Results 91 to 100 of about 36,419 (228)

Federated Learning and 5G/6G‐Based Internet of Medical Things (IoMT): Applications, Key Enabling Technologies, Open Issues and Future Research Directions

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 1, March 2026.
This review examines the integration of federated learning (FL) in the Internet of Medical Things (IoMT), enhanced by 5G/6G technologies, to improve healthcare systems with decentralized data processing, enhanced privacy, reduced latency, and efficient resource utilization, while addressing emerging challenges and future research directions.
Abdul Ahad   +6 more
wiley   +1 more source

Robust Network Traffic Classification Based on Information Bottleneck Neural Network

open access: yesIEEE Access
Network Traffic Classification (NTC) plays a critical role in modern network security and management, used in various applications such as performance monitoring, anomaly detection, and bandwidth management.
Wei Lin, Yu Chen
doaj   +1 more source

Edge Computing in Healthcare Using Machine Learning: A Systematic Literature Review

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 1, March 2026.
Three key parts of our review. This review examines recent research on integrating machine learning with edge computing in healthcare. It is structured around three key parts: the demographic characteristics of the selected studies; the themes, tools, motivations, and data sources; and the key limitations, challenges, and future research directions ...
Amir Mashmool   +7 more
wiley   +1 more source

Transitioning to a Flexible, Tiered, Developmentally Informed Same‐Day Screening Model for Preschoolers in Low‐Resource Settings

open access: yesChild: Care, Health and Development, Volume 52, Issue 2, March 2026.
ABSTRACT Background The preschool years (ages 3–5) represent a critical window for promoting development and lifelong health. However, in many low‐resource settings, developmental delays, sensory impairments and emerging health risks often go undetected.
Robyn Smith   +12 more
wiley   +1 more source

A cybersecurity risk analysis framework for systems with artificial intelligence components

open access: yesInternational Transactions in Operational Research, Volume 33, Issue 2, Page 798-825, March 2026.
Abstract The introduction of the European Union Artificial Intelligence (AI) Act, the NIST AI Risk Management Framework, and related international norms and policy documents demand a better understanding and implementation of novel risk analysis issues when facing systems with AI components: dealing with new AI‐related impacts; incorporating AI‐based ...
J.M. Camacho   +3 more
wiley   +1 more source

Privacy-Driven Webpage Fingerprinting Using Encrypted Traffic Packet Lengths

open access: yesProceedings of the International Conference on Applied Innovations in IT
Despite using encryption protocols such as HTTPS, web page fingerprinting poses significant privacy risks, even when traffic analysis is used to identify specific web pages visited by users.
Sahlah Abd Ali, Ielaf Osamah Abdulmajeed
doaj   +1 more source

Survey of industrial Internet traffic analysis technology

open access: yesTongxin xuebao
To gain an in-depth awareness of the application of traffic analysis technology in the industrial Internet, the differences between the industrial Internet and the traditional Internet through the five core traffic analysis processes were illustrated. By
LIU Qixu   +7 more
doaj   +2 more sources

A New Encrypted Traffic Identification Model Based on VAE-LSTM-DRN

open access: yesComputers, Materials & Continua
Haizhen Wang, Jinying Yan, Na Jia
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy