Results 71 to 80 of about 4,077 (204)

A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley   +1 more source

Estimating QoE from Encrypted Video Conferencing Traffic

open access: yesSensors
Traffic encryption is vital for internet security but complicates analytical applications like video delivery optimization or quality of experience (QoE) estimation, which often rely on clear text data. While many models address the problem of QoE prediction in video streaming, the video conferencing (VC) domain remains underexplored despite rising ...
Michael Sidorov   +3 more
openaire   +3 more sources

GPU-accelerated encrypted network traffic inspection

open access: yesACM Celebration of Women in Computing: womENcourage 2019 (womENcourage 2019), 2019
Statistics show that more than 60% of the Internet traffic is now encrypted, while this percentage is constantly increasing. The majority of communications are secured using common encryption protocols such as SSL/TLS and IPsec in order to ensure security and protect the privacy of Internet users. Traditionally, Internet traffic analysis and monitoring
Papadogiannaki, Eva, Sotiris Ioannidis
openaire   +1 more source

The Plural Lives of E‐Waste: Valuation and Contestation in Accra's Recycling Network(s)

open access: yesThe Geographical Journal, EarlyView.
Short Abstract Electronic waste (e‐waste) in Accra is shown to be plural and ontologically multiple, enacted as livelihood, commodity, hazard, governance object and political actor across dispersed recycling networks. Using a multi‐sited, follow‐the‐thing approach and 60 interviews, I specify four socio‐material mechanisms (i.e., copper's market tempo,
Ebenezer Gyampoh Amoah
wiley   +1 more source

GSPB: a global-statistic and packet-byte fusion framework for encrypted traffic classification

open access: yesCybersecurity
While encrypted traffic protects user privacy and data security, it is also frequently exploited by malicious actors for illegal activities, e.g., phishing and malware distribution.
Haiyue Li   +4 more
doaj   +1 more source

A Perspective From the British Society of Dental Hygiene and Therapy Members Regarding the Need for Clinical Support by a Dental Nurse

open access: yesInternational Journal of Dental Hygiene, EarlyView.
ABSTRACT Objectives In the United Kingdom (UK), Dental Hygienists (DHs) and Dental Therapists (DTs) are required by the UK's regulatory body, the General Dental Council, to “… be appropriately supported when treating patients”. However, what is deemed ‘appropriate support’, and the need for that support, has been ‘open to interpretation’, and ...
Debbie Reed   +4 more
wiley   +1 more source

Generative AI Implementation in Enterprises: Lessons From a Case Study of Enhanced IT Service Management

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT The recent rise of Generative Artificial Intelligence (GenAI) is fundamentally changing the way businesses operate, with many now investing heavily in this technology. However, businesses are still exploring ways to extract value from GenAI and develop organisational capabilities.
Ashish Jagdish Sharma   +4 more
wiley   +1 more source

Inflammatory and Immunological Basis of Periodontal Diseases

open access: yesJournal of Periodontal Research, EarlyView.
The periodontal lesion emerges as an evolving immunological battlefield, where host–microbiome interactions, dysregulated immune responses, fragile resolution mechanisms, and inflammophilic dysbiosis converge to shift the balance from homeostasis to unrestrained tissue destruction.
Giacomo Baima   +3 more
wiley   +1 more source

Enmob: Unveil the Behavior with Multi-flow Analysis of Encrypted App Traffic

open access: yesCybersecurity
In the contemporary digital landscape, mobile applications have become the predominant conduit for internet connectivity and daily tasks. Simultaneously, the advent of application encryption technology has safeguarded users’ privacy.
Ge Mengmeng   +6 more
doaj   +1 more source

Deep Learning for Encrypted Traffic Classification and Unknown Data Detection. [PDF]

open access: yesSensors (Basel), 2022
Pathmaperuma MH   +3 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy