Results 81 to 90 of about 616,005 (189)
Domain Generation Algorithms (DGAs) are algorithms present in most malware used by botnets and advanced persistent threats. These algorithms dynamically generate domain names to maintain and obfuscate communication between the infected device and the ...
João Rafael Gregório +2 more
doaj +1 more source
A Cross-Domain Recommendation Algorithm for D2D Multimedia Application Systems
Device-to-device communication is the key technology of the fifth generation mobile communication, which can support mobile multimedia applications. In recent years, mobile multimedia applications, however, have produced a lot of data, which leads to ...
Xu Yu, Yu Fu, Lingwei Xu, Guozhu Liu
doaj +1 more source
DGA malicious domain name identification based on XGBoost and particle swarm optimization algorithm
Domain generation algorithms (DGA) have become a common method of network attacks. To enhance the detection capability for DGA malicious domains, a method for malicious domain identification based on XGBoost and particle swarm optimization (PSO ...
CHEN Zesheng +3 more
doaj
A novel channel estimation of MIMO-OFDM using hybrid bionic binary spotted hyena optimization
A promising generalized inverse discrete Fourier transform non-orthogonal frequency division multiplexing (GIDFT-OFDM) system can satisfy the requirement of supporting higher data rates in fifth-generation (5G) technology. However, this system has a high
C. Premila Rosy +5 more
doaj +1 more source
This article introduces a software framework for benchmarking robot task scheduling algorithms in dynamic and uncertain service environments. The system provides standardised interfaces, configurable scenarios with movable objects, human agents, tools ...
Wojciech Dudek +4 more
doaj +1 more source
AN ALGORITHM TO GENERATE RANDOM SPHERE PACKS IN ARBITRARY DOMAINS [PDF]
Descargue el texto completo en el repositorio institucional de la Pontifícia Universidade Católica do Rio de Janeiro: https://doi.org/10.17771/PUCRio.acad ...
openaire +1 more source
Detecting Domain Names Generated by DGAs With Low False Positives in Chinese Domain Names
Attackers are known to utilize domain generation algorithms (DGAs) to generate domain names for command and control (C&C) servers and facilitate the distribution of uniform resource locators within malicious software.
Huiju Lee +3 more
doaj +1 more source
Quantum computing, with its foundational principles of superposition and entanglement, has the potential to provide significant quantum advantages, addressing challenges that classical computing may struggle to overcome.
Maria Revythi, Georgia Koukiou
doaj +1 more source
Control of a dual-layer loudspeaker array for the generation of private sound
A dual-layer loudspeaker array has been constructed and controlled in order to ensure directional radiation over only one hemisphere of the region surrounding the array.
Casagrande Hirono, Fabio +3 more
core
Reinforcement Learning With Selective Exploration for Interference Management in mmWave Networks
The next generation of wireless systems will leverage the millimeter-wave (mmWave) bands to meet the increasing traffic volume and high data rate requirements of emerging applications (e.g., ultra HD streaming, metaverse, and holographic telepresence ...
Son Dinh-van +4 more
doaj +1 more source

