1
|
Evaluation of data collection tree routing protocols for wireless sensor networksIn recent years, wireless sensor networks (WSNs) have garnered significant research attention due to their versatility in supporting a range of applications, including military surveillance,... Author: Khôi Do Huy Keyword: CTP Protocol routing in WSN WSN energy saving solution WSN performance CTP in mobile
|
2
|
Applying transformer architecture to enhance attack detection performance in intrusion detection systemsIntrusion Detection Systems (IDS) are crucial in safeguarding network security against increasingly sophisticated threats. In this study, we propose a Transformer-based intrusion detection model to... Author: Vu Phuong Thi, Ha Hoang Thi Hong, Truong Dinh Gia, Yen Tran Thi Keyword: Intrusion Detection Transformer UNSW-NB15 Cybersecurity Self-attention
|