Results 71 to 80 of about 36,419 (228)

Characterization and identification of Netflix encrypted traffic

open access: yes, 2022
Technology evolves quickly, and Netflix has evolved as well since 2017. Microsoft’s Silverlight player has been replaced by Netflix’s own player, video segments do not last strictly for 4 seconds anymore, their catalog keeps expanding, and new video codecs and resolutions have come to stay.
openaire   +1 more source

A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley   +1 more source

TransECA-Net: A Transformer-Based Model for Encrypted Traffic Classification

open access: yesApplied Sciences
Encrypted network traffic classification remains a critical component in network security monitoring. However, existing approaches face two fundamental limitations: (1) conventional methods rely on manual feature engineering and are inadequate in ...
Ziao Liu   +4 more
doaj   +1 more source

The Plural Lives of E‐Waste: Valuation and Contestation in Accra's Recycling Network(s)

open access: yesThe Geographical Journal, EarlyView.
Short Abstract Electronic waste (e‐waste) in Accra is shown to be plural and ontologically multiple, enacted as livelihood, commodity, hazard, governance object and political actor across dispersed recycling networks. Using a multi‐sited, follow‐the‐thing approach and 60 interviews, I specify four socio‐material mechanisms (i.e., copper's market tempo,
Ebenezer Gyampoh Amoah
wiley   +1 more source

A Perspective From the British Society of Dental Hygiene and Therapy Members Regarding the Need for Clinical Support by a Dental Nurse

open access: yesInternational Journal of Dental Hygiene, EarlyView.
ABSTRACT Objectives In the United Kingdom (UK), Dental Hygienists (DHs) and Dental Therapists (DTs) are required by the UK's regulatory body, the General Dental Council, to “… be appropriately supported when treating patients”. However, what is deemed ‘appropriate support’, and the need for that support, has been ‘open to interpretation’, and ...
Debbie Reed   +4 more
wiley   +1 more source

Generative AI Implementation in Enterprises: Lessons From a Case Study of Enhanced IT Service Management

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT The recent rise of Generative Artificial Intelligence (GenAI) is fundamentally changing the way businesses operate, with many now investing heavily in this technology. However, businesses are still exploring ways to extract value from GenAI and develop organisational capabilities.
Ashish Jagdish Sharma   +4 more
wiley   +1 more source

A Graph Neural Network Approach for Identifying Decentralized Applications in Encrypted Traffic

open access: yesProceedings of the International Conference on Applied Innovations in IT
Cryptographic network traffic classification has been challenged by the advent of decentralized applications (DApps), especially those based on blockchain platforms like Ethereum.
Sufrianto Sufrianto   +3 more
doaj   +1 more source

Inflammatory and Immunological Basis of Periodontal Diseases

open access: yesJournal of Periodontal Research, EarlyView.
The periodontal lesion emerges as an evolving immunological battlefield, where host–microbiome interactions, dysregulated immune responses, fragile resolution mechanisms, and inflammophilic dysbiosis converge to shift the balance from homeostasis to unrestrained tissue destruction.
Giacomo Baima   +3 more
wiley   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

Event‐Triggered Saturating Control for Synchronization of Lur'e Type Complex Dynamic Networks

open access: yesInternational Journal of Robust and Nonlinear Control, Volume 36, Issue 4, Page 2184-2198, 10 March 2026.
ABSTRACT This article addresses the problem of synchronizing discrete‐time Lur'e type complex dynamic networks (CDNs) via dynamic event‐triggered control. In particular, it is considered that the control signal of each node is subject to input saturation. Using the Lyapunov Stability Theory, properties of slope‐restricted nonlinearities, and the linear
C. Lisbôa   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy