Results 71 to 80 of about 3,240 (155)

Fast and Accurate Multi-Task Learning for Encrypted Network Traffic Classification

open access: yesApplied Sciences
The classification of encrypted traffic plays a crucial role in network management and security. As encrypted network traffic becomes increasingly complicated and challenging to analyze, there is a growing need for more efficient and comprehensive ...
Jee-Tae Park   +3 more
doaj   +1 more source

Event‐Triggered Saturating Control for Synchronization of Lur'e Type Complex Dynamic Networks

open access: yesInternational Journal of Robust and Nonlinear Control, Volume 36, Issue 4, Page 2184-2198, 10 March 2026.
ABSTRACT This article addresses the problem of synchronizing discrete‐time Lur'e type complex dynamic networks (CDNs) via dynamic event‐triggered control. In particular, it is considered that the control signal of each node is subject to input saturation. Using the Lyapunov Stability Theory, properties of slope‐restricted nonlinearities, and the linear
C. Lisbôa   +3 more
wiley   +1 more source

MLDAS: Machine Learning Dynamic Algorithm Selection for Software‐Defined Networking Security

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 5, March 2026.
ABSTRACT Network security is a critical concern in the digital landscape of today, with users demanding secure browsing experiences and protection of their personal data. This study explores the dynamic integration of Machine Learning (ML) algorithms with Software‐Defined Networking (SDN) controllers to enhance network security through adaptive ...
Pablo Benlloch   +3 more
wiley   +1 more source

High‐Resolution Neural Network‐Based Teaching Skill Development for Teachers in Edge Computing Environment

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
Where user devices include cell phones, tablets, laptops, and so on, which communicate with edge computing servers and use computational as well as storage resources provided by edge computing. Network connectivity is the core component of edge computing, which allows communication between mobile devices and edge computing nodes.
Genlian Zhang
wiley   +1 more source

Digital Twin Integration in Project Life Cycle Management—A Review

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
This study explores the integration of digital twin (DT) technology within project life cycle management (PLM), focusing on its transformative impact on industries like aerospace, automotive, healthcare, and construction. By creating real‐time virtual models synchronized with physical assets, DTs enable predictive maintenance, operational optimization,
Md. Injamamul Haque Protyai   +2 more
wiley   +1 more source

Survey of research on encrypted traffic classification based on machine learning

open access: yesTongxin xuebao
Encrypted traffic classification was an important component of network management and security protection. However, the complexity and variability of the current network traffic environment rendered traditional classification methods largely ineffective.
FU Yu, LIU Taotao, WANG Kun, YU Yihan
doaj  

Application of Embodied Intelligence in Intelligent Warehousing and Logistics Scenarios

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
Embodied intelligence (EI) enhances digital platform efficiency in intelligent logistics, reducing transportation costs, improving throughput by 37.5%, and lowering energy consumption. EI‐driven improvements lead to discriminatory pricing strategies, while lightweight encryption ensures minimal performance overhead, maintaining real‐time operations ...
Jun Zhang, Chuan Zhang, Mingtao Zhang
wiley   +1 more source

HADA: A Hybrid Anomaly Detection Approach Using Unsupervised Machine Learning

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
Overview of HADA, an unsupervised fraud detection pipeline that preprocesses and scales transaction data, applies PCA for dimensionality reduction, scores anomalies using Isolation Forest, selects anomalous transactions via thresholding, and clusters the selected anomalies using Agglomerative Hierarchical Clustering (AHC) to produce interpretable ...
Francis Thiong'o   +3 more
wiley   +1 more source

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, Volume 14, Issue 3, Page 1431-1455, March 2026.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

f‐Block Element‐Based MOF Thin Films: A Platform for Luminescence, Sensing, and Energy Applications

open access: yesSmall, Volume 22, Issue 16, 17 March 2026.
f‐Block element–based metal–organic framework (f‐MOF) thin films offer exceptional potential for luminescent, sensing, and energy‐related applications. This review surveys recent progress in their synthesis, characterization, and functional implementation, emphasizing the diversity of available thin‐film fabrication strategies. The convergence of these
Dong‐Hui Chen, Christof Wöll
wiley   +1 more source

Home - About - Disclaimer - Privacy