Results 81 to 90 of about 1,873 (195)
This review examines the integration of federated learning (FL) in the Internet of Medical Things (IoMT), enhanced by 5G/6G technologies, to improve healthcare systems with decentralized data processing, enhanced privacy, reduced latency, and efficient resource utilization, while addressing emerging challenges and future research directions.
Abdul Ahad +6 more
wiley +1 more source
Bootstrap Forest based method for Encrypted Network Traffic Analysis
Encrypting communications and data over the Internet becomes essential in ensuring the privacy of communications and protecting the data from increasing threats. Hence, majority of Internet traffic and networked communications are encrypted now. However,
Shobana Durairaju +1 more
doaj +1 more source
Edge Computing in Healthcare Using Machine Learning: A Systematic Literature Review
Three key parts of our review. This review examines recent research on integrating machine learning with edge computing in healthcare. It is structured around three key parts: the demographic characteristics of the selected studies; the themes, tools, motivations, and data sources; and the key limitations, challenges, and future research directions ...
Amir Mashmool +7 more
wiley +1 more source
ABSTRACT Background The preschool years (ages 3–5) represent a critical window for promoting development and lifelong health. However, in many low‐resource settings, developmental delays, sensory impairments and emerging health risks often go undetected.
Robyn Smith +12 more
wiley +1 more source
The identification and classification of network traffic are crucial for maintaining network security, optimizing network management, and ensuring reliable service quality.
Xiaozong Qiu, Guohua Yan, Lihua Yin
doaj +1 more source
A cybersecurity risk analysis framework for systems with artificial intelligence components
Abstract The introduction of the European Union Artificial Intelligence (AI) Act, the NIST AI Risk Management Framework, and related international norms and policy documents demand a better understanding and implementation of novel risk analysis issues when facing systems with AI components: dealing with new AI‐related impacts; incorporating AI‐based ...
J.M. Camacho +3 more
wiley +1 more source
Encrypted Traffic Classification in Anonymity Networks
Anonymity networks are becoming increasingly popular in today's online world as more users attempt to safeguard their online privacy. Tor is currently the most popular anonymity network and provides anonymity to users and services (hidden services). However, the anonymity provided by Tor is also being misused in various ways.
openaire +2 more sources
CLASSIFICATION FEATURES OF ENCRYPTED NETWORK TRAFFIC
N. V. Boldyrikhin +2 more
openaire +2 more sources
A graph representation framework for encrypted network traffic classification
Network Traffic Classification (NTC) is crucial for ensuring internet security, but encryption presents significant challenges to this task. While Machine Learning (ML) and Deep Learning (DL) methods have shown promise, issues such as limited representativeness leading to sub-optimal generalizations and performance remain prevalent.
Zulu Okonkwo +4 more
openaire +2 more sources
The widespread adoption of encryption technologies has greatly increased the complexity of network traffic classification, as plaintext features such as DNS are increasingly unavailable.
Jieming Gu, Yue Zhong, Xiangzhan Yu
doaj +1 more source

