Results 1 to 10 of about 413,930 (174)

A distributed SDN-based intrusion detection system for IoT using optimized forests [PDF]

open access: yesPLoS ONE, 2023
Along with the expansion of Internet of Things (IoT), the importance of security and intrusion detection in this network also increases, and the need for new and architecture-specific intrusion detection systems (IDS) is felt.
Ke Luo
doaj   +4 more sources

Detection and Localization of Network Black Holes [PDF]

open access: greenIEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, 2007
Internet backbone networks are under constant flux, struggling to keep up with increasing demand. The pace of technology change often outstrips the deployment of associated fault monitoring capabilities that are built into today's IP protocols and routers.
Ramana Rao Kompella   +3 more
openalex   +3 more sources

Tensor Network Models of Unitary Black Hole Evaporation [PDF]

open access: yesJournal of High Energy Physics, 2016
We introduce a general class of toy models to study the quantum information-theoretic properties of black hole radiation. The models are governed by a set of isometries that specify how microstates of the black hole at a given energy evolve to entangled states of a tensor product black-hole/radiation Hilbert space.
Leutheusser, Samuel, Raamsdonk, Mark
arxiv   +5 more sources

Tracing Astrophysical Black Hole Seeds and Primordial Black Holes with LISA-Taiji Network [PDF]

open access: yesMNRAS 512, 6217 (2022), 2022
In this work, we discuss the improvement that the joint network of LISA and Taiji could provide on exploring two kinds of black hole formation mechanisms. For astrophysical origin, we consider light seed and heavy seed scenarios, and generate populations accordingly. We find that the joint network has the potential to observe growing light seeds in the
Yuchan Yang   +4 more
arxiv   +3 more sources

Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks [PDF]

open access: yesInternational Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 10-16, January 2010, USA, 2010
In wireless ad hoc networks, the absence of any control on packets forwarding, make these networks vulnerable by various deny of service attacks (DoS). A node, in wireless ad hoc network, counts always on intermediate nodes to send these packets to a given destination node.
Baadache, Abderrahmane, Belmehdi, Ali
arxiv   +3 more sources

Predicting the properties of black holes merger remnants with Deep Neural Networks [PDF]

open access: yesClass.Quant.Grav. 37 (2020) 13, 135005, 2019
We present the first estimation of the mass and spin magnitude of Kerr black holes resulting from the coalescence of binary black holes using a deep neural network. The network is trained on a dataset containing 80\% of the full publicly available catalog of numerical simulations of gravitational waves emission by binary black hole systems, including ...
Sascha Husa, L Haegel, L Haegel
arxiv   +9 more sources

Analysis of Black Hole Attacks on Wireless Sensor Networks [PDF]

open access: bronzeInternational Journal of Advanced Research in Computer and Information Security, 2019
K Varaha Samba Murthy Raju
openalex   +2 more sources

Home - About - Disclaimer - Privacy