Articles de revues sur le sujet « Signal processing for network security »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Signal processing for network security ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.
Alapati, Yaswanth Kumar, and Suban Ravichandran. "An Efficient Signal Processing Model for Malicious Signal Identification and Energy Consumption Reduction for Improving Data Transmission Rate." Traitement du Signal 38, no. 3 (2021): 837–43. http://dx.doi.org/10.18280/ts.380330.
Texte intégralGao, Feng, Yun Wu, and Shang Qiong Lu. "LabVIEW-Based Virtual Laboratory for Digital Signal Processing." Advanced Materials Research 268-270 (July 2011): 2150–57. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.2150.
Texte intégralKumar, Dr A. Pradeep. "Radar Based Security System Alert." International Journal for Research in Applied Science and Engineering Technology 12, no. 6 (2024): 2484–88. http://dx.doi.org/10.22214/ijraset.2024.63509.
Texte intégralZhang, Hongwei, Haiyan Wang, Xuanming Liang, Yongsheng Yan, and Xiaohong Shen. "Remote passive acoustic signal detection using multi-scale correlation networks and network spectrum distance in marine environment." Journal of the Acoustical Society of America 154, no. 3 (2023): 1563–76. http://dx.doi.org/10.1121/10.0020907.
Texte intégralS.K., Rajesh, Mary P. Varghese, Lisa C, Rajkumar P, and Winson Rajaian. "SECURE SIGNAL PROCESSING FOR 6G LEO SATELLITE NETWORKS: A DEEP LEARNING APPROACH USING DRIVEN SECURE CHANNEL ESTIMATION MODEL." ICTACT Journal on Communication Technology 16, no. 1 (2025): 3413–18. https://doi.org/10.21917/ijct.2025.0506.
Texte intégralElliot, Kizzy N., and Levi A.S Damingo. "Application of Blockchain Technology for Secure Signal Processing." Recent Innovations in Wireless Network Security 6, no. 2 (2024): 19–31. https://doi.org/10.5281/zenodo.10683541.
Texte intégralXue, Lian, and Cheng-song Hu. "A Vibration Signal Processing of Large-scale Structural Systems Based on Wireless Sensor." International Journal of Online Engineering (iJOE) 13, no. 05 (2017): 43. http://dx.doi.org/10.3991/ijoe.v13i05.7050.
Texte intégralAsiya, E. Asiya, and U. Onuu Michael. "Design of a Security Wireless Sensor Network for Emergency Response Centers (SWiSNERC)." Journal of Network Security and Data Mining 3, no. 3 (2020): 1–14. https://doi.org/10.5281/zenodo.4280334.
Texte intégralCao, Yunyu, Jinrui Tang, Shaohui Shi, Defu Cai, Li Zhang, and Ping Xiong. "Fault Diagnosis Techniques for Electrical Distribution Network Based on Artificial Intelligence and Signal Processing: A Review." Processes 13, no. 1 (2024): 48. https://doi.org/10.3390/pr13010048.
Texte intégralCheng, Jie, Bingjie Lin, Jiahui Wei, and Ang Xia. "The Compound Prediction Analysis of Information Network Security Situation based on Support Vector Combined with BP Neural Network Learning Algorithm." International Journal of Circuits, Systems and Signal Processing 16 (January 13, 2022): 489–96. http://dx.doi.org/10.46300/9106.2022.16.60.
Texte intégralR., Krithika, Nidhi S., and Sandhiya V. "A Review on Wireless Sensor Network." International Journal of Trend in Scientific Research and Development 2, no. 5 (2018): 2169–72. https://doi.org/10.31142/ijtsrd18244.
Texte intégralRamachandra, H. V., Pundalik Chavan, S. Supreeth, et al. "Secured Wireless Network Based on a Novel Dual Integrated Neural Network Architecture." Journal of Electrical and Computer Engineering 2023 (September 28, 2023): 1–11. http://dx.doi.org/10.1155/2023/9390660.
Texte intégralPoroshenko, Anton, and Andriy Kovalenko. "Audio signal transmission method in network-based audio analytics system." Innovative Technologies and Scientific Solutions for Industries, no. 4(26) (December 27, 2023): 58–67. http://dx.doi.org/10.30837/itssi.2023.26.058.
Texte intégralChoi, Hyun-Sik. "Electromyogram (EMG) Signal Classification Based on Light-Weight Neural Network with FPGAs for Wearable Application." Electronics 12, no. 6 (2023): 1398. http://dx.doi.org/10.3390/electronics12061398.
Texte intégralArshad, Muhammad, Liu Jianwei, Muhammad Khalid, Waqar Khalid, Yue Cao, and Fakhri Alam Khan. "Access authentication via blockchain in space information network." PLOS ONE 19, no. 3 (2024): e0291236. http://dx.doi.org/10.1371/journal.pone.0291236.
Texte intégralOuyang, Yuhong, Man Li, Wenqian Kang, Xiangbei Che, and Ruixian Ye. "Distribution Network Security Situation Awareness Method Based on the Distribution Network Topology Layered Model." Journal of Electrical and Computer Engineering 2023 (April 25, 2023): 1–8. http://dx.doi.org/10.1155/2023/6775337.
Texte intégralWang, Kexin, Yihong Gao, Mauro Dragone, Yvan Petillot, and Xu Wang. "A Deep Echo State Network-Based Novel Signal Processing Approach for Underwater Wireless Optical Communication System with PAM and OFDM Signals." Photonics 10, no. 7 (2023): 763. http://dx.doi.org/10.3390/photonics10070763.
Texte intégralPeng, Qi Hua. "An Improved Abnormal Behavior Feature Detection Algorithm of Network Information Based on Fractional Fourier Transform." Applied Mechanics and Materials 513-517 (February 2014): 2408–11. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2408.
Texte intégralXiang, Zhongwu, Weiwei Yang, Gaofeng Pan, Yueming Cai, and Yi Song. "Physical Layer Security in Cognitive Radio Inspired NOMA Network." IEEE Journal of Selected Topics in Signal Processing 13, no. 3 (2019): 700–714. http://dx.doi.org/10.1109/jstsp.2019.2902103.
Texte intégralWang, Zhiqiang. "Application analysis of digital electronic technology in communication network." International Journal of Computing and Information Technology 5, no. 1 (2023): 8. http://dx.doi.org/10.56028/ijcit.1.5.8.2023.
Texte intégralLee, Sanguk, Incheol Jeong, and Woo-Geun Ahn. "Study on Search and Rescue System for Military and Civil use by using COSPAS SARSAT and Terrestrial Communication Network." E3S Web of Conferences 94 (2019): 01018. http://dx.doi.org/10.1051/e3sconf/20199401018.
Texte intégralThang, Vu Viet, Dmitry Valerievich Pantiukhin, Bui Thi Thanh Quyen, and Vu Viet Vu. "A review of neural networks for rare intrusions detection in wireless networks." Journal of Science and Technology on Information security 3, no. 20 (2023): 23–34. http://dx.doi.org/10.54654/isj.v3i20.984.
Texte intégralJi, Cheongmin, Taehyoung Ko, and Manpyo Hong. "CA-CRE: Classification Algorithm-Based Controller Area Network Payload Format Reverse-Engineering Method." Electronics 10, no. 19 (2021): 2442. http://dx.doi.org/10.3390/electronics10192442.
Texte intégralBehlilovic, Narves. "One Approach to Improving Smart Environment Communication via the Security Parameter." International Journal of Embedded and Real-Time Communication Systems 13, no. 1 (2022): 1–30. http://dx.doi.org/10.4018/ijertcs.313042.
Texte intégralTefera, Mulugeta Kassaw, Zengwang Jin, and Shengbing Zhang. "A Review of Fundamental Optimization Approaches and the Role of AI Enabling Technologies in Physical Layer Security." Sensors 22, no. 9 (2022): 3589. http://dx.doi.org/10.3390/s22093589.
