Results 31 to 40 of about 3,240 (155)
Encrypted Network Traffic Classification Using Deep and Parallel Network-in-Network Models
Network traffic classification aims to recognize different application or traffic types by analyzing received data packets. This paper presents a neural network model with deep and parallel network-in-network (NIN) structures for classifying encrypted ...
Zhiyong Bu +4 more
doaj +1 more source
Bootstrap Forest based method for Encrypted Network Traffic Analysis
Encrypting communications and data over the Internet becomes essential in ensuring the privacy of communications and protecting the data from increasing threats. Hence, majority of Internet traffic and networked communications are encrypted now. However,
Shobana Durairaju +1 more
doaj +1 more source
Transport Layer Security-Encrypted Abnormal Traffic Detection Based on Supervised Autoencoder [PDF]
As user awareness of privacy protection increases, an increasing number of websites and services are employing the Transport Layer Security (TLS) protocol to safeguard user data.
YANG Mingfen, GAN Yun, ZHANG Xingpeng
doaj +1 more source
Multi-Task Scenario Encrypted Traffic Classification and Parameter Analysis
The widespread use of encrypted traffic poses challenges to network management and network security. Traditional machine learning-based methods for encrypted traffic classification no longer meet the demands of management and security. The application of
Guanyu Wang, Yijun Gu
doaj +1 more source
Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu +4 more
wiley +1 more source
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu +5 more
wiley +1 more source
User Behavior Detection Using Multi-Modal Signatures of Encrypted Network Traffic
With the development of the network environment and the emergence of new applications, network traffic has become increasingly complex. This paper focuses on user behavior detection based on encrypted traffic analysis.
Jee-Tae Park +3 more
doaj +1 more source
ResearchConnect is an AI‐powered platform that automates researcher profiling, interdisciplinary team formation, and early‐stage research ideation. By extracting keywords from papers and web sources, it quickly clusters researchers into coherent teams and generates collaborative ideas using large language models. Validation on NSF‐funded projects shows
Akshay Vilas Jadhav +2 more
wiley +1 more source
Encrypted malicious traffic detection based on neural network
With the widespread application of encrypted communications, traditional malicious traffic detection methods based on content analysis have gradually become ineffective.
Xia Longfei +5 more
doaj +1 more source
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury +2 more
wiley +1 more source

