Results 51 to 60 of about 22,714 (181)

Edge‐Oriented DoS/DDoS Intrusion Detection and Supervision Platform

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 2, March/April 2026.
ABSTRACT This work presents an Edge Node‐Oriented DoS/DDoS Intrusion Detection and Monitoring Platform, a novel anomaly detection system based on temporal analysis with machine learning (ML) and deep learning (DL) algorithms, specifically designed to operate on edge servers with limited resources.
Geraldo Eufrazio Martins Júnior   +3 more
wiley   +1 more source

A Two‐Phase Detection Method Based on Ensemble Feature Fusion for Detecting Distributed Denial of Service (DDoS) Attacks in Cloud Computing Using Deep Learning Algorithm

open access: yesEngineering Reports, Volume 8, Issue 2, February 2026.
This study introduces a two‐phase method for detecting DDoS attacks in cloud environments using ensemble feature fusion and a hybrid CNN‐LSTM model. By combining meta‐heuristic feature selection with deep learning, the approach achieves over 99% accuracy on benchmark datasets, reducing false positives and improving cybersecurity resilience.
Hind Saad Hussein   +3 more
wiley   +1 more source

On the Efficacy of Live DDoS Detection with Hadoop

open access: yes, 2015
Distributed Denial of Service flooding attacks are one of the biggest challenges to the availability of online services today. These DDoS attacks overwhelm the victim with huge volume of traffic and render it incapable of performing normal communication ...
Ali, Usman, Hameed, Sufian
core   +1 more source

ICMPE-8: Dedicated to Professor Rudolf Wu

open access: yesMarine Pollution Bulletin, 2017
Special Issue: The 8th International Conference on Marine Pollution and ...
Leung, KMY   +4 more
openaire   +4 more sources

A Review of Software for Designing and Operating Quantum Networks

open access: yesAdvanced Quantum Technologies, Volume 9, Issue 2, February 2026.
A quantum network can be organized following a three‐plane abstraction: infrastructure, logical, and control. A taxonomy of the network functions of the control plane is proposed, and the state of the art in software for quantum networks is discussed. A guide for future directions on software development is provided.
Robert J. Hayek   +2 more
wiley   +1 more source

Development of a Translator from LLVM to ACL2

open access: yes, 2014
In our current work a library of formally verified software components is to be created, and assembled, using the Low-Level Virtual Machine (LLVM) intermediate form, into subsystems whose top-level assurance relies on the assurance of the individual ...
Davis, Jennifer A.   +3 more
core   +2 more sources

Quantum phases of supersymmetric lattice models

open access: yes, 2009
We review recent results on lattice models for spin-less fermions with strong repulsive interactions. A judicious tuning of kinetic and interaction terms leads to a model possessing supersymmetry.
Exner, P., Huijse, L., Schoutens, K.
core   +1 more source

Highly Efficient Simultaneous Photocatalytic Reduction of CO2 and O2 from Air Using Conjugated Microporous Polymers with Ionic Imidazolium Sites

open access: yesENERGY &ENVIRONMENTAL MATERIALS, Volume 9, Issue 1, January 2026.
In this work, we reported the rational design of two ionic conjugated microporous polymers for efficient simultaneous photocatalytic reduction of CO2 and O2 from air under mild conditions. Efficient photocatalytic reduction of CO2 is crucial to decrease the atmospheric concentration of CO2.
Waner Li   +8 more
wiley   +1 more source

Metaheuristic Optimization Algorithm for Vulnerability Detection in Web of Things Environment

open access: yesJournal of Engineering, Volume 2026, Issue 1, 2026.
The integration of the Web of Things with cloud computing platforms has significantly improved data sharing, analytics, and automation across smart environments. However, this interconnection also exposes devices and cloud infrastructures to severe security threats, including Trojans, ransomware, worms, and advanced malware.
Romil Rawat   +2 more
wiley   +1 more source

Uji Performansi Jaringan menggunakan Kabel UTP dan STP

open access: yesJurnal Elkomika, 2018
ABSTRAK Unshield Twisted Pair (UTP) dan Shield Twisted Pair (STP) merupakan tipe kabel untuk menghubungkan antar komputer sehingga dapat membentuk sebuah jaringan. Secara teori, maksimal panjang kabel yang diperbolehkan adalah 100 meter.
KUKUH NUGROHO, AHMAD YOGI KURNIAWAN
doaj   +1 more source

Home - About - Disclaimer - Privacy