Results 51 to 60 of about 23,021 (203)

Effective temperature for finite systems [PDF]

open access: yes, 2009
Under the Ansatz that the occupation times of a system with finitely many states are given by the Gibbs distribution, an effective temperature is uniquely determined (up to a choice of scale), and may be computed de novo, without any reference to a ...
Huntsman, Steve
core   +1 more source

ICMP Covert Channel Resiliency

open access: yes, 2010
The ICMP protocol has been widely used and accepted as a covert channel. While the ICMP protocol is very simple to use, modern security approaches such as Firewalls, deep-packet inspection and intrusion detection systems threaten the use of ICMP for a reliable means for a covert channel.
Stokes, Kristian   +3 more
openaire   +2 more sources

MLDAS: Machine Learning Dynamic Algorithm Selection for Software‐Defined Networking Security

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 5, March 2026.
ABSTRACT Network security is a critical concern in the digital landscape of today, with users demanding secure browsing experiences and protection of their personal data. This study explores the dynamic integration of Machine Learning (ML) algorithms with Software‐Defined Networking (SDN) controllers to enhance network security through adaptive ...
Pablo Benlloch   +3 more
wiley   +1 more source

Uji Performansi Jaringan menggunakan Kabel UTP dan STP

open access: yesJurnal Elkomika, 2018
ABSTRAK Unshield Twisted Pair (UTP) dan Shield Twisted Pair (STP) merupakan tipe kabel untuk menghubungkan antar komputer sehingga dapat membentuk sebuah jaringan. Secara teori, maksimal panjang kabel yang diperbolehkan adalah 100 meter.
KUKUH NUGROHO, AHMAD YOGI KURNIAWAN
doaj   +1 more source

On the Efficacy of Live DDoS Detection with Hadoop

open access: yes, 2015
Distributed Denial of Service flooding attacks are one of the biggest challenges to the availability of online services today. These DDoS attacks overwhelm the victim with huge volume of traffic and render it incapable of performing normal communication ...
Ali, Usman, Hameed, Sufian
core   +1 more source

Edge‐Oriented DoS/DDoS Intrusion Detection and Supervision Platform

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 2, March/April 2026.
ABSTRACT This work presents an Edge Node‐Oriented DoS/DDoS Intrusion Detection and Monitoring Platform, a novel anomaly detection system based on temporal analysis with machine learning (ML) and deep learning (DL) algorithms, specifically designed to operate on edge servers with limited resources.
Geraldo Eufrazio Martins Júnior   +3 more
wiley   +1 more source

Real‐Time Detection and Prevention of DoS Attack in Unmanned Marine Vehicles Using Machine Learning

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 2, March/April 2026.
ABSTRACT Unmanned marine vehicles (UMVs) are one of the most crucial components of the underwater communication and surveillance system in the marine and oceanographic environment. This research introduces a novel approach to stabilize the connection in an unstable underwater environment by inheriting features of communication velocities.
Noman Ali   +8 more
wiley   +1 more source

Screening of Fungi for Antimycobacterial Activity Using a Medium-Throughput Bioluminescence-Based Assay

open access: yesFrontiers in Microbiology, 2021
There is a real and urgent need for new antibiotics able to kill Mycobacteria, acid-fast bacilli capable of causing multiple deadly diseases. These include members of the Mycobacterium tuberculosis complex, which causes the lung disease tuberculosis (TB)
Alexander B. J. Grey   +8 more
doaj   +1 more source

Development of a Translator from LLVM to ACL2

open access: yes, 2014
In our current work a library of formally verified software components is to be created, and assembled, using the Low-Level Virtual Machine (LLVM) intermediate form, into subsystems whose top-level assurance relies on the assurance of the individual ...
Davis, Jennifer A.   +3 more
core   +2 more sources

Self-Similarity and Heavy-Tail of ICMP Traffic

open access: yesJournal of Computers, 2012
In the last two decades, an enormous increase in empirical studies from the view of different network layer and from a variety of different networks has been seen. However ICMP traffic of Internet is ignored all along. In view of this, the contribution of this paper aims at filling such a gap in studying self-similarity and heavy-tail in ICMP traffic ...
Waixi Liu 0001   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy