network Security Situation Prediction Model." Electronics 12, no. 1 (2022): 25. http://dx.doi.org/10.3390/electronics12010025.
Texte intégralHussain, Muhammad Zunnurain, and Zurina Mohd Hanapi. "Efficient Secure Routing Mechanisms for the Low-Powered IoT Network: A Literature Review." Electronics 12, no. 3 (2023): 482. http://dx.doi.org/10.3390/electronics12030482.
Texte intégral