You are currently viewing a new version of our website. To view the old version click .

Computers, Volume 14, Issue 3

March 2025 - 36 articles

Cover Story: This paper presents a comprehensive overview of Intrusion Detection Systems (IDSs) for computer networking security, addressing the following topics: IDS architectures and types, key detection techniques, datasets, test environments, implementations in modern network environments, current challenges, limitations, and emerging trends. It also discusses the major components of computer networks, common models and their characteristics, and vulnerabilities. This paper differentiates itself from prior reviews by considering a broad scope of IDS technologies, including advanced technologies like AI and blockchain, providing comprehensive dataset analysis. Key challenges in this field highlighted in the overview include reducing false positives, handling encrypted traffic, improving energy efficiency, and enhancing resilience against adversarial attacks to meet evolving cybersecurity demands. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (36)

  • Article
  • Open Access
1 Citations
587 Views
35 Pages

Hellenic Open University has developed Onlabs, a virtual biology laboratory designed to safely and effectively prepare its students for hands-on work in the university’s on-site labs. This platform simulates key experimental processes, such as...

  • Article
  • Open Access
2 Citations
853 Views
23 Pages

The smart-pixel-based optical convolutional neural network was proposed to improve kernel refresh rates in scalable optical convolutional neural networks (CNNs) by replacing the spatial light modulator with a smart pixel light modulator while preserv...

  • Article
  • Open Access
1,639 Views
40 Pages

A Novel Approach to Efficiently Verify Sequential Consistency in Concurrent Programs

  • Mohammed H. Abdulwahhab,
  • Parosh Aziz Abdulla and
  • Karwan Jacksi

Verifying sequential consistency (SC) in concurrent programs is computationally challenging due to the exponential growth of possible interleavings among read and write operations. Many of these interleavings produce identical outcomes, rendering exh...

  • Article
  • Open Access
1 Citations
2,717 Views
15 Pages

Transformer-Based Student Engagement Recognition Using Few-Shot Learning

  • Wejdan Alarefah,
  • Salma Kammoun Jarraya and
  • Nihal Abuzinadah

Improving the recognition of online learning engagement is a critical issue in educational information technology, due to the complexities of student behavior and varying assessment standards. Additionally, the scarcity of publicly available datasets...

  • Article
  • Open Access
5 Citations
2,187 Views
19 Pages

Hybrid Deep Neural Network Optimization with Particle Swarm and Grey Wolf Algorithms for Sunburst Attack Detection

  • Mohammad Almseidin,
  • Amjad Gawanmeh,
  • Maen Alzubi,
  • Jamil Al-Sawwa,
  • Ashraf S. Mashaleh and
  • Mouhammd Alkasassbeh

Deep Neural Networks (DNNs) have been widely used to solve complex problems in natural language processing, image classification, and autonomous systems. The strength of DNNs is derived from their ability to model complex functions and to improve det...

  • Article
  • Open Access
1,640 Views
22 Pages

The present study discusses the design and development of a digital repository for the preservation and dissemination of the cultural and natural heritage of Zakynthos Island (Greece). Following a crowdsourcing approach, the platform allows users to...

  • Article
  • Open Access
2 Citations
2,062 Views
23 Pages

Coordination among multiple interdependent processes and stakeholders and the allocation of optimal resources make enterprise systems management a challenging process. Even for experienced professionals, it is not uncommon to cause inefficiencies and...

  • Article
  • Open Access
2 Citations
1,208 Views
27 Pages

Evaluating Optimal Deep Learning Models for Freshness Assessment of Silver Barb Through Technique for Order Preference by Similarity to Ideal Solution with Linear Programming

  • Atchara Choompol,
  • Sarayut Gonwirat,
  • Narong Wichapa,
  • Anucha Sriburum,
  • Sarayut Thitapars,
  • Thanakorn Yarnguy,
  • Noppakun Thongmual,
  • Waraporn Warorot,
  • Kiatipong Charoenjit and
  • Ronnachai Sangmuenmao

Automating fish freshness assessment is crucial for ensuring quality control and operational efficiency in large-scale fish processing. This study evaluates deep learning models for classifying the freshness of Barbonymus gonionotus (Silver Barb) and...

  • Article
  • Open Access
3 Citations
1,805 Views
25 Pages

Nowadays, quantum computing is developing at an unprecedented speed. This will pose a serious threat to the security of widely used public-key cryptosystems in the near future. Scientists are actively looking for ways to protect against quantum attac...

of 4

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431X