Results 91 to 100 of about 1,097,826 (233)

Traffic-based Malicious Switch Detection in SDN

open access: yesInternational Journal of Security and Its Applications, 2014
In Software Defined Networking (SDN) architecture, the control plane is separated from the data plane. On one hand, OpenFlow switches can only store and forward packets, which leaves all decisions to be made by the controller. On the other hand, the controller has a global view over the SDN. But if any switch is captured by an adversary, it may mislead
Xiaodong Du   +3 more
openaire   +1 more source

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, Volume 14, Issue 3, Page 1431-1455, March 2026.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

Escape method of malicious traffic based on backdoor attack

open access: yesTongxin xuebao
Launching backdoor attacks against deep learning (DL)-based network traffic classifiers, and a method of malicious traffic escape was proposed based on the backdoor attack.
MA Bowen   +4 more
doaj   +2 more sources

Neurobiological correlates of obsessive‐compulsive disorder (OCD): A narrative review

open access: yesIbrain, Volume 12, Issue 1, Page 86-95, Spring 2026.
Obsessive‐compulsive disorder (OCD) is a common and disabling, as well as underdiagnosed, neuropsychiatric condition characterized by involuntary and unwanted obsessions and/or compulsions often accompanied by states of severe anxiety, distress and shame, as well as other comorbid disorders. Despite the extensive literature available to date, only some
Giulio Perrotta, Anna Sara Liberati
wiley   +1 more source

Do Fans of Violent Stories Show a Higher Potential for Creative Harm? True Crime as a Stimulating Environment for Malevolent Creativity

open access: yesThe Journal of Creative Behavior, Volume 60, Issue 1, March 2026.
ABSTRACT The media we consume may shape our cognition, emotion, and behavior. While violent media effects on aggression have been studied extensively, one popular media genre has escaped scrutiny until now: true crime, featuring real stories of assault, murder, or serial killings.
Corinna M. Perchtold‐Stefan   +5 more
wiley   +1 more source

Malicious Domain Detection Based on Traffic Similarity

open access: yesDEStech Transactions on Computer Science and Engineering, 2017
Domain name system is an important resource in the Internet. Malicious domain detection techniques are used to find the malicious domains which are designed for malicious behaviors. The paper analyzes the existing malicious domain detection techniques and then proposes a new malicious domain detection technique based on traffic similarity.
JIANPING HU   +3 more
openaire   +2 more sources

Prioritized Real‐Time UAV‐Based Vessel Detection for Efficient Maritime Search

open access: yesJournal of Field Robotics, Volume 43, Issue 2, Page 561-577, March 2026.
ABSTRACT Real‐time vessel detection in maritime environments is crucial for diverse applications requiring speed and accuracy. Static camera views often introduce blind spots, compromising detection efficiency. This paper proposes a novel, real‐time UAV‐based system that uses a dynamic camera control strategy to address this limitation.
Lyes Saad Saoud   +6 more
wiley   +1 more source

Fail‐Controlled Classifiers: A Swiss‐Army Knife Toward Trustworthy Systems

open access: yesSoftware: Practice and Experience, Volume 56, Issue 3, Page 239-259, March 2026.
ABSTRACT Background Modern critical systems often require to take decisions and classify data and scenarios autonomously without having detrimental effects on people, infrastructures or the environment, ensuring desired dependability attributes. Researchers typically strive to craft classifiers with perfect accuracy, which should be always correct and ...
Fahad Ahmed Khokhar   +4 more
wiley   +1 more source

Edge‐Oriented DoS/DDoS Intrusion Detection and Supervision Platform

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 2, March/April 2026.
ABSTRACT This work presents an Edge Node‐Oriented DoS/DDoS Intrusion Detection and Monitoring Platform, a novel anomaly detection system based on temporal analysis with machine learning (ML) and deep learning (DL) algorithms, specifically designed to operate on edge servers with limited resources.
Geraldo Eufrazio Martins Júnior   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy