Results 41 to 50 of about 22,766 (182)

Photon-number-solving Decoy State Quantum Key Distribution

open access: yes, 2005
In this paper, a photon-number-resolving decoy state quantum key distribution scheme is presented based on recent experimental advancements. A new upper bound on the fraction of counts caused by multiphoton pulses is given.
C. Gobby   +8 more
core   +4 more sources

ICMP Covert Channel Resiliency

open access: yes, 2010
The ICMP protocol has been widely used and accepted as a covert channel. While the ICMP protocol is very simple to use, modern security approaches such as Firewalls, deep-packet inspection and intrusion detection systems threaten the use of ICMP for a reliable means for a covert channel.
Stokes, Kristian   +3 more
openaire   +2 more sources

State sum models for quantum gravity [PDF]

open access: yes, 2000
This paper reviews the construction of quantum field theory on a 4-dimensional spacetime by combinatorial methods, and discusses the recent developments in the direction of a combinatorial construction of quantum gravity.Comment: amslatex, 7 pages, ICMP ...
Barrett, John W.
core   +2 more sources

Spectral properties of discrete alloy-type models

open access: yes, 2010
We discuss recent results on spectral properties of discrete alloy-type random Schr\"odinger operators. They concern Wegner estimates and bounds on the fractional moments of the Green's function.Comment: To appear in Proceedings of ICMP 2009 ...
Tautenhahn, Martin, Veselić, Ivan
core   +1 more source

Impact of Dental Status on Heart Transplantation Outcomes

open access: yesOral Diseases, EarlyView.
ABSTRACT Objective Oral infections and poor dental health may contribute to systemic complications after heart transplantation, yet data on their impact is limited. In the absence of standardized dental guidelines for transplant candidates, this study evaluated preoperative dental status and its association with post‐transplant outcomes.
Katharina Theresa Obermeier   +8 more
wiley   +1 more source

Analysis of the vulnerability estimation and neighbor value prediction in autonomous systems

open access: yesScientific Reports, 2022
The security within autonomous systems (AS)s is one of the important measures to keep network users safe and stable from the various type of Distributed Denial of Service (DDoS) attacks. Similar to the other existing attack types Internet control message
Nematullo Rahmatov   +2 more
doaj   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

Interplay of Monopoles and P-Vortices

open access: yes, 2003
We show that P-Vortices in the confinement phase of SU(2) lattice gauge theory form one large percolating (infrared) cluster and a number of small (ultraviolet) clusters.
A.V. Kovalenko   +16 more
core   +2 more sources

MLDAS: Machine Learning Dynamic Algorithm Selection for Software‐Defined Networking Security

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 5, March 2026.
ABSTRACT Network security is a critical concern in the digital landscape of today, with users demanding secure browsing experiences and protection of their personal data. This study explores the dynamic integration of Machine Learning (ML) algorithms with Software‐Defined Networking (SDN) controllers to enhance network security through adaptive ...
Pablo Benlloch   +3 more
wiley   +1 more source

Edge‐Oriented DoS/DDoS Intrusion Detection and Supervision Platform

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 2, March/April 2026.
ABSTRACT This work presents an Edge Node‐Oriented DoS/DDoS Intrusion Detection and Monitoring Platform, a novel anomaly detection system based on temporal analysis with machine learning (ML) and deep learning (DL) algorithms, specifically designed to operate on edge servers with limited resources.
Geraldo Eufrazio Martins Júnior   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy