Results 81 to 90 of about 36,419 (228)

Real-Time Identification Technology for Encrypted DNS Traffic with Privacy Protection

open access: yesComputers, Materials & Continua
: With the widespread adoption of encrypted Domain Name System (DNS) technologies such as DNS over Hyper Text Transfer Protocol Secure (HTTPS), traditional port and protocol-based traffic analysis methods have become ineffective.
Zhipeng Qin   +4 more
semanticscholar   +1 more source

MLDAS: Machine Learning Dynamic Algorithm Selection for Software‐Defined Networking Security

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 5, March 2026.
ABSTRACT Network security is a critical concern in the digital landscape of today, with users demanding secure browsing experiences and protection of their personal data. This study explores the dynamic integration of Machine Learning (ML) algorithms with Software‐Defined Networking (SDN) controllers to enhance network security through adaptive ...
Pablo Benlloch   +3 more
wiley   +1 more source

Digital Twin Integration in Project Life Cycle Management—A Review

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
This study explores the integration of digital twin (DT) technology within project life cycle management (PLM), focusing on its transformative impact on industries like aerospace, automotive, healthcare, and construction. By creating real‐time virtual models synchronized with physical assets, DTs enable predictive maintenance, operational optimization,
Md. Injamamul Haque Protyai   +2 more
wiley   +1 more source

Traffic Pattern Plot: Video Identification in Encrypted Network Traffic

open access: yes, 2023
Kamal, Ali S   +4 more
openaire   +2 more sources

Application of Embodied Intelligence in Intelligent Warehousing and Logistics Scenarios

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
Embodied intelligence (EI) enhances digital platform efficiency in intelligent logistics, reducing transportation costs, improving throughput by 37.5%, and lowering energy consumption. EI‐driven improvements lead to discriminatory pricing strategies, while lightweight encryption ensures minimal performance overhead, maintaining real‐time operations ...
Jun Zhang, Chuan Zhang, Mingtao Zhang
wiley   +1 more source

Semisupervised Encrypted Traffic Identification Based on Auxiliary Classification Generative Adversarial Network

open access: yesComputer systems science and engineering, 2021
Jiaming Mao   +7 more
semanticscholar   +1 more source

HADA: A Hybrid Anomaly Detection Approach Using Unsupervised Machine Learning

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
Overview of HADA, an unsupervised fraud detection pipeline that preprocesses and scales transaction data, applies PCA for dimensionality reduction, scores anomalies using Isolation Forest, selects anomalous transactions via thresholding, and clusters the selected anomalies using Agglomerative Hierarchical Clustering (AHC) to produce interpretable ...
Francis Thiong'o   +3 more
wiley   +1 more source

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, Volume 14, Issue 3, Page 1431-1455, March 2026.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

f‐Block Element‐Based MOF Thin Films: A Platform for Luminescence, Sensing, and Energy Applications

open access: yesSmall, Volume 22, Issue 16, 17 March 2026.
f‐Block element–based metal–organic framework (f‐MOF) thin films offer exceptional potential for luminescent, sensing, and energy‐related applications. This review surveys recent progress in their synthesis, characterization, and functional implementation, emphasizing the diversity of available thin‐film fabrication strategies. The convergence of these
Dong‐Hui Chen, Christof Wöll
wiley   +1 more source

A Hybrid Encryption Framework for Secure and Real‐Time Vehicular Communications

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 2, March/April 2026.
ABSTRACT The rapid expansion of Vehicular Ad Hoc Networks (VANETs) has amplified concerns regarding data security, integrity, and privacy. This paper presents SECURIDE, a Secure Intelligent Data Exchange for Connected Vehicles that provides a comprehensive encryption–decryption framework for safeguarding multimedia data and communication channels in ...
Muhammad Usama, Muhammad Usman Hadi
wiley   +1 more source

Home - About - Disclaimer - Privacy