Results 81 to 90 of about 1,873 (195)

Federated Learning and 5G/6G‐Based Internet of Medical Things (IoMT): Applications, Key Enabling Technologies, Open Issues and Future Research Directions

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 1, March 2026.
This review examines the integration of federated learning (FL) in the Internet of Medical Things (IoMT), enhanced by 5G/6G technologies, to improve healthcare systems with decentralized data processing, enhanced privacy, reduced latency, and efficient resource utilization, while addressing emerging challenges and future research directions.
Abdul Ahad   +6 more
wiley   +1 more source

Bootstrap Forest based method for Encrypted Network Traffic Analysis

open access: yesJournal of Information and Organizational Sciences
Encrypting communications and data over the Internet becomes essential in ensuring the privacy of communications and protecting the data from increasing threats. Hence, majority of Internet traffic and networked communications are encrypted now. However,
Shobana Durairaju   +1 more
doaj   +1 more source

Edge Computing in Healthcare Using Machine Learning: A Systematic Literature Review

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 1, March 2026.
Three key parts of our review. This review examines recent research on integrating machine learning with edge computing in healthcare. It is structured around three key parts: the demographic characteristics of the selected studies; the themes, tools, motivations, and data sources; and the key limitations, challenges, and future research directions ...
Amir Mashmool   +7 more
wiley   +1 more source

Transitioning to a Flexible, Tiered, Developmentally Informed Same‐Day Screening Model for Preschoolers in Low‐Resource Settings

open access: yesChild: Care, Health and Development, Volume 52, Issue 2, March 2026.
ABSTRACT Background The preschool years (ages 3–5) represent a critical window for promoting development and lifelong health. However, in many low‐resource settings, developmental delays, sensory impairments and emerging health risks often go undetected.
Robyn Smith   +12 more
wiley   +1 more source

CLSTM-MT (a Combination of 2-Conv CNN and BiLSTM Under the Mean Teacher Collaborative Learning Framework): Encryption Traffic Classification Based on CLSTM (a Combination of 2-Conv CNN and BiLSTM) and Mean Teacher Collaborative Learning

open access: yesApplied Sciences
The identification and classification of network traffic are crucial for maintaining network security, optimizing network management, and ensuring reliable service quality.
Xiaozong Qiu, Guohua Yan, Lihua Yin
doaj   +1 more source

A cybersecurity risk analysis framework for systems with artificial intelligence components

open access: yesInternational Transactions in Operational Research, Volume 33, Issue 2, Page 798-825, March 2026.
Abstract The introduction of the European Union Artificial Intelligence (AI) Act, the NIST AI Risk Management Framework, and related international norms and policy documents demand a better understanding and implementation of novel risk analysis issues when facing systems with AI components: dealing with new AI‐related impacts; incorporating AI‐based ...
J.M. Camacho   +3 more
wiley   +1 more source

Encrypted Traffic Classification in Anonymity Networks

open access: yes
Anonymity networks are becoming increasingly popular in today's online world as more users attempt to safeguard their online privacy. Tor is currently the most popular anonymity network and provides anonymity to users and services (hidden services). However, the anonymity provided by Tor is also being misused in various ways.
openaire   +2 more sources

CLASSIFICATION FEATURES OF ENCRYPTED NETWORK TRAFFIC

open access: yesIZVESTIYA SFedU. ENGINEERING SCIENCES, 2020
N. V. Boldyrikhin   +2 more
openaire   +2 more sources

A graph representation framework for encrypted network traffic classification

open access: yesComputers & Security
Network Traffic Classification (NTC) is crucial for ensuring internet security, but encryption presents significant challenges to this task. While Machine Learning (ML) and Deep Learning (DL) methods have shown promise, issues such as limited representativeness leading to sub-optimal generalizations and performance remain prevalent.
Zulu Okonkwo   +4 more
openaire   +2 more sources

Bridging packet and session: Cross-level dual-attention networks for encrypted traffic classification

open access: yesJournal of King Saud University: Computer and Information Sciences
The widespread adoption of encryption technologies has greatly increased the complexity of network traffic classification, as plaintext features such as DNS are increasingly unavailable.
Jieming Gu, Yue Zhong, Xiangzhan Yu
doaj   +1 more source

Home - About - Disclaimer - Privacy