Results 61 to 70 of about 1,873 (195)

LAMBERT: Leveraging Attention Mechanisms to Improve the BERT Fine-Tuning Model for Encrypted Traffic Classification

open access: yesMathematics
Encrypted traffic classification is a crucial part of privacy-preserving research. With the great success of artificial intelligence technology in fields such as image recognition and natural language processing, how to classify encrypted traffic based ...
Tao Liu   +6 more
doaj   +1 more source

Survey of research on encrypted traffic classification based on machine learning

open access: yesTongxin xuebao
Encrypted traffic classification was an important component of network management and security protection. However, the complexity and variability of the current network traffic environment rendered traditional classification methods largely ineffective.
FU Yu, LIU Taotao, WANG Kun, YU Yihan
doaj  

The Plural Lives of E‐Waste: Valuation and Contestation in Accra's Recycling Network(s)

open access: yesThe Geographical Journal, EarlyView.
Short Abstract Electronic waste (e‐waste) in Accra is shown to be plural and ontologically multiple, enacted as livelihood, commodity, hazard, governance object and political actor across dispersed recycling networks. Using a multi‐sited, follow‐the‐thing approach and 60 interviews, I specify four socio‐material mechanisms (i.e., copper's market tempo,
Ebenezer Gyampoh Amoah
wiley   +1 more source

A Perspective From the British Society of Dental Hygiene and Therapy Members Regarding the Need for Clinical Support by a Dental Nurse

open access: yesInternational Journal of Dental Hygiene, EarlyView.
ABSTRACT Objectives In the United Kingdom (UK), Dental Hygienists (DHs) and Dental Therapists (DTs) are required by the UK's regulatory body, the General Dental Council, to “… be appropriately supported when treating patients”. However, what is deemed ‘appropriate support’, and the need for that support, has been ‘open to interpretation’, and ...
Debbie Reed   +4 more
wiley   +1 more source

Generative AI Implementation in Enterprises: Lessons From a Case Study of Enhanced IT Service Management

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT The recent rise of Generative Artificial Intelligence (GenAI) is fundamentally changing the way businesses operate, with many now investing heavily in this technology. However, businesses are still exploring ways to extract value from GenAI and develop organisational capabilities.
Ashish Jagdish Sharma   +4 more
wiley   +1 more source

CoTNeT: Contextual transformer network for encrypted traffic classification

open access: yesEgyptian Informatics Journal
As network infrastructures continue to grow and traffic encryption technologies evolve at a rapid pace, the task of classifying encrypted traffic has become significantly more intricate.
Hong Huang   +4 more
doaj   +1 more source

Transport Layer Security-Encrypted Abnormal Traffic Detection Based on Supervised Autoencoder [PDF]

open access: yesJisuanji gongcheng
As user awareness of privacy protection increases, an increasing number of websites and services are employing the Transport Layer Security (TLS) protocol to safeguard user data.
YANG Mingfen, GAN Yun, ZHANG Xingpeng
doaj   +1 more source

Generalized Encrypted Traffic Classification Using Inter-flow Signals

open access: yes
In this paper, we present a novel encrypted traffic classification model that operates directly on raw PCAP data without requiring prior assumptions about traffic type. Unlike existing methods, it is generalizable across multiple classification tasks and leverages inter-flow signals - an innovative representation that captures temporal correlations and
Federica Bianchi   +2 more
openaire   +3 more sources

Inflammatory and Immunological Basis of Periodontal Diseases

open access: yesJournal of Periodontal Research, EarlyView.
The periodontal lesion emerges as an evolving immunological battlefield, where host–microbiome interactions, dysregulated immune responses, fragile resolution mechanisms, and inflammophilic dysbiosis converge to shift the balance from homeostasis to unrestrained tissue destruction.
Giacomo Baima   +3 more
wiley   +1 more source

Deep Learning for Encrypted Traffic Classification and Unknown Data Detection. [PDF]

open access: yesSensors (Basel), 2022
Pathmaperuma MH   +3 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy