Results 41 to 50 of about 690,729 (282)

A Novel Lightweight Anonymous Proxy Traffic Detection Method Based on Spatio-Temporal Features

open access: yesSensors, 2022
Anonymous proxies are used by criminals for illegal network activities due to their anonymity, such as data theft and cyber attacks. Therefore, anonymous proxy traffic detection is very essential for network security.
Yanjie He, Wei Li
doaj   +1 more source

A Robust Adaptive One‐Sample‐Ahead Preview Super‐Twisting Sliding Mode Controller

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView.
Block Diagram of the Robust Adaptive One‐Sample‐Ahead Preview Super‐Twisting Sliding Mode Controller. ABSTRACT This article introduces a discrete‐time robust adaptive one‐sample‐ahead preview super‐twisting sliding mode controller. A stability analysis of the controller by Lyapunov criteria is developed to demonstrate its robustness in handling both ...
Guilherme Vieira Hollweg   +5 more
wiley   +1 more source

Flexible Anonymous Network

open access: yes, 2019
Internet technologies have been designed from guidelines like the robustness principle also known as Postel's law. Jon Postel's law is described as: "Be conservative in what you do, be liberal in what you accept from others." Fundamentally, it advises protocol designs to be tolerant with what they accept from the other peers.
Rochet, Florentin   +2 more
openaire   +3 more sources

Investigating the Cost of Anonymity on Dynamic Networks

open access: yes, 2015
In this paper we study the difficulty of counting nodes in a synchronous dynamic network where nodes share the same identifier, they communicate by using a broadcast with unlimited bandwidth and, at each synchronous round, network topology may change. To
Baldoni, Roberto   +1 more
core   +1 more source

Dual‐Layer Living Hydrogel Enables On‐Demand Delivery of Phages and Probiotics for Synergistic Wound Infection Therapy

open access: yesAdvanced Functional Materials, EarlyView.
A dual‐layer living hydrogel, ProΦGel, integrates bacteriophages and probiotics for synergistic wound infection therapy. The outer gelatin‐based matrix releases phages on demand in response to P. aeruginosa infections, while inner alginate beads sustain probiotic delivery.
Siyuan Tao   +6 more
wiley   +1 more source

An Analysis and Enumeration of the Blockchain and Future Implications [PDF]

open access: yes, 2020
The blockchain is a relatively new technology that has grown in interest and potential research since its inception. Blockchain technology is dominated by cryptocurrency in terms of usage.
LeBlanc, Nathanial
core   +1 more source

Crawling Facebook for Social Network Analysis Purposes [PDF]

open access: yes, 2011
We describe our work in the collection and analysis of massive data describing the connections between participants to online social networks. Alternative approaches to social network data collection are defined and evaluated in practice, against the ...
Catanese, Salvatore   +4 more
core   +3 more sources

Spherical Skin Model: Stratified Co‐Culture of Fibroblasts and Keratinocytes on Spherical Beads Toward Compound Screening

open access: yesAdvanced Healthcare Materials, EarlyView.
Models of the human skin must combine the relevant biological contents and suitable biomaterials with the correct spatial organization. Performing compound screening on such in vitro models also requires fast and reproducible production methods of the models.
Elisa Lenzi   +7 more
wiley   +1 more source

Anonymous Traffic Detection Based on Feature Engineering and Reinforcement Learning

open access: yesSensors
Anonymous networks, which aim primarily to protect user identities, have gained prominence as tools for enhancing network security and anonymity. Nonetheless, these networks have become a platform for adversarial affairs and sources of suspicious attack ...
Dazhou Liu, Younghee Park
doaj   +1 more source

Tor Anonymous Traffic Identification Based on Parallelizing Dilated Convolutional Network

open access: yesApplied Sciences, 2023
The widespread use of the onion browser (Tor) has provided a breeding ground for the proliferation of cybercriminal activities and the Tor anonymous traffic identification method has been used to fingerprint anonymous web traffic and identify the ...
Yunan Lu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy