Results 61 to 70 of about 36,419 (228)
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma +4 more
wiley +1 more source
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source
A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley +1 more source
Service Identification Method for Encrypted Traffic Based on SSL/TLS
The SSL/TLS, one of the most popular encryption protocol, was developed as a solution of various network security problem while the network traffic has become complex and diverse. But the SSL/TLS traffic has been identified as its protocol name, not its used services, which is required for the effective network traffic management. This paper proposes a
Sung-Min Kim +5 more
openaire +2 more sources
Multiterminal High‐Voltage Direct Current Projects: A Comprehensive Assessment and Future Prospects
ABSTRACT Multiterminal high‐voltage direct current (MT‐HVDC) systems are an important part of modern power systems, addressing the need for bulk power delivery and efficient renewable energy integration. This paper provides a comprehensive overview of recent advances in MT‐HVDC technology, including launched projects and ongoing initiatives.
Mohammad Hossein Mousavi +3 more
wiley +1 more source
The application and research of machine learning in malicious encrypted traffic detection
With the widespread use of encrypted communication, malicious attackers increasingly exploit encrypted traffic to conceal their activities, posing challenges to traditional signature-based and rule-based detection methods.
Tian Rui +4 more
doaj +1 more source
Encrypted traffic classification based on packet length distribution of sampling sequence
A hypothesis testing-based statistical decision model (HTSDM) for application identification of encrypted traf-fic was presented.HTSDM was based on packet length distribution of deterministic sampling sequence at flow level,which was characterized by ...
Chang-xi GAO, Ya-biao WU, Cong WANG
doaj +2 more sources
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley +1 more source
A Survey of Techniques for Mobile Service Encrypted Traffic Classification Using Deep Learning
The rapid adoption of mobile devices has dramatically changed the access to various networking services and led to the explosion of mobile service traffic.
Pan Wang +3 more
doaj +1 more source
Browser Identification Based on Encrypted Traffic [PDF]
Qiang Wei, Jiesi Han, Changjiang Liu
openaire +1 more source

