Results 61 to 70 of about 3,240 (155)
Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware. [PDF]
Papadogiannaki E, Ioannidis S.
europepmc +1 more source
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley +1 more source
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source
The rapid growth of encrypted network traffic poses significant challenges for network monitoring and security systems, as traditional methods often fail to accurately classify encrypted services.
Zhijiong Wang +3 more
doaj +1 more source
The Plural Lives of E‐Waste: Valuation and Contestation in Accra's Recycling Network(s)
Short Abstract Electronic waste (e‐waste) in Accra is shown to be plural and ontologically multiple, enacted as livelihood, commodity, hazard, governance object and political actor across dispersed recycling networks. Using a multi‐sited, follow‐the‐thing approach and 60 interviews, I specify four socio‐material mechanisms (i.e., copper's market tempo,
Ebenezer Gyampoh Amoah
wiley +1 more source
Accurate classification of encrypted traffic plays an important role in network management. However, current methods confronts several problems: inability to characterize traffic that exhibits great dispersion, inability to classify traffic with multi ...
Xuyang Jing +4 more
doaj +1 more source
ABSTRACT The recent rise of Generative Artificial Intelligence (GenAI) is fundamentally changing the way businesses operate, with many now investing heavily in this technology. However, businesses are still exploring ways to extract value from GenAI and develop organisational capabilities.
Ashish Jagdish Sharma +4 more
wiley +1 more source
Detecting Bot Networks Based On HTTP And TLS Traffic Analysis [PDF]
— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of ...
Zahra Nafarieh
doaj
Inflammatory and Immunological Basis of Periodontal Diseases
The periodontal lesion emerges as an evolving immunological battlefield, where host–microbiome interactions, dysregulated immune responses, fragile resolution mechanisms, and inflammophilic dysbiosis converge to shift the balance from homeostasis to unrestrained tissue destruction.
Giacomo Baima +3 more
wiley +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source

