Results 51 to 60 of about 40,714 (194)

AI‐Powered Anomaly Detection for Secure Internet of Things (IoT): Optimising XGBoost and Deep Learning With Bayesian Optimisation

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Intelligent and adaptive defence systems that can quickly thwart changing cyberthreats are becoming more and more necessary in the dynamic and data‐intensive Internet of things (IoT) environment. Using the NSL‐KDD benchmark dataset, this paper presents an improved anomaly detection system that combines an optimised sequential neural network ...
Seong‐O Shim   +4 more
wiley   +1 more source

Defense mechanism of SDN application layer against DDoS attack based on API call management

open access: yes网络与信息安全学报, 2022
Due to thelack of strict access control, identity authentication and abnormal call detection, attackers may develop malicious applications easily and then it leads to theabuse of the northbound interface API (application programming interface ...
Yang WANG, Guangming TANG   +1 more
doaj   +1 more source

The use of maxLength in the RPKI [PDF]

open access: yes, 2018
This document recommends that operators avoid using the maxLength attribute when issuing Route Origin Authorizations (ROAs) in the Resource Public Key Infrastructure (RPKI). These recommendations complement those in [RFC7115].https://datatracker.ietf.org/
Gilad, Yossi   +4 more
core  

Magnetic adatoms in two and four terminal graphene nanoribbons: A comparison between their spin polarized transport

open access: yes, 2017
We study the charge and spin transport in two and four terminal graphene nanoribbons (GNR) decorated with random distribution of magnetic adatoms. The inclusion of the magnetic adatoms generates only the $z$-component of the spin polarized conductance ...
Basu, Saurabh, Ganguly, Sudin
core   +1 more source

Neutral Forms of Be as Default Forms: The Utility of Underspecification and Blocking in a Welsh Morphosyntactic Phenomenon

open access: yesTransactions of the Philological Society, Volume 124, Issue 1, Page 91-116, March 2026.
Abstract In Welsh, in certain tenses, unique forms of the verb for ‘be’ are used in positive clauses. These specialised forms of ‘be’ are incompatible with positive main‐clause declarative complementizers, despite their apparent featural compatibility. For most speakers, they are also blocked from if‐clauses; although, I report on data regarding their ...
Frances Dowle
wiley   +1 more source

Reaction to New Security Threat Class [PDF]

open access: yes, 2014
Each new identified security threat class triggers new research and development efforts by the scientific and professional communities. In this study, we investigate the rate at which the scientific and professional communities react to new identified ...
Elovici, Yuval, Rokach, Lior
core  

GeARF5/GeIAA33‐GeSWEET14 module balances the secondary metabolic biosynthesis to increase the yield and quality in Gastrodia elata

open access: yesJournal of Integrative Plant Biology, EarlyView.
Auxin signaling regulates the formation of vegetative propagation corms in Gastrodia elata by regulating sugar‐acid interconversion, which in turn regulates polysaccharide and starch biosynthesis as well as biosynthesis of the bioactive metabolite gastrodin.
Qun Liu   +9 more
wiley   +1 more source

The Evolving Landscape of Internet Control [PDF]

open access: yes, 2011
Over the past two years, we have undertaken several studies at the Berkman Center designed to better understand the control of the Internet in less open societies.
Ethan Zuckerman   +4 more
core  

The GmGT‐2F, a trihelix transcription factor, regulates seed oil content by directly activating GmAGAL transcription in soybean

open access: yesJournal of Integrative Plant Biology, EarlyView.
In soybean, the trihelix transcription factor GmGT‐2F positively regulates the expression of the α‐galactosidase gene GmAGAL, thereby modulating seed oil content. The cyclophilin GmCYP2 interacts with GmGT‐2F and suppresses GmAGAL activation. Haplotype diversity analysis of GmGT‐2F, GmCYP2, and GmAGAL identified favorable haplotype combinations ...
Shuangzhe Li   +6 more
wiley   +1 more source

Research on low-rate DDoS attack of SDN network in cloud environment

open access: yesTongxin xuebao, 2019
Aiming at the problems of low-rate DDoS attack detection accuracy in cloud SDN network and the lack of unified framework for data plane and control plane low-rate DDoS attack detection and defense,a unified framework for low-rate DDoS attack detection ...
Xingshu CHEN   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy