Results 41 to 50 of about 690,729 (282)
A Novel Lightweight Anonymous Proxy Traffic Detection Method Based on Spatio-Temporal Features
Anonymous proxies are used by criminals for illegal network activities due to their anonymity, such as data theft and cyber attacks. Therefore, anonymous proxy traffic detection is very essential for network security.
Yanjie He, Wei Li
doaj +1 more source
A Robust Adaptive One‐Sample‐Ahead Preview Super‐Twisting Sliding Mode Controller
Block Diagram of the Robust Adaptive One‐Sample‐Ahead Preview Super‐Twisting Sliding Mode Controller. ABSTRACT This article introduces a discrete‐time robust adaptive one‐sample‐ahead preview super‐twisting sliding mode controller. A stability analysis of the controller by Lyapunov criteria is developed to demonstrate its robustness in handling both ...
Guilherme Vieira Hollweg +5 more
wiley +1 more source
Internet technologies have been designed from guidelines like the robustness principle also known as Postel's law. Jon Postel's law is described as: "Be conservative in what you do, be liberal in what you accept from others." Fundamentally, it advises protocol designs to be tolerant with what they accept from the other peers.
Rochet, Florentin +2 more
openaire +3 more sources
Investigating the Cost of Anonymity on Dynamic Networks
In this paper we study the difficulty of counting nodes in a synchronous dynamic network where nodes share the same identifier, they communicate by using a broadcast with unlimited bandwidth and, at each synchronous round, network topology may change. To
Baldoni, Roberto +1 more
core +1 more source
A dual‐layer living hydrogel, ProΦGel, integrates bacteriophages and probiotics for synergistic wound infection therapy. The outer gelatin‐based matrix releases phages on demand in response to P. aeruginosa infections, while inner alginate beads sustain probiotic delivery.
Siyuan Tao +6 more
wiley +1 more source
An Analysis and Enumeration of the Blockchain and Future Implications [PDF]
The blockchain is a relatively new technology that has grown in interest and potential research since its inception. Blockchain technology is dominated by cryptocurrency in terms of usage.
LeBlanc, Nathanial
core +1 more source
Crawling Facebook for Social Network Analysis Purposes [PDF]
We describe our work in the collection and analysis of massive data describing the connections between participants to online social networks. Alternative approaches to social network data collection are defined and evaluated in practice, against the ...
Catanese, Salvatore +4 more
core +3 more sources
Models of the human skin must combine the relevant biological contents and suitable biomaterials with the correct spatial organization. Performing compound screening on such in vitro models also requires fast and reproducible production methods of the models.
Elisa Lenzi +7 more
wiley +1 more source
Anonymous Traffic Detection Based on Feature Engineering and Reinforcement Learning
Anonymous networks, which aim primarily to protect user identities, have gained prominence as tools for enhancing network security and anonymity. Nonetheless, these networks have become a platform for adversarial affairs and sources of suspicious attack ...
Dazhou Liu, Younghee Park
doaj +1 more source
Tor Anonymous Traffic Identification Based on Parallelizing Dilated Convolutional Network
The widespread use of the onion browser (Tor) has provided a breeding ground for the proliferation of cybercriminal activities and the Tor anonymous traffic identification method has been used to fingerprint anonymous web traffic and identify the ...
Yunan Lu +3 more
doaj +1 more source

