Results 41 to 50 of about 27,602 (172)
Encrypted malicious traffic detection based on neural network
With the widespread application of encrypted communications, traditional malicious traffic detection methods based on content analysis have gradually become ineffective.
Xia Longfei +5 more
doaj +1 more source
A Covert Data Transport Protocol
Both enterprise and national firewalls filter network connections. For data forensics and botnet removal applications, it is important to establish the information source.
Brooks, Richard +4 more
core +1 more source
A model for the analysis of security policies in service function chains
Two emerging architectural paradigms, i.e., Software Defined Networking (SDN) and Network Function Virtualization (NFV), enable the deployment and management of Service Function Chains (SFCs).
Durante, L. +3 more
core +1 more source
Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu +4 more
wiley +1 more source
News reports of the last few years indicated that several intelligence agencies are able to monitor large networks or entire portions of the Internet backbone. Such a powerful adversary has only recently been considered by the academic literature.
Ateniese, Giuseppe +4 more
core +1 more source
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu +5 more
wiley +1 more source
A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation
The number and variety of Internet-connected devices have grown enormously in the past few years, presenting new challenges to security and privacy. Research has shown that network adversaries can use traffic rate metadata from consumer IoT devices to ...
Apthorpe, Noah +2 more
core +1 more source
ResearchConnect is an AI‐powered platform that automates researcher profiling, interdisciplinary team formation, and early‐stage research ideation. By extracting keywords from papers and web sources, it quickly clusters researchers into coherent teams and generates collaborative ideas using large language models. Validation on NSF‐funded projects shows
Akshay Vilas Jadhav +2 more
wiley +1 more source
SimCSE for Encrypted Traffic Detection and Zero-Day Attack Detection
Traffic detection has attracted much attention in recent years, playing an essential role in intrusion detection systems (IDS). This paper proposes a new approach for traffic detection at the packet level, inspired by natural language processing (NLP ...
Rotem Bar, Chen Hajaj
doaj +1 more source
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury +2 more
wiley +1 more source

