Results 101 to 110 of about 1,097,826 (233)
Real‐Time Detection and Prevention of DoS Attack in Unmanned Marine Vehicles Using Machine Learning
ABSTRACT Unmanned marine vehicles (UMVs) are one of the most crucial components of the underwater communication and surveillance system in the marine and oceanographic environment. This research introduces a novel approach to stabilize the connection in an unstable underwater environment by inheriting features of communication velocities.
Noman Ali +8 more
wiley +1 more source
This review examines the integration of federated learning (FL) in the Internet of Medical Things (IoMT), enhanced by 5G/6G technologies, to improve healthcare systems with decentralized data processing, enhanced privacy, reduced latency, and efficient resource utilization, while addressing emerging challenges and future research directions.
Abdul Ahad +6 more
wiley +1 more source
Distributed Denial-of-Service (DDoS) attacks generate deceptive, high-volume traffic that bypasses conventional detection mechanisms. When interception fails, effectively allocating mixed benign and malicious traffic under resource constraints becomes a ...
Mingwei Zhou, Xian Mu, Yanyan Liang
doaj +1 more source
Malicious traffic detection combined deep neural network with hierarchical attention mechanism. [PDF]
Liu X, Liu J.
europepmc +1 more source
ABSTRACT This account explores how circumstances verging on the other‐worldly alter human perception and consciousness in a fieldwork situation. The case study involves an archaeological field survey team stranded for a time on a remote Lapland mountain.
Aki Hakonen +2 more
wiley +1 more source
While encryption enhances data security, it also presents significant challenges for network traffic analysis, especially in detecting malicious activities.
Junhao Liu +4 more
doaj +1 more source
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam +3 more
wiley +1 more source
A cybersecurity risk analysis framework for systems with artificial intelligence components
Abstract The introduction of the European Union Artificial Intelligence (AI) Act, the NIST AI Risk Management Framework, and related international norms and policy documents demand a better understanding and implementation of novel risk analysis issues when facing systems with AI components: dealing with new AI‐related impacts; incorporating AI‐based ...
J.M. Camacho +3 more
wiley +1 more source
Abstract We conducted a qualitative, real‐life study where we tracked the introduction, implementation, and use of a new AI technology in a company. We identified four distinct trust configurations among organizational members: full trust (high cognitive/high emotional), full distrust (low cognitive/low emotional), uncomfortable trust (high cognitive ...
Natalia Vuori +2 more
wiley +1 more source
WebEye - Automated Collection of Malicious HTTP Traffic
Software implementation description, dataset, machine learning, 11 ...
Vierthaler, Johann +2 more
openaire +2 more sources

