Results 41 to 50 of about 40,714 (194)

Fluorescent Diarylethenes With Polar Groups: Synthesis, Spectra, and Optical Microscopy Applications

open access: yesChemistry – A European Journal, EarlyView.
Blinking green and flashing red: photo‐switchable and photo‐activatable probes emitting green and red light were prepared and applied as bioconjugates in super‐resolution optical microscopy. ABSTRACT The use of photoactivatable fluorescent diarylethenes (fDAEs) in biology‐related light microscopy has been restricted by the lack of probes having freely ...
Kakishi Uno   +6 more
wiley   +1 more source

Machine Learning DDoS Detection for Consumer Internet of Things Devices

open access: yes, 2018
An increasing number of Internet of Things (IoT) devices are connecting to the Internet, yet many of these devices are fundamentally insecure, exposing the Internet to a variety of attacks. Botnets such as Mirai have used insecure consumer IoT devices to
Apthorpe, Noah   +2 more
core   +1 more source

The Influence of Drosophila Spire and Myosin V During Mid‐Oogenesis Is Independent of Their Direct Interaction

open access: yesCytoskeleton, EarlyView.
ABSTRACT Cooperativity between cytoskeletal proteins is crucial for spatiotemporal coordination in biological processes, like oogenesis. In mammalian and Drosophila oogenesis, proper assembly and function of actin networks require coordination between actin assembly factors Spire and formins, as well as actin‐associated proteins like myosins and Rab ...
Joseph Y. Ong   +7 more
wiley   +1 more source

Optimizing a Hybrid Deep Learning Model for DDoS Detection Using DBSCAN and PSO

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
This study proposes a hybrid deep learning approach that combines Gated Recurrent Units (GRUs) and Convolutional Neural Networks (CNNs) for Distributed Denial of Service (DDoS) cyberattack detection.
Indrastanti Ratna Widiasari   +1 more
doaj   +1 more source

An SDN-based Approach For Defending Against Reflective DDoS Attacks

open access: yes, 2018
Distributed Reflective Denial of Service (DRDoS) attacks are an immanent threat to Internet services. The potential scale of such attacks became apparent in March 2018 when a memcached-based attack peaked at 1.7 Tbps.
Erb, Benjamin   +4 more
core   +1 more source

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Graph neural network‐based attack prediction for communication‐based train control systems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao   +3 more
wiley   +1 more source

Dynamic Resource Allocation Optimisation and Security‐Resilient Control for Bandwidth‐Limited Network Control Systems With Data Conflicts

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen   +5 more
wiley   +1 more source

Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media

open access: yes, 2017
Social media is often viewed as a sensor into various societal events such as disease outbreaks, protests, and elections. We describe the use of social media as a crowdsourced sensor to gain insight into ongoing cyber-attacks.
Becker Hila   +14 more
core   +1 more source

Home - About - Disclaimer - Privacy