Texte intégralTu, Jun, Willies Ogola, Dehong Xu, and Wei Xie. "Intrusion Detection Based on Generative Adversarial Network of Reinforcement Learning Strategy for Wireless Sensor Networks." International Journal of Circuits, Systems and Signal Processing 16 (January 13, 2022): 478–82. http://dx.doi.org/10.46300/9106.2022.16.58.
Texte intégralShilova, A. D., and A. A. Vorob’eva. "A Method of Network Access Control for Ensuring Network Infrastructure Security Based on Severing Superfluous Network Connectivity." Automatic Control and Computer Sciences 57, no. 8 (2023): 1116–25. http://dx.doi.org/10.3103/s0146411623080308.
Texte intégralDemidov, R. A., P. D. Zegzhda, and M. O. Kalinin. "Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model." Automatic Control and Computer Sciences 52, no. 8 (2018): 971–76. http://dx.doi.org/10.3103/s0146411618080084.
Texte intégralKim, Kang-IL, and Eunghyuk Lee. "To Enhance Security in LED Display System A Study on the Improvement of Video Display SecurityUsing HDMI." Korea Industrial Technology Convergence Society 28, no. 4 (2023): 115–23. http://dx.doi.org/10.29279/jitr.2023.28.4.115.
Texte intégralZheng, Yunfei, Xuejun Zhang, Shenghan Wang, and Weidong Zhang. "Convolutional Neural Network and Ensemble Learning-Based Unmanned Aerial Vehicles Radio Frequency Fingerprinting Identification." Drones 8, no. 8 (2024): 391. http://dx.doi.org/10.3390/drones8080391.
Texte intégralOgbondamati, Lloyd Endurance, and Audu Daniel Ekpah. "Real Time Premature Ventricular Contraction Detection Signals-Based Security and Steganography A Fuzzy Neural Network System." Recent Innovations in Wireless Network Security 7, no. 2 (2025): 1–13. https://doi.org/10.5281/zenodo.14809892.
Texte intégralLin, Bingjie, Jie Cheng, Jiahui Wei, and Ang Xia. "A Sensing Method of Network Security Situation Based on Markov Game Model." International Journal of Circuits, Systems and Signal Processing 16 (January 14, 2022): 531–36. http://dx.doi.org/10.46300/9106.2022.16.66.
Texte intégralHe, Jialuan, Zirui Xing, Tianqi Xiang, et al. "Wireless Signal Propagation Prediction Based on Computer Vision Sensing Technology for Forestry Security Monitoring." Sensors 21, no. 17 (2021): 5688. http://dx.doi.org/10.3390/s21175688.
Texte intégralLin, Chia-Hung, Chia-Hung Wen, Hsiang-Yueh Lai, et al. "Multilayer Convolutional Processing Network Based Cryptography Mechanism for Digital Images Infosecurity." Processes 11, no. 5 (2023): 1476. http://dx.doi.org/10.3390/pr11051476.
Texte intégralLazaar, Saiida. "Contribution of wavelets to cybersecurity: Intrusion detection systems using neural networks." General Letters in Mathematics 10, no. 2 (2021): 24–30. http://dx.doi.org/10.31559/glm2021.10.2.2.
Texte intégralMrs. V. Deepapriya, C. Sathana, J. Rishwana Begam, V. Rohini, V. Muthu Subhashini, and D. Evangelin. "Innovative Approaches to Secure Image Processing in Decentralized Environment." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 03 (2025): 768–76. https://doi.org/10.47392/irjaeh.2025.0107.
Texte intégralAlhusayni, Ahmed, Vijey Thayananthan, Aiiad Albeshri, and Saleh Alghamdi. "Decentralized Multi-Layered Architecture to Strengthen the Security in the Internet of Things Environment Using Blockchain Technology." Electronics 12, no. 20 (2023): 4314. http://dx.doi.org/10.3390/electronics12204314.
Texte intégralKu, Giwon, Choeljun Choi, Chulseung Yang, et al. "Electrocardiogram-Based Driver Authentication Using Autocorrelation and Convolutional Neural Network Techniques." Electronics 13, no. 24 (2024): 4974. https://doi.org/10.3390/electronics13244974.
Texte intégralKolesnyk, Serhii, and Serhii Kovalov. "Analyzing the effect of reflection on real-time drone sound detection using parallel model of neural networks." Problems of Modeling and Design Automatization 2, no. 20 (2024): 84–92. https://doi.org/10.31474/2074-7888-2024-2-20-84-92.
Texte intégralKorzhov, Serhii O., and Valentyn S. Yesilevskyi. "Using complex-valued neural networks for aircraft identification." Applied Aspects of Information Technology 8, no. 1 (2025): 38–47. https://doi.org/10.15276/aait.08.2025.3.
Texte intégralSong, Wenzhan, Fangyu Li, Maria Valero, and Liang Zhao. "Toward Creating a Subsurface Camera." Sensors 19, no. 2 (2019): 301. http://dx.doi.org/10.3390/s19020301.
Texte intégralWichary, Tomasz, Jordi Mongay Batalla, Constandinos X. Mavromoustakis, Jerzy Żurek, and George Mastorakis. "Network Slicing Security Controls and Assurance for Verticals." Electronics 11, no. 2 (2022): 222. http://dx.doi.org/10.3390/electronics11020222.
Texte intégralLafia, Diafale, Mistura Laide Sanni, Rasheed Ayodeji Adetona, Bodunde Odunola Akinyemi, and Ganiyu Adesola Aderounmu. "Signal Processing-based Model for Primary User Emulation Attacks Detection in Cognitive Radio Networks." Journal of Computing and Information Technology 29, no. 2 (2022): 77–88. http://dx.doi.org/10.20532/cit.2021.1005297.
Texte intégralAhmed, Amjed Abbas, Rana Ali Salim, and Mohammad Kamrul Hasan. "Deep Learning Method for Power Side-Channel Analysis on Chip Leakages." Elektronika ir Elektrotechnika 29, no. 6 (2023): 50–57. http://dx.doi.org/10.5755/j02.eie.34650.
Texte intégralWang, Huan, Jian Gu, Jianping Zhao, et al. "Prediction Method of Network Security Situation Based on GA-LSSVM Time Series Analysis." Advances in Modelling and Analysis B 60, no. 2 (2017): 372–90. http://dx.doi.org/10.18280/ama_b.600208.
Texte intégralHeo, Jeonghwan, and Jechang Jeong. "Deceptive Techniques to Hide a Compressed Video Stream for Information Security." Sensors 21, no. 21 (2021): 7200. http://dx.doi.org/10.3390/s21217200.
Texte intégralZhang, Yongkang. "6G Fronthaul Network Architecture Based on Quantum Technology: Integration of QKD with Passive WDM." Applied and Computational Engineering 119, no. 1 (2025): 9–17. https://doi.org/10.54254/2755-2721/2025.21529.
Texte intégralCococcioni, Marco, Federico Rossi, Emanuele Ruffaldi, Sergio Saponara, and Dupont de Dinechin Benoit. "Novel Arithmetics in Deep Neural Networks Signal Processing for Autonomous Driving: Challenges and Opportunities." IEEE Signal Processing Magazine 38, no. 1 (2020): 97–110. https://doi.org/10.1109/MSP.2020.2988436.
Texte intégralWu, Bin, Xinyu Wu, Peng Li, Youbing Gao, Jiangbo Si, and Naofal Al-Dhahir. "Efficient FPGA Implementation of Convolutional Neural Networks and Long Short-Term Memory for Radar Emitter Signal Recognition." Sensors 24, no. 3 (2024): 889. http://dx.doi.org/10.3390/s24030889.
Texte intégralKhonde, Shraddha R., and Venugopal Ulagamuthalvi. "Hybrid Architecture for Distributed Intrusion Detection System Using Semi-supervised Classifiers in Ensemble Approach." Advances in Modelling and Analysis B 63, no. 1-4 (2020): 10–19. http://dx.doi.org/10.18280/ama_b.631-403.
Texte intégral