Results 91 to 100 of about 151,861 (137)

Research on computer network information security management and protection strategy

International Conferences on Computers, Information Processing and Advanced Education, 2022
With the rapid development of network information technology, we have entered the era of big data. Under this background, computer network information security has also become a major hidden danger.
Zhaoyu Liu
semanticscholar   +1 more source

An Integrated Feature Extraction Based on Principal Components and Deep Auto Encoder with Extra Tree for Intrusion Detection Systems

Journal of Information & Knowledge Management, 2023
With advances in computer network technology, the Internet has become an integral part of our daily lives. It goes without saying that providing security to network data is crucial.
Seshu Bhavani Mallampati, Hari Seetha
semanticscholar   +1 more source

Principal Component Analysis and Data Encryption Model for Face Recognition System

2022 2nd International Conference on Electronic and Electrical Engineering and Intelligent System (ICE3IS), 2022
Face recognition is a biometric technique that uses a computer or machine to facilitate the recognition of human faces. The advantage of this technique is that it can detect faces without direct contact with the device.
Magfirawaty Magfirawaty   +5 more
semanticscholar   +1 more source

An instruction detection system with Support Vector Machine, Cuckoo-Genetic algorithm and principal component analysis

International Journal Artificial Intelligent and Informatics, 2022
Nowadays, with the abundant growth of internet users, attacks on computer systems have dramatically increased. This condition might increase the risk of security for Internet users or networks systems.
F. Nayebi, M.Noorimehr M.Noorimehr
semanticscholar   +1 more source

EigenCircuit: Divergent Synthetic Benchmark Generation for Hardware Security Using PCA and Linear Programming

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2022
Benchmarks are the standards by which technologies can be evaluated and fairly compared. In the field of digital circuits, benchmarks were critical for the development of CAD and FPGA tools decades ago.
Sarah Amir, Domenic Forte
semanticscholar   +1 more source

A Comprehensive Survey on Cloud Security Mechanisms

2022 International Conference on Automation, Computing and Renewable Systems (ICACRS), 2022
Cloud computing indicates a tremendous promise for providing on-demand solutions to customers with increased flexibility even at a lower cost over the internet. Cloud service companies efficiently supply their consumers with a variety of storage options.
Dhwani Hakani, P. S. Mann
semanticscholar   +1 more source

Nano Security: From Nano-Electronics to Secure Systems

Design, Automation and Test in Europe, 2021
The field of computer hardware stands at the verge of a revolution driven by recent breakthroughs in emerging nanodevices. “Nano Security” is a new Priority Program recently approved by DFG, the German Research Council.
I. Polian   +22 more
semanticscholar   +1 more source

Robust hybrid watermarking for security of medical images in computer-aided diagnosis based telemedicine applications

IEEE International Symposium on Signal Processing and Information Technology, 2018
Telemedicine has gained much popularity in recent times. It refers to the use of state of the art telecommunication and information technologies to provide medical and health care services to distant locations.
Ramsha Ahmed, Bilal Hassan, Bo Li
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy