Results 51 to 60 of about 4,077 (204)
SAE-based Encrypted Traffic Identification Method [PDF]
To solve the problem that encrypted traffic identification methods based on machine learning are low in accuracy and time-consuming and costly in feature extraction and selection,this paper proposes a Stacked Autoencoder (SAE)-based encrypted traffic ...
WANG Pan,CHEN Xuejiao
doaj +1 more source
Abstract Roadsides can provide habitats, refuges and corridors for various plant and insect species. Preserving and enhancing these ecosystems can mitigate biodiversity loss and improve connectivity in fragmented landscapes. Despite growing evidence supporting biodiversity‐friendly management strategies, large‐scale implementation has not been realized.
Hanna S. Paikert +4 more
wiley +1 more source
CNN-based Encrypted C&C Communication Traffic Identification Method [PDF]
In order to achieve accurate identification of malware encrypted C&C communication traffic,this paper analyzes the https communication process of normal Webpage browsing access and C&C communication,discovers the server independence feature of ...
CHENG Hua, XIE Jinxin, CHEN Lihuang
doaj +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
Malicious Encrypted Traffic Detection Method Based on Conversation Statistical Encoder Model [PDF]
With the development and widespread application of network technology,encrypted traffic has become a key technology for protecting user privacy.However,malware and attackers also use encrypted traffic to hide their behaviors and evade traditional network
GONG Siyue, LIU Hui, WANG Baohui
doaj +1 more source
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley +1 more source
Bootstrap Forest based method for Encrypted Network Traffic Analysis
Encrypting communications and data over the Internet becomes essential in ensuring the privacy of communications and protecting the data from increasing threats. Hence, majority of Internet traffic and networked communications are encrypted now. However,
Shobana Durairaju +1 more
doaj +1 more source
Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi +2 more
wiley +1 more source
Lifecycle‐Based Governance to Build Reliable Ethical AI Systems
ABSTRACT Artificial intelligence (AI) systems represent a paradigm shift in technological capabilities, offering transformative potential across industries while introducing novel governance and implementation challenges. This paper presents a comprehensive framework for understanding AI systems through three critical dimensions: trustworthiness ...
Maikel Leon
wiley +1 more source
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha +9 more
wiley +1 more source

