Results 41 to 50 of about 22,766 (182)
Photon-number-solving Decoy State Quantum Key Distribution
In this paper, a photon-number-resolving decoy state quantum key distribution scheme is presented based on recent experimental advancements. A new upper bound on the fraction of counts caused by multiphoton pulses is given.
C. Gobby +8 more
core +4 more sources
ICMP Covert Channel Resiliency
The ICMP protocol has been widely used and accepted as a covert channel. While the ICMP protocol is very simple to use, modern security approaches such as Firewalls, deep-packet inspection and intrusion detection systems threaten the use of ICMP for a reliable means for a covert channel.
Stokes, Kristian +3 more
openaire +2 more sources
State sum models for quantum gravity [PDF]
This paper reviews the construction of quantum field theory on a 4-dimensional spacetime by combinatorial methods, and discusses the recent developments in the direction of a combinatorial construction of quantum gravity.Comment: amslatex, 7 pages, ICMP ...
Barrett, John W.
core +2 more sources
Spectral properties of discrete alloy-type models
We discuss recent results on spectral properties of discrete alloy-type random Schr\"odinger operators. They concern Wegner estimates and bounds on the fractional moments of the Green's function.Comment: To appear in Proceedings of ICMP 2009 ...
Tautenhahn, Martin, Veselić, Ivan
core +1 more source
Impact of Dental Status on Heart Transplantation Outcomes
ABSTRACT Objective Oral infections and poor dental health may contribute to systemic complications after heart transplantation, yet data on their impact is limited. In the absence of standardized dental guidelines for transplant candidates, this study evaluated preoperative dental status and its association with post‐transplant outcomes.
Katharina Theresa Obermeier +8 more
wiley +1 more source
Analysis of the vulnerability estimation and neighbor value prediction in autonomous systems
The security within autonomous systems (AS)s is one of the important measures to keep network users safe and stable from the various type of Distributed Denial of Service (DDoS) attacks. Similar to the other existing attack types Internet control message
Nematullo Rahmatov +2 more
doaj +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
Interplay of Monopoles and P-Vortices
We show that P-Vortices in the confinement phase of SU(2) lattice gauge theory form one large percolating (infrared) cluster and a number of small (ultraviolet) clusters.
A.V. Kovalenko +16 more
core +2 more sources
MLDAS: Machine Learning Dynamic Algorithm Selection for Software‐Defined Networking Security
ABSTRACT Network security is a critical concern in the digital landscape of today, with users demanding secure browsing experiences and protection of their personal data. This study explores the dynamic integration of Machine Learning (ML) algorithms with Software‐Defined Networking (SDN) controllers to enhance network security through adaptive ...
Pablo Benlloch +3 more
wiley +1 more source
Edge‐Oriented DoS/DDoS Intrusion Detection and Supervision Platform
ABSTRACT This work presents an Edge Node‐Oriented DoS/DDoS Intrusion Detection and Monitoring Platform, a novel anomaly detection system based on temporal analysis with machine learning (ML) and deep learning (DL) algorithms, specifically designed to operate on edge servers with limited resources.
Geraldo Eufrazio Martins Júnior +3 more
wiley +1 more source

