Results 101 to 110 of about 27,602 (172)
Semi-Supervised Encrypted Malicious Traffic Detection Based on Multimodal Traffic Characteristics
The exponential growth of encrypted network traffic poses significant challenges for detecting malicious activities online. The scale of emerging malicious traffic is significantly smaller than that of normal traffic, and the imbalanced data distribution
Ming Liu +3 more
doaj +1 more source
A Hybrid Encryption Framework for Secure and Real‐Time Vehicular Communications
ABSTRACT The rapid expansion of Vehicular Ad Hoc Networks (VANETs) has amplified concerns regarding data security, integrity, and privacy. This paper presents SECURIDE, a Secure Intelligent Data Exchange for Connected Vehicles that provides a comprehensive encryption–decryption framework for safeguarding multimedia data and communication channels in ...
Muhammad Usama, Muhammad Usman Hadi
wiley +1 more source
This review examines the integration of federated learning (FL) in the Internet of Medical Things (IoMT), enhanced by 5G/6G technologies, to improve healthcare systems with decentralized data processing, enhanced privacy, reduced latency, and efficient resource utilization, while addressing emerging challenges and future research directions.
Abdul Ahad +6 more
wiley +1 more source
Edge Computing in Healthcare Using Machine Learning: A Systematic Literature Review
Three key parts of our review. This review examines recent research on integrating machine learning with edge computing in healthcare. It is structured around three key parts: the demographic characteristics of the selected studies; the themes, tools, motivations, and data sources; and the key limitations, challenges, and future research directions ...
Amir Mashmool +7 more
wiley +1 more source
ABSTRACT Background The preschool years (ages 3–5) represent a critical window for promoting development and lifelong health. However, in many low‐resource settings, developmental delays, sensory impairments and emerging health risks often go undetected.
Robyn Smith +12 more
wiley +1 more source
As cyber-attacks increase in unencrypted communication environments such as the traditional Internet, protected communication channels based on cryptographic protocols, such as transport layer security (TLS), have been introduced to the Internet ...
Il Hwan Ji +5 more
doaj +1 more source
A cybersecurity risk analysis framework for systems with artificial intelligence components
Abstract The introduction of the European Union Artificial Intelligence (AI) Act, the NIST AI Risk Management Framework, and related international norms and policy documents demand a better understanding and implementation of novel risk analysis issues when facing systems with AI components: dealing with new AI‐related impacts; incorporating AI‐based ...
J.M. Camacho +3 more
wiley +1 more source
MTDecipher: robust encrypted malicious traffic detection via multi-task graph neural networks
The widespread adoption of encrypted traffic protocols has significantly increased the challenge of detecting malicious traffic. Existing detection methods based on deep learning typically rely on fine-grained features of data packets, such as length ...
Fan Li +4 more
doaj +1 more source
LSTM guided homomorphic encryption for threat-resistant IoT networks. [PDF]
Kumar S +5 more
europepmc +1 more source
A privacy preserving intrusion detection framework for IIoT in 6G networks using homomorphic encryption and graph neural networks. [PDF]
Hua B, Xi H.
europepmc +1 more source

