Results 41 to 50 of about 4,077 (204)

Identification of Malicious Encrypted Traffic Through Feature Fusion

open access: yesIEEE Access, 2023
The popularity of encrypted communication has grown due to increased security awareness and rapid internet development. End-to-end encryption can prevent data attacks but also poses new cybersecurity threats. Thus, identifying malicious encrypted traffic
Xianchun Zheng, Hui Li
doaj   +1 more source

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, EarlyView.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

ResearchConnect: An AI‐Powered Platform for Interdisciplinary Research Team Formation and Ideation Development

open access: yesAdvanced Intelligent Systems, EarlyView.
ResearchConnect is an AI‐powered platform that automates researcher profiling, interdisciplinary team formation, and early‐stage research ideation. By extracting keywords from papers and web sources, it quickly clusters researchers into coherent teams and generates collaborative ideas using large language models. Validation on NSF‐funded projects shows
Akshay Vilas Jadhav   +2 more
wiley   +1 more source

Network traffic classification model based on attention mechanism and spatiotemporal features

open access: yesEURASIP Journal on Information Security, 2023
Traffic classification is widely used in network security and network management. Early studies have mainly focused on mapping network traffic to different unencrypted applications, but little research has been done on network traffic classification of ...
Feifei Hu   +5 more
doaj   +1 more source

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

Analysis of Approaches to Detecting Attacks in Encrypted Traffic

open access: yesСовременные информационные технологии и IT-образование, 2021
The automatic detection of network intrusions has been under active study since the 1980s. Of particular interest is the detection of attacks in encrypted web traffic, the percentage of which on the Internet is increasing.
Marina Polyanskaya
doaj   +1 more source

Academic misconduct appeal services in China: Platform logics, self‐platformization and implications for integrity education

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Academic misconduct appeal services have quietly emerged within China's education marketplace, with commercial agencies promoting themselves on social media to assist international students facing misconduct hearings. While existing research on academic integrity has emphasized prevention and detection, far less attention has been paid to what
Gengyan Tang   +2 more
wiley   +1 more source

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

Digital Rights Activism in Multilevel Governance

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT Multilevel governance (MLG) without a clear hierarchical structure can create power imbalances among various actors, particularly in settings with overlapping jurisdictions and policy areas. This dynamic is especially pronounced in Internet governance, which faces a complex interplay of domestic laws, state interdependence, and heightened ...
Alison Harcourt
wiley   +1 more source

Practical evaluation of encrypted traffic classification based on a combined method of entropy estimation and neural networks

open access: yesETRI Journal, 2020
Encrypted traffic classification plays a vital role in cybersecurity as network traffic encryption becomes prevalent. First, we briefly introduce three traffic encryption mechanisms: IPsec, SSL/TLS, and SRTP.
Kun Zhou   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy