Results 51 to 60 of about 36,419 (228)
Digital Rights Activism in Multilevel Governance
ABSTRACT Multilevel governance (MLG) without a clear hierarchical structure can create power imbalances among various actors, particularly in settings with overlapping jurisdictions and policy areas. This dynamic is especially pronounced in Internet governance, which faces a complex interplay of domestic laws, state interdependence, and heightened ...
Alison Harcourt
wiley +1 more source
Identification technique of cryptomining behavior based on traffic features
Recently, the growth of blockchain technology and the economic benefits of cryptocurrencies have led to a proliferation of malicious cryptomining activities on the internet, resulting in significant losses for companies and institutions.
Lijian Dong +4 more
doaj +1 more source
Abstract Roadsides can provide habitats, refuges and corridors for various plant and insect species. Preserving and enhancing these ecosystems can mitigate biodiversity loss and improve connectivity in fragmented landscapes. Despite growing evidence supporting biodiversity‐friendly management strategies, large‐scale implementation has not been realized.
Hanna S. Paikert +4 more
wiley +1 more source
Large-Scale Mobile App Identification Using Deep Learning
Many network services and tools (e.g. network monitors, malware-detection systems, routing and billing policy enforcement modules in ISPs) depend on identifying the type of traffic that passes through the network.
Shahbaz Rezaei, Bryce Kroencke, Xin Liu
doaj +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi +2 more
wiley +1 more source
Lifecycle‐Based Governance to Build Reliable Ethical AI Systems
ABSTRACT Artificial intelligence (AI) systems represent a paradigm shift in technological capabilities, offering transformative potential across industries while introducing novel governance and implementation challenges. This paper presents a comprehensive framework for understanding AI systems through three critical dimensions: trustworthiness ...
Maikel Leon
wiley +1 more source
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha +9 more
wiley +1 more source
Multi-level Pruning Obfs4 Obfuscated Traffic Recognition Method Based on Partial Data [PDF]
Obfs4 obfuscated traffic,carried by the anonymous communication network Tor,is often misused for illicit online acti-vities due to its strong anonymity.Consequently,the identification of Obfs4 obfuscated traffic plays a critical role in preventing ...
XU Chenhan, HUANG He, SUN Yu'e, DU Yang
doaj +1 more source
A feature of search engines is prediction and suggestion to complete or extend input query phrases, i.e. search suggestion functions (SSF). Given the immediate temporal nature of this functionality, alongside the character submitted to trigger each ...
Nicholas Whiskerd +7 more
doaj +1 more source

