Results 51 to 60 of about 23,021 (203)
Effective temperature for finite systems [PDF]
Under the Ansatz that the occupation times of a system with finitely many states are given by the Gibbs distribution, an effective temperature is uniquely determined (up to a choice of scale), and may be computed de novo, without any reference to a ...
Huntsman, Steve
core +1 more source
ICMP Covert Channel Resiliency
The ICMP protocol has been widely used and accepted as a covert channel. While the ICMP protocol is very simple to use, modern security approaches such as Firewalls, deep-packet inspection and intrusion detection systems threaten the use of ICMP for a reliable means for a covert channel.
Stokes, Kristian +3 more
openaire +2 more sources
MLDAS: Machine Learning Dynamic Algorithm Selection for Software‐Defined Networking Security
ABSTRACT Network security is a critical concern in the digital landscape of today, with users demanding secure browsing experiences and protection of their personal data. This study explores the dynamic integration of Machine Learning (ML) algorithms with Software‐Defined Networking (SDN) controllers to enhance network security through adaptive ...
Pablo Benlloch +3 more
wiley +1 more source
Uji Performansi Jaringan menggunakan Kabel UTP dan STP
ABSTRAK Unshield Twisted Pair (UTP) dan Shield Twisted Pair (STP) merupakan tipe kabel untuk menghubungkan antar komputer sehingga dapat membentuk sebuah jaringan. Secara teori, maksimal panjang kabel yang diperbolehkan adalah 100 meter.
KUKUH NUGROHO, AHMAD YOGI KURNIAWAN
doaj +1 more source
On the Efficacy of Live DDoS Detection with Hadoop
Distributed Denial of Service flooding attacks are one of the biggest challenges to the availability of online services today. These DDoS attacks overwhelm the victim with huge volume of traffic and render it incapable of performing normal communication ...
Ali, Usman, Hameed, Sufian
core +1 more source
Edge‐Oriented DoS/DDoS Intrusion Detection and Supervision Platform
ABSTRACT This work presents an Edge Node‐Oriented DoS/DDoS Intrusion Detection and Monitoring Platform, a novel anomaly detection system based on temporal analysis with machine learning (ML) and deep learning (DL) algorithms, specifically designed to operate on edge servers with limited resources.
Geraldo Eufrazio Martins Júnior +3 more
wiley +1 more source
Real‐Time Detection and Prevention of DoS Attack in Unmanned Marine Vehicles Using Machine Learning
ABSTRACT Unmanned marine vehicles (UMVs) are one of the most crucial components of the underwater communication and surveillance system in the marine and oceanographic environment. This research introduces a novel approach to stabilize the connection in an unstable underwater environment by inheriting features of communication velocities.
Noman Ali +8 more
wiley +1 more source
There is a real and urgent need for new antibiotics able to kill Mycobacteria, acid-fast bacilli capable of causing multiple deadly diseases. These include members of the Mycobacterium tuberculosis complex, which causes the lung disease tuberculosis (TB)
Alexander B. J. Grey +8 more
doaj +1 more source
Development of a Translator from LLVM to ACL2
In our current work a library of formally verified software components is to be created, and assembled, using the Low-Level Virtual Machine (LLVM) intermediate form, into subsystems whose top-level assurance relies on the assurance of the individual ...
Davis, Jennifer A. +3 more
core +2 more sources
Self-Similarity and Heavy-Tail of ICMP Traffic
In the last two decades, an enormous increase in empirical studies from the view of different network layer and from a variety of different networks has been seen. However ICMP traffic of Internet is ignored all along. In view of this, the contribution of this paper aims at filling such a gap in studying self-similarity and heavy-tail in ICMP traffic ...
Waixi Liu 0001 +3 more
openaire +1 more source

