Results 41 to 50 of about 40,714 (194)
Fluorescent Diarylethenes With Polar Groups: Synthesis, Spectra, and Optical Microscopy Applications
Blinking green and flashing red: photo‐switchable and photo‐activatable probes emitting green and red light were prepared and applied as bioconjugates in super‐resolution optical microscopy. ABSTRACT The use of photoactivatable fluorescent diarylethenes (fDAEs) in biology‐related light microscopy has been restricted by the lack of probes having freely ...
Kakishi Uno +6 more
wiley +1 more source
Machine Learning DDoS Detection for Consumer Internet of Things Devices
An increasing number of Internet of Things (IoT) devices are connecting to the Internet, yet many of these devices are fundamentally insecure, exposing the Internet to a variety of attacks. Botnets such as Mirai have used insecure consumer IoT devices to
Apthorpe, Noah +2 more
core +1 more source
ABSTRACT Cooperativity between cytoskeletal proteins is crucial for spatiotemporal coordination in biological processes, like oogenesis. In mammalian and Drosophila oogenesis, proper assembly and function of actin networks require coordination between actin assembly factors Spire and formins, as well as actin‐associated proteins like myosins and Rab ...
Joseph Y. Ong +7 more
wiley +1 more source
Optimizing a Hybrid Deep Learning Model for DDoS Detection Using DBSCAN and PSO
This study proposes a hybrid deep learning approach that combines Gated Recurrent Units (GRUs) and Convolutional Neural Networks (CNNs) for Distributed Denial of Service (DDoS) cyberattack detection.
Indrastanti Ratna Widiasari +1 more
doaj +1 more source
An SDN-based Approach For Defending Against Reflective DDoS Attacks
Distributed Reflective Denial of Service (DRDoS) attacks are an immanent threat to Internet services. The potential scale of such attacks became apparent in March 2018 when a memcached-based attack peaked at 1.7 Tbps.
Erb, Benjamin +4 more
core +1 more source
Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi +2 more
wiley +1 more source
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha +9 more
wiley +1 more source
Graph neural network‐based attack prediction for communication‐based train control systems
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao +3 more
wiley +1 more source
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen +5 more
wiley +1 more source
Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media
Social media is often viewed as a sensor into various societal events such as disease outbreaks, protests, and elections. We describe the use of social media as a crowdsourced sensor to gain insight into ongoing cyber-attacks.
Becker Hila +14 more
core +1 more source

