Journal articles on the topic 'Signal processing for network security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Signal processing for network security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Alapati, Yaswanth Kumar, and Suban Ravichandran. "An Efficient Signal Processing Model for Malicious Signal Identification and Energy Consumption Reduction for Improving Data Transmission Rate." Traitement du Signal 38, no. 3 (2021): 837–43. http://dx.doi.org/10.18280/ts.380330.
Full textGao, Feng, Yun Wu, and Shang Qiong Lu. "LabVIEW-Based Virtual Laboratory for Digital Signal Processing." Advanced Materials Research 268-270 (July 2011): 2150–57. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.2150.
Full textKumar, Dr A. Pradeep. "Radar Based Security System Alert." International Journal for Research in Applied Science and Engineering Technology 12, no. 6 (2024): 2484–88. http://dx.doi.org/10.22214/ijraset.2024.63509.
Full textZhang, Hongwei, Haiyan Wang, Xuanming Liang, Yongsheng Yan, and Xiaohong Shen. "Remote passive acoustic signal detection using multi-scale correlation networks and network spectrum distance in marine environment." Journal of the Acoustical Society of America 154, no. 3 (2023): 1563–76. http://dx.doi.org/10.1121/10.0020907.
Full textS.K., Rajesh, Mary P. Varghese, Lisa C, Rajkumar P, and Winson Rajaian. "SECURE SIGNAL PROCESSING FOR 6G LEO SATELLITE NETWORKS: A DEEP LEARNING APPROACH USING DRIVEN SECURE CHANNEL ESTIMATION MODEL." ICTACT Journal on Communication Technology 16, no. 1 (2025): 3413–18. https://doi.org/10.21917/ijct.2025.0506.
Full textElliot, Kizzy N., and Levi A.S Damingo. "Application of Blockchain Technology for Secure Signal Processing." Recent Innovations in Wireless Network Security 6, no. 2 (2024): 19–31. https://doi.org/10.5281/zenodo.10683541.
Full textXue, Lian, and Cheng-song Hu. "A Vibration Signal Processing of Large-scale Structural Systems Based on Wireless Sensor." International Journal of Online Engineering (iJOE) 13, no. 05 (2017): 43. http://dx.doi.org/10.3991/ijoe.v13i05.7050.
Full textAsiya, E. Asiya, and U. Onuu Michael. "Design of a Security Wireless Sensor Network for Emergency Response Centers (SWiSNERC)." Journal of Network Security and Data Mining 3, no. 3 (2020): 1–14. https://doi.org/10.5281/zenodo.4280334.
Full textCao, Yunyu, Jinrui Tang, Shaohui Shi, Defu Cai, Li Zhang, and Ping Xiong. "Fault Diagnosis Techniques for Electrical Distribution Network Based on Artificial Intelligence and Signal Processing: A Review." Processes 13, no. 1 (2024): 48. https://doi.org/10.3390/pr13010048.
Full textCheng, Jie, Bingjie Lin, Jiahui Wei, and Ang Xia. "The Compound Prediction Analysis of Information Network Security Situation based on Support Vector Combined with BP Neural Network Learning Algorithm." International Journal of Circuits, Systems and Signal Processing 16 (January 13, 2022): 489–96. http://dx.doi.org/10.46300/9106.2022.16.60.
Full textR., Krithika, Nidhi S., and Sandhiya V. "A Review on Wireless Sensor Network." International Journal of Trend in Scientific Research and Development 2, no. 5 (2018): 2169–72. https://doi.org/10.31142/ijtsrd18244.
Full textRamachandra, H. V., Pundalik Chavan, S. Supreeth, et al. "Secured Wireless Network Based on a Novel Dual Integrated Neural Network Architecture." Journal of Electrical and Computer Engineering 2023 (September 28, 2023): 1–11. http://dx.doi.org/10.1155/2023/9390660.
Full textPoroshenko, Anton, and Andriy Kovalenko. "Audio signal transmission method in network-based audio analytics system." Innovative Technologies and Scientific Solutions for Industries, no. 4(26) (December 27, 2023): 58–67. http://dx.doi.org/10.30837/itssi.2023.26.058.
Full textChoi, Hyun-Sik. "Electromyogram (EMG) Signal Classification Based on Light-Weight Neural Network with FPGAs for Wearable Application." Electronics 12, no. 6 (2023): 1398. http://dx.doi.org/10.3390/electronics12061398.
Full textArshad, Muhammad, Liu Jianwei, Muhammad Khalid, Waqar Khalid, Yue Cao, and Fakhri Alam Khan. "Access authentication via blockchain in space information network." PLOS ONE 19, no. 3 (2024): e0291236. http://dx.doi.org/10.1371/journal.pone.0291236.
Full textOuyang, Yuhong, Man Li, Wenqian Kang, Xiangbei Che, and Ruixian Ye. "Distribution Network Security Situation Awareness Method Based on the Distribution Network Topology Layered Model." Journal of Electrical and Computer Engineering 2023 (April 25, 2023): 1–8. http://dx.doi.org/10.1155/2023/6775337.
Full textWang, Kexin, Yihong Gao, Mauro Dragone, Yvan Petillot, and Xu Wang. "A Deep Echo State Network-Based Novel Signal Processing Approach for Underwater Wireless Optical Communication System with PAM and OFDM Signals." Photonics 10, no. 7 (2023): 763. http://dx.doi.org/10.3390/photonics10070763.
Full textPeng, Qi Hua. "An Improved Abnormal Behavior Feature Detection Algorithm of Network Information Based on Fractional Fourier Transform." Applied Mechanics and Materials 513-517 (February 2014): 2408–11. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2408.
Full textXiang, Zhongwu, Weiwei Yang, Gaofeng Pan, Yueming Cai, and Yi Song. "Physical Layer Security in Cognitive Radio Inspired NOMA Network." IEEE Journal of Selected Topics in Signal Processing 13, no. 3 (2019): 700–714. http://dx.doi.org/10.1109/jstsp.2019.2902103.
Full textWang, Zhiqiang. "Application analysis of digital electronic technology in communication network." International Journal of Computing and Information Technology 5, no. 1 (2023): 8. http://dx.doi.org/10.56028/ijcit.1.5.8.2023.
Full textLee, Sanguk, Incheol Jeong, and Woo-Geun Ahn. "Study on Search and Rescue System for Military and Civil use by using COSPAS SARSAT and Terrestrial Communication Network." E3S Web of Conferences 94 (2019): 01018. http://dx.doi.org/10.1051/e3sconf/20199401018.
Full textThang, Vu Viet, Dmitry Valerievich Pantiukhin, Bui Thi Thanh Quyen, and Vu Viet Vu. "A review of neural networks for rare intrusions detection in wireless networks." Journal of Science and Technology on Information security 3, no. 20 (2023): 23–34. http://dx.doi.org/10.54654/isj.v3i20.984.
Full textJi, Cheongmin, Taehyoung Ko, and Manpyo Hong. "CA-CRE: Classification Algorithm-Based Controller Area Network Payload Format Reverse-Engineering Method." Electronics 10, no. 19 (2021): 2442. http://dx.doi.org/10.3390/electronics10192442.
Full textBehlilovic, Narves. "One Approach to Improving Smart Environment Communication via the Security Parameter." International Journal of Embedded and Real-Time Communication Systems 13, no. 1 (2022): 1–30. http://dx.doi.org/10.4018/ijertcs.313042.
Full textTefera, Mulugeta Kassaw, Zengwang Jin, and Shengbing Zhang. "A Review of Fundamental Optimization Approaches and the Role of AI Enabling Technologies in Physical Layer Security." Sensors 22, no. 9 (2022): 3589. http://dx.doi.org/10.3390/s22093589.
Full textTu, Jun, Willies Ogola, Dehong Xu, and Wei Xie. "Intrusion Detection Based on Generative Adversarial Network of Reinforcement Learning Strategy for Wireless Sensor Networks." International Journal of Circuits, Systems and Signal Processing 16 (January 13, 2022): 478–82. http://dx.doi.org/10.46300/9106.2022.16.58.
Full textShilova, A. D., and A. A. Vorob’eva. "A Method of Network Access Control for Ensuring Network Infrastructure Security Based on Severing Superfluous Network Connectivity." Automatic Control and Computer Sciences 57, no. 8 (2023): 1116–25. http://dx.doi.org/10.3103/s0146411623080308.
Full textDemidov, R. A., P. D. Zegzhda, and M. O. Kalinin. "Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model." Automatic Control and Computer Sciences 52, no. 8 (2018): 971–76. http://dx.doi.org/10.3103/s0146411618080084.
Full textKim, Kang-IL, and Eunghyuk Lee. "To Enhance Security in LED Display System A Study on the Improvement of Video Display SecurityUsing HDMI." Korea Industrial Technology Convergence Society 28, no. 4 (2023): 115–23. http://dx.doi.org/10.29279/jitr.2023.28.4.115.
Full textZheng, Yunfei, Xuejun Zhang, Shenghan Wang, and Weidong Zhang. "Convolutional Neural Network and Ensemble Learning-Based Unmanned Aerial Vehicles Radio Frequency Fingerprinting Identification." Drones 8, no. 8 (2024): 391. http://dx.doi.org/10.3390/drones8080391.
Full textOgbondamati, Lloyd Endurance, and Audu Daniel Ekpah. "Real Time Premature Ventricular Contraction Detection Signals-Based Security and Steganography A Fuzzy Neural Network System." Recent Innovations in Wireless Network Security 7, no. 2 (2025): 1–13. https://doi.org/10.5281/zenodo.14809892.
Full textLin, Bingjie, Jie Cheng, Jiahui Wei, and Ang Xia. "A Sensing Method of Network Security Situation Based on Markov Game Model." International Journal of Circuits, Systems and Signal Processing 16 (January 14, 2022): 531–36. http://dx.doi.org/10.46300/9106.2022.16.66.
Full textHe, Jialuan, Zirui Xing, Tianqi Xiang, et al. "Wireless Signal Propagation Prediction Based on Computer Vision Sensing Technology for Forestry Security Monitoring." Sensors 21, no. 17 (2021): 5688. http://dx.doi.org/10.3390/s21175688.
Full textLin, Chia-Hung, Chia-Hung Wen, Hsiang-Yueh Lai, et al. "Multilayer Convolutional Processing Network Based Cryptography Mechanism for Digital Images Infosecurity." Processes 11, no. 5 (2023): 1476. http://dx.doi.org/10.3390/pr11051476.
Full textLazaar, Saiida. "Contribution of wavelets to cybersecurity: Intrusion detection systems using neural networks." General Letters in Mathematics 10, no. 2 (2021): 24–30. http://dx.doi.org/10.31559/glm2021.10.2.2.
Full textMrs. V. Deepapriya, C. Sathana, J. Rishwana Begam, V. Rohini, V. Muthu Subhashini, and D. Evangelin. "Innovative Approaches to Secure Image Processing in Decentralized Environment." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 03 (2025): 768–76. https://doi.org/10.47392/irjaeh.2025.0107.
Full textAlhusayni, Ahmed, Vijey Thayananthan, Aiiad Albeshri, and Saleh Alghamdi. "Decentralized Multi-Layered Architecture to Strengthen the Security in the Internet of Things Environment Using Blockchain Technology." Electronics 12, no. 20 (2023): 4314. http://dx.doi.org/10.3390/electronics12204314.
Full textKu, Giwon, Choeljun Choi, Chulseung Yang, et al. "Electrocardiogram-Based Driver Authentication Using Autocorrelation and Convolutional Neural Network Techniques." Electronics 13, no. 24 (2024): 4974. https://doi.org/10.3390/electronics13244974.
Full textKolesnyk, Serhii, and Serhii Kovalov. "Analyzing the effect of reflection on real-time drone sound detection using parallel model of neural networks." Problems of Modeling and Design Automatization 2, no. 20 (2024): 84–92. https://doi.org/10.31474/2074-7888-2024-2-20-84-92.
Full textKorzhov, Serhii O., and Valentyn S. Yesilevskyi. "Using complex-valued neural networks for aircraft identification." Applied Aspects of Information Technology 8, no. 1 (2025): 38–47. https://doi.org/10.15276/aait.08.2025.3.
Full textSong, Wenzhan, Fangyu Li, Maria Valero, and Liang Zhao. "Toward Creating a Subsurface Camera." Sensors 19, no. 2 (2019): 301. http://dx.doi.org/10.3390/s19020301.
Full textWichary, Tomasz, Jordi Mongay Batalla, Constandinos X. Mavromoustakis, Jerzy Żurek, and George Mastorakis. "Network Slicing Security Controls and Assurance for Verticals." Electronics 11, no. 2 (2022): 222. http://dx.doi.org/10.3390/electronics11020222.
Full textLafia, Diafale, Mistura Laide Sanni, Rasheed Ayodeji Adetona, Bodunde Odunola Akinyemi, and Ganiyu Adesola Aderounmu. "Signal Processing-based Model for Primary User Emulation Attacks Detection in Cognitive Radio Networks." Journal of Computing and Information Technology 29, no. 2 (2022): 77–88. http://dx.doi.org/10.20532/cit.2021.1005297.
Full textAhmed, Amjed Abbas, Rana Ali Salim, and Mohammad Kamrul Hasan. "Deep Learning Method for Power Side-Channel Analysis on Chip Leakages." Elektronika ir Elektrotechnika 29, no. 6 (2023): 50–57. http://dx.doi.org/10.5755/j02.eie.34650.
Full textWang, Huan, Jian Gu, Jianping Zhao, et al. "Prediction Method of Network Security Situation Based on GA-LSSVM Time Series Analysis." Advances in Modelling and Analysis B 60, no. 2 (2017): 372–90. http://dx.doi.org/10.18280/ama_b.600208.
Full textHeo, Jeonghwan, and Jechang Jeong. "Deceptive Techniques to Hide a Compressed Video Stream for Information Security." Sensors 21, no. 21 (2021): 7200. http://dx.doi.org/10.3390/s21217200.
Full textZhang, Yongkang. "6G Fronthaul Network Architecture Based on Quantum Technology: Integration of QKD with Passive WDM." Applied and Computational Engineering 119, no. 1 (2025): 9–17. https://doi.org/10.54254/2755-2721/2025.21529.
Full textCococcioni, Marco, Federico Rossi, Emanuele Ruffaldi, Sergio Saponara, and Dupont de Dinechin Benoit. "Novel Arithmetics in Deep Neural Networks Signal Processing for Autonomous Driving: Challenges and Opportunities." IEEE Signal Processing Magazine 38, no. 1 (2020): 97–110. https://doi.org/10.1109/MSP.2020.2988436.
Full textWu, Bin, Xinyu Wu, Peng Li, Youbing Gao, Jiangbo Si, and Naofal Al-Dhahir. "Efficient FPGA Implementation of Convolutional Neural Networks and Long Short-Term Memory for Radar Emitter Signal Recognition." Sensors 24, no. 3 (2024): 889. http://dx.doi.org/10.3390/s24030889.
Full textKhonde, Shraddha R., and Venugopal Ulagamuthalvi. "Hybrid Architecture for Distributed Intrusion Detection System Using Semi-supervised Classifiers in Ensemble Approach." Advances in Modelling and Analysis B 63, no. 1-4 (2020): 10–19. http://dx.doi.org/10.18280/ama_b.631-403.
Full text