Results 151 to 160 of about 4,077 (204)
Data security storage and transmission framework for AI computing power platforms. [PDF]
Chen J +5 more
europepmc +1 more source
A multi-branch feature enhancement-based detection and hierarchical chaotic encryption fusion method for sensitive targets in remote sensing images. [PDF]
Zhang Q, Wang H, Li X, Zhang S, Liu J.
europepmc +1 more source
FFT-RDNet: A Time-Frequency-Domain-Based Intrusion Detection Model for IoT Security. [PDF]
Xiang B +4 more
europepmc +1 more source
A cooperative ECC-based authentication protocol for VANETs. [PDF]
Liu Z, Yao N, Bai S, Mai T.
europepmc +1 more source
Hybrid cryptographic approach for strengthening IoT and 5G/B5G network security. [PDF]
Kumar A, Singh P, Kamble DP, Singh I.
europepmc +1 more source
Hopf-Hopf bifurcation analysis and chaotic delayed-DNA audio encryption using cubic nonlinear optoelectronic oscillator. [PDF]
Aiyaz M +6 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Encrypted Traffic Classification Based on Traffic Reconstruction
2021 4th International Conference on Artificial Intelligence and Big Data (ICAIBD), 2021Network traffic classification is to classify network traffic into related traffic types, which plays a significant role in network management and network security. It can guarantee the quality of service of the network, and guarantee network security by intercepting malware traffic.
Qianli Ma +3 more
openaire +1 more source
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Long Term Evolution (LTE) provides the communication infrastructure for both professional and private use cases and has become an integral part of our everyday life. Even though LTE/4G overcomes many security issues of previous standards, recent work demonstrates several attack vectors on the physical and network layers of the LTE stack. We do, however,
Katharina Kohls +3 more
openaire +1 more source
Long Term Evolution (LTE) provides the communication infrastructure for both professional and private use cases and has become an integral part of our everyday life. Even though LTE/4G overcomes many security issues of previous standards, recent work demonstrates several attack vectors on the physical and network layers of the LTE stack. We do, however,
Katharina Kohls +3 more
openaire +1 more source
Encrypted Traffic Classification
2020With the increasing emphasis on information security by users, many encrypted traffic is being transmitted over the network. However, even if the data is encrypted, it is not enough to protect the privacy of users. There exist techniques to classify encrypted traffic.
Yuxiang Ma, Yulei Wu, Jingguo Ge
openaire +1 more source

