Results 51 to 60 of about 36,419 (228)

Digital Rights Activism in Multilevel Governance

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT Multilevel governance (MLG) without a clear hierarchical structure can create power imbalances among various actors, particularly in settings with overlapping jurisdictions and policy areas. This dynamic is especially pronounced in Internet governance, which faces a complex interplay of domestic laws, state interdependence, and heightened ...
Alison Harcourt
wiley   +1 more source

Identification technique of cryptomining behavior based on traffic features

open access: yesFrontiers in Physics, 2023
Recently, the growth of blockchain technology and the economic benefits of cryptocurrencies have led to a proliferation of malicious cryptomining activities on the internet, resulting in significant losses for companies and institutions.
Lijian Dong   +4 more
doaj   +1 more source

Managing the margins: Practitioner perspectives on barriers and solutions for biodiversity‐friendly roadside management in Germany

open access: yesPeople and Nature, EarlyView.
Abstract Roadsides can provide habitats, refuges and corridors for various plant and insect species. Preserving and enhancing these ecosystems can mitigate biodiversity loss and improve connectivity in fragmented landscapes. Despite growing evidence supporting biodiversity‐friendly management strategies, large‐scale implementation has not been realized.
Hanna S. Paikert   +4 more
wiley   +1 more source

Large-Scale Mobile App Identification Using Deep Learning

open access: yesIEEE Access, 2020
Many network services and tools (e.g. network monitors, malware-detection systems, routing and billing policy enforcement modules in ISPs) depend on identifying the type of traffic that passes through the network.
Shahbaz Rezaei, Bryce Kroencke, Xin Liu
doaj   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Lifecycle‐Based Governance to Build Reliable Ethical AI Systems

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT Artificial intelligence (AI) systems represent a paradigm shift in technological capabilities, offering transformative potential across industries while introducing novel governance and implementation challenges. This paper presents a comprehensive framework for understanding AI systems through three critical dimensions: trustworthiness ...
Maikel Leon
wiley   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Multi-level Pruning Obfs4 Obfuscated Traffic Recognition Method Based on Partial Data [PDF]

open access: yesJisuanji kexue
Obfs4 obfuscated traffic,carried by the anonymous communication network Tor,is often misused for illicit online acti-vities due to its strong anonymity.Consequently,the identification of Obfs4 obfuscated traffic plays a critical role in preventing ...
XU Chenhan, HUANG He, SUN Yu'e, DU Yang
doaj   +1 more source

Keystroke biometrics in the encrypted domain: a first study on search suggestion functions of web search engines

open access: yesEURASIP Journal on Information Security, 2020
A feature of search engines is prediction and suggestion to complete or extend input query phrases, i.e. search suggestion functions (SSF). Given the immediate temporal nature of this functionality, alongside the character submitted to trigger each ...
Nicholas Whiskerd   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy