Results 41 to 50 of about 27,602 (172)

Encrypted malicious traffic detection based on neural network

open access: yesDianzi Jishu Yingyong
With the widespread application of encrypted communications, traditional malicious traffic detection methods based on content analysis have gradually become ineffective.
Xia Longfei   +5 more
doaj   +1 more source

A Covert Data Transport Protocol

open access: yes, 2017
Both enterprise and national firewalls filter network connections. For data forensics and botnet removal applications, it is important to establish the information source.
Brooks, Richard   +4 more
core   +1 more source

A model for the analysis of security policies in service function chains

open access: yes, 2017
Two emerging architectural paradigms, i.e., Software Defined Networking (SDN) and Network Function Virtualization (NFV), enable the deployment and management of Service Function Chains (SFCs).
Durante, L.   +3 more
core   +1 more source

Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy

open access: yesAdvanced Science, EarlyView.
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu   +4 more
wiley   +1 more source

No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position

open access: yes, 2015
News reports of the last few years indicated that several intelligence agencies are able to monitor large networks or entire portions of the Internet backbone. Such a powerful adversary has only recently been considered by the academic literature.
Ateniese, Giuseppe   +4 more
core   +1 more source

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, EarlyView.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation

open access: yes, 2018
The number and variety of Internet-connected devices have grown enormously in the past few years, presenting new challenges to security and privacy. Research has shown that network adversaries can use traffic rate metadata from consumer IoT devices to ...
Apthorpe, Noah   +2 more
core   +1 more source

ResearchConnect: An AI‐Powered Platform for Interdisciplinary Research Team Formation and Ideation Development

open access: yesAdvanced Intelligent Systems, EarlyView.
ResearchConnect is an AI‐powered platform that automates researcher profiling, interdisciplinary team formation, and early‐stage research ideation. By extracting keywords from papers and web sources, it quickly clusters researchers into coherent teams and generates collaborative ideas using large language models. Validation on NSF‐funded projects shows
Akshay Vilas Jadhav   +2 more
wiley   +1 more source

SimCSE for Encrypted Traffic Detection and Zero-Day Attack Detection

open access: yesIEEE Access, 2022
Traffic detection has attracted much attention in recent years, playing an essential role in intrusion detection systems (IDS). This paper proposes a new approach for traffic detection at the packet level, inspired by natural language processing (NLP ...
Rotem Bar, Chen Hajaj
doaj   +1 more source

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy