Results 111 to 120 of about 1,097,826 (233)

“One Is a Frontier”: Settler Migration as Transmogrification

open access: yesSociological Forum, Volume 41, Issue 1, Page 105-121, March 2026.
ABSTRACT This paper explores the trajectories and framing strategies of American Jewish migrants to Palestine–Israel. Drawing on original in‐depth interviews with immigrants who migrated between 1976 and 2021, alongside interviews with and observations of an “aliyah” agency, it examines meaning‐making around spatial relocation in relation to the ...
Joseph Kaplan Weinger
wiley   +1 more source

Hide and rule: Accumulation by disappearance and necro‐periurbanisation in Brazil

open access: yesTransactions of the Institute of British Geographers, Volume 51, Issue 1, March 2026.
Short Abstract This paper examines how peri‐urban spaces are governed through concealment and obfuscation. Focusing on the Baixada Fluminense near Rio de Janeiro, it connects land fraud (‘grilagem’) to the obfuscation of violence, proposing the concept of ‘accumulation by disappearance’.
Jan Simon Hutta
wiley   +1 more source

Enhancing Detection of Malicious Traffic Through FPGA-Based Frequency Transformation and Machine Learning

open access: yesIEEE Access
In recent years, with the development of modern network, in order to avoid threats caused by cyber attacks, it is important to understand how to implement effective security measures.
Zhenguo Hu   +3 more
doaj   +1 more source

MTDecipher: robust encrypted malicious traffic detection via multi-task graph neural networks

open access: yesCybersecurity
The widespread adoption of encrypted traffic protocols has significantly increased the challenge of detecting malicious traffic. Existing detection methods based on deep learning typically rely on fine-grained features of data packets, such as length ...
Fan Li   +4 more
doaj   +1 more source

TorWard: Discovery of malicious traffic over Tor [PDF]

open access: yesIEEE INFOCOM 2014 - IEEE Conference on Computer Communications, 2014
Zhen Ling   +4 more
openaire   +1 more source

Flow-Data Gathering Using NetFlow Sensors for Fitting Malicious-Traffic Detection Models. [PDF]

open access: yesSensors (Basel), 2020
Campazas-Vega A   +3 more
europepmc   +1 more source

A Multi-Feature Semantic Fusion Machine Learning Architecture for Detecting Encrypted Malicious Traffic

open access: yesJournal of Cybersecurity and Privacy
With the increasing sophistication of network attacks, machine learning (ML)-based methods have showcased promising performance