Results 41 to 50 of about 79,557 (216)

Large Language Model‐Based Chatbots in Higher Education

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci   +4 more
wiley   +1 more source

Overview of the key technology of photonic firewall at high speed

open access: yesTongxin xuebao, 2019
In order to maintain the security of optical network,it is urgent to research and deploy photonic firewall which can effectively process high-speed optical signals to replace existing electronic firewall which consumes high energy.After a brief review of
Shanguo HUANG   +3 more
doaj   +2 more sources

The medical science DMZ: a network design pattern for data-intensive medical science [PDF]

open access: yes, 2017
: Objective We describe a detailed solution for maintaining high-capacity, data-intensive network flows (eg, 10, 40, 100 Gbps+) in a scientific, medical context while still adhering to security and privacy laws and regulations. Materials and Methods
Balas, Edward   +8 more
core   +1 more source

An Intelligent Feature Engineering‐Driven Hybrid Framework for Adversarial Domain Name System Tunneling Detection

open access: yesAdvanced Intelligent Systems, EarlyView.
This study presents a novel framework that enhances the reliability of DNS traffic monitoring using a hybrid long short‐term memory‐deep neural network (LSMT‐DNN) architecture, enabling robust detection of adversarial DNS tunneling. The proposed framework leverages feature extraction from DNS traffic patterns, including domain request sequences, query ...
Ahmad Almadhor   +5 more
wiley   +1 more source

Network Traffic Factors Detection and Prediction Using Artificial Neural Networks

open access: yesSakarya University Journal of Computer and Information Sciences
Rising technology generates an increasing data flow on the internet by the day. Specific security systems are crucial for managing this growing data traffic. One such security system is the firewall used in Turkey Maritime Enterprises Inc. (TME). All TME
Hüseyin Eski   +2 more
doaj   +1 more source

A New Approach for Detecting and Resolving Anomalies in Security Policy of the External Firewall Module of the Floodlight SDN Controller

open access: yesМоделирование и анализ информационных систем, 2018
In this paper, the authors analyze the developed PreFirewall network application for the Floodlight software defined network (SDN) controller. This application filters rules, which are added into the firewall module of the Floodlight SDN controller in ...
Sergey V. Morzhov   +1 more
doaj   +1 more source

NoPASARAN: a Novel Platform for Analysing Semi-Active elements in Routes Across a Network

open access: yesApplied Cybersecurity & Internet Governance, 2022
In this paper, we propose a novel, collaborative distributed platform to discover the presence, or analyse the configuration, of what we call semi-active elements.
Ilies Benhabbour, Marc Dacier
doaj   +1 more source

An improvement of tree-rule firewall for a large network: Supporting large rule size and low delay [PDF]

open access: yes, 2016
© 2016 IEEE. Firewalls are important network devices which provide first hand defense against network threat. This level of defense is depended on firewall rules.
Chomsiri, T, He, X, Nanda, P, Tan, Z
core   +4 more sources

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

Analysis of TCP flood attack using NetFlow

open access: yesMokslas: Lietuvos Ateitis, 2023
Traffic analysis is a common question for most of the production systems in various segments of computer networks. Attacks, configuration mistakes, and other factors can cause network increased accessibility and as a result danger for data privacy ...
Vsevolod Kapustin, Nerijus Paulauskas
doaj   +1 more source

Home - About - Disclaimer - Privacy