About 2,480,000 results
Open links in new tab
  1. Securing IoT and SDN systems using deep-learning based …

    Oct 1, 2023 · Block diagram of the proposed SATIDS system. If an attack occurs, it deduces the type of attack, whether it is DDOS/DOS, Backdoor, Injection, Mitm, Password, Ransomware, …

  2. A Novel Blockchain-Assisted Deep Learning Model For Secure

    Apr 27, 2024 · Our research work includes a blockchain-assisted secure, U-Net-based Fast R-CNN, as well as the assessment and prediction of the proposed approach on a large-scale …

  3. Blockchain security enhancement: an approach towards hybrid …

    Jan 11, 2024 · By using federated learning and homomorphic encryption, consensus mechanisms can detect anomalies and security breaches, improving the privacy and security of the entire …

  4. Block diagram of the proposed threat detection system for security

    A novel enhanced region proposal network and modified loss function: threat object detection in secure screening using deep learning

  5. Secure Healthcare Model Using Multi-Step Deep Q Learning

    Feb 5, 2024 · To ensure the security of IoT healthcare data against malware attack, DDoS attack, and intermediate attacks, the proposed method leverages deep learning algorithms, …

  6. In this article, we propose SecNet, an architecture that will allow safe data collection, computing, and sharing in the large-scale Internet world, with AI improved by plenty of data, and more …

  7. A Deep-Learning-Integrated Blockchain Framework for Securing

    Sep 18, 2023 · Specifically, first, we design a private blockchain-based secure communication among the IIoT entities using session-based mutual authentication and key agreement …

  8. Novel hybrid deep learning based cyber security threat detection …

    Threats like this have the potential to capture critical data, harming businesses' finances and reputations. We have suggested a hybrid Deep Learning (DL) strategy in this study to identify …

  9. • In existing system data protection mechanisms such as encryption was failed in securing the data from the attacker. • It does not verify whether the user was authorized or not. …

  10. Proposed system block diagram. | Download Scientific Diagram

    Sumaya Sanober in [6] proposed Deep Learning (DL) and ML techniques, i.e., the random forest method, to classify CCF detection. The rate of success was discovered to be 96.2%. ...

Refresh