Results 41 to 50 of about 79,557 (216)
Large Language Model‐Based Chatbots in Higher Education
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci +4 more
wiley +1 more source
Overview of the key technology of photonic firewall at high speed
In order to maintain the security of optical network,it is urgent to research and deploy photonic firewall which can effectively process high-speed optical signals to replace existing electronic firewall which consumes high energy.After a brief review of
Shanguo HUANG +3 more
doaj +2 more sources
The medical science DMZ: a network design pattern for data-intensive medical science [PDF]
: Objective We describe a detailed solution for maintaining high-capacity, data-intensive network flows (eg, 10, 40, 100 Gbps+) in a scientific, medical context while still adhering to security and privacy laws and regulations. Materials and Methods
Balas, Edward +8 more
core +1 more source
This study presents a novel framework that enhances the reliability of DNS traffic monitoring using a hybrid long short‐term memory‐deep neural network (LSMT‐DNN) architecture, enabling robust detection of adversarial DNS tunneling. The proposed framework leverages feature extraction from DNS traffic patterns, including domain request sequences, query ...
Ahmad Almadhor +5 more
wiley +1 more source
Network Traffic Factors Detection and Prediction Using Artificial Neural Networks
Rising technology generates an increasing data flow on the internet by the day. Specific security systems are crucial for managing this growing data traffic. One such security system is the firewall used in Turkey Maritime Enterprises Inc. (TME). All TME
Hüseyin Eski +2 more
doaj +1 more source
In this paper, the authors analyze the developed PreFirewall network application for the Floodlight software defined network (SDN) controller. This application filters rules, which are added into the firewall module of the Floodlight SDN controller in ...
Sergey V. Morzhov +1 more
doaj +1 more source
NoPASARAN: a Novel Platform for Analysing Semi-Active elements in Routes Across a Network
In this paper, we propose a novel, collaborative distributed platform to discover the presence, or analyse the configuration, of what we call semi-active elements.
Ilies Benhabbour, Marc Dacier
doaj +1 more source
An improvement of tree-rule firewall for a large network: Supporting large rule size and low delay [PDF]
© 2016 IEEE. Firewalls are important network devices which provide first hand defense against network threat. This level of defense is depended on firewall rules.
Chomsiri, T, He, X, Nanda, P, Tan, Z
core +4 more sources
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury +2 more
wiley +1 more source
Analysis of TCP flood attack using NetFlow
Traffic analysis is a common question for most of the production systems in various segments of computer networks. Attacks, configuration mistakes, and other factors can cause network increased accessibility and as a result danger for data privacy ...
Vsevolod Kapustin, Nerijus Paulauskas
doaj +1 more source

