Results 51 to 60 of about 27,602 (172)

Academic misconduct appeal services in China: Platform logics, self‐platformization and implications for integrity education

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Academic misconduct appeal services have quietly emerged within China's education marketplace, with commercial agencies promoting themselves on social media to assist international students facing misconduct hearings. While existing research on academic integrity has emphasized prevention and detection, far less attention has been paid to what
Gengyan Tang   +2 more
wiley   +1 more source

Malicious Encrypted Traffic Detection Method Based on Conversation Statistical Encoder Model [PDF]

open access: yesJisuanji kexue
With the development and widespread application of network technology,encrypted traffic has become a key technology for protecting user privacy.However,malware and attackers also use encrypted traffic to hide their behaviors and evade traditional network
GONG Siyue, LIU Hui, WANG Baohui
doaj   +1 more source

Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware

open access: yesSensors, 2021
More than 75% of Internet traffic is now encrypted, and this percentage is constantly increasing. The majority of communications are secured using common encryption protocols such as SSL/TLS and IPsec to ensure security and protect the privacy of ...
Eva Papadogiannaki, Sotiris Ioannidis
doaj   +1 more source

NoSEBrEaK - Attacking Honeynets

open access: yes, 2004
It is usually assumed that Honeynets are hard to detect and that attempts to detect or disable them can be unconditionally monitored. We scrutinize this assumption and demonstrate a method how a host in a honeynet can be completely controlled by an ...
Dornseif, Maximillian   +2 more
core   +1 more source

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

Digital Rights Activism in Multilevel Governance

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT Multilevel governance (MLG) without a clear hierarchical structure can create power imbalances among various actors, particularly in settings with overlapping jurisdictions and policy areas. This dynamic is especially pronounced in Internet governance, which faces a complex interplay of domestic laws, state interdependence, and heightened ...
Alison Harcourt
wiley   +1 more source

Scheme for identifying malware traffic with TLS data based on machine learning

open access: yes网络与信息安全学报, 2020
Based on analyzing the characteristics of transport layer security (TLS) protocol,a distributed automation malicious traffic detecting system based on machine learning was designed.The characteristics of encrypted malware traffic from TLS data,observable
Ziming LUO, Shubin XU, Xiaodong LIU
doaj   +3 more sources

Managing the margins: Practitioner perspectives on barriers and solutions for biodiversity‐friendly roadside management in Germany

open access: yesPeople and Nature, EarlyView.
Abstract Roadsides can provide habitats, refuges and corridors for various plant and insect species. Preserving and enhancing these ecosystems can mitigate biodiversity loss and improve connectivity in fragmented landscapes. Despite growing evidence supporting biodiversity‐friendly management strategies, large‐scale implementation has not been realized.
Hanna S. Paikert   +4 more
wiley   +1 more source

Encrypted traffic identification scheme based on sliding window and randomness features

open access: yes网络与信息安全学报
With the development of information technology, network security has increasingly become a focal point for users and organizations, and encrypted data transmission has gradually become mainstream. This trend has driven the proportion of encrypted traffic
Jiachi LIU, Boyu KUANG, Mang SU, Yaqian XU, Anmin FU
doaj   +3 more sources

Automatic Intent-Based Secure Service Creation Through a Multilayer SDN Network Orchestration

open access: yes, 2018
Growing traffic demands and increasing security awareness are driving the need for secure services. Current solutions require manual configuration and deployment based on the customer's requirements.
Autenrieth, Achim   +7 more
core   +1 more source

Home - About - Disclaimer - Privacy