Results 11 to 20 of about 765,324 (203)
A Joint Decentralized Federated Learning and Communications Framework for Industrial Networks
Industrial wireless networks are pushing towards distributed architectures moving beyond traditional server-client transactions. Paired with this trend, new synergies are emerging among sensing, communications and Machine Learning (ML) co-design, where ...
S. Savazzi +3 more
semanticscholar +1 more source
A Systematic Literature Review on Penetration Testing in Networks: Future Research Directions
Given the widespread use of the internet at the individual, governmental, and nongovernmental levels, and the opportunities it offers, such as online shopping, security concerns may arise.
Mariam Alhamed, M. M. Hafizur Rahman
doaj +1 more source
Geometric deep learning: going beyond Euclidean data [PDF]
Many scientific fields study data with an underlying structure that is a non-Euclidean space. Some examples include social networks in computational social sciences, sensor networks in communications, functional networks in brain imaging, regulatory ...
Bronstein, Michael M. +4 more
core +2 more sources
When Wireless Communications Meet Computer Vision in Beyond 5G [PDF]
This article articulates the emerging paradigm, sitting at the confluence of computer vision and wireless communication, enabling beyond-5G/6G mission-critical applications (autonomous/ remote-controlled vehicles, visuo-haptic virtual reality, and other ...
T. Nishio +4 more
semanticscholar +1 more source
Realguard: A Lightweight Network Intrusion Detection System for IoT Gateways
Cyber security has become increasingly challenging due to the proliferation of the Internet of things (IoT), where a massive number of tiny, smart devices push trillion bytes of data to the Internet.
Xuan-Ha Nguyen +3 more
doaj +1 more source
Sniffing attacks on computer networks
The sniffing attack or sniffer attack, in the context of network security, corresponds to data theft or interception by capturing network traffic using a sniffer (an application that aims to capture network packets).
D. Glavan
semanticscholar +1 more source
From disaster prevention to mitigation, drug analysis to drug design, agriculture to food security, IoT to AI, and big data analysis to knowledge or sentiment mining, a high computation power is a prime necessity at present.
M M Hafizur Rahman +3 more
doaj +1 more source
Sonification of Network Traffic Flow for Monitoring and Situational Awareness [PDF]
Maintaining situational awareness of what is happening within a network is challenging, not least because the behaviour happens within computers and communications networks, but also because data traffic speeds and volumes are beyond human ability to ...
Debashi, Mohamed, Vickers, Paul
core +4 more sources
As power systems transition from controllable fossil fuel plants to variable renewable sources, managing power supply and demand fluctuations becomes increasingly important. Novel approaches are required to balance these fluctuations.
Tim Fürmann +3 more
doaj +1 more source
Microcomb-based integrated photonic processing unit
Optical neural networks face remarkable challenges in high-level integration and on-chip operation. In this work the authors enable optical convolution utilizing time-wavelength plane stretching approach on a microcomb-driven chip-based photonic ...
Bowen Bai +13 more
doaj +1 more source

