Results 41 to 50 of about 1,873 (195)

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

Digital Rights Activism in Multilevel Governance

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT Multilevel governance (MLG) without a clear hierarchical structure can create power imbalances among various actors, particularly in settings with overlapping jurisdictions and policy areas. This dynamic is especially pronounced in Internet governance, which faces a complex interplay of domestic laws, state interdependence, and heightened ...
Alison Harcourt
wiley   +1 more source

Managing the margins: Practitioner perspectives on barriers and solutions for biodiversity‐friendly roadside management in Germany

open access: yesPeople and Nature, EarlyView.
Abstract Roadsides can provide habitats, refuges and corridors for various plant and insect species. Preserving and enhancing these ecosystems can mitigate biodiversity loss and improve connectivity in fragmented landscapes. Despite growing evidence supporting biodiversity‐friendly management strategies, large‐scale implementation has not been realized.
Hanna S. Paikert   +4 more
wiley   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Classifying Tor Traffic Encrypted Payload Using Machine Learning

open access: yesIEEE Access
Tor, a network offering Internet anonymity, presented both positive and potentially malicious applications, leading to the need for efficient Tor traffic monitoring. While most current traffic classification methods rely on flow-based features, these can
Pitpimon Choorod   +2 more
doaj   +1 more source

Beyond 5G and Non‐terrestrial Network (NTN) Integrated Architecture: Access Challenges for Expanding Artificial Intelligence of Things (AIoT)

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley   +1 more source

GSPB: a global-statistic and packet-byte fusion framework for encrypted traffic classification

open access: yesCybersecurity
While encrypted traffic protects user privacy and data security, it is also frequently exploited by malicious actors for illegal activities, e.g., phishing and malware distribution.
Haiyue Li   +4 more
doaj   +1 more source

Granular classifier: Building traffic granules for encrypted traffic classification based on granular computing

open access: yesDigital Communications and Networks
Accurate classification of encrypted traffic plays an important role in network management. However, current methods confronts several problems: inability to characterize traffic that exhibits great dispersion, inability to classify traffic with multi ...
Xuyang Jing   +4 more
doaj   +1 more source

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Fast and Accurate Multi-Task Learning for Encrypted Network Traffic Classification

open access: yesApplied Sciences
The classification of encrypted traffic plays a crucial role in network management and security. As encrypted network traffic becomes increasingly complicated and challenging to analyze, there is a growing need for more efficient and comprehensive ...
Jee-Tae Park   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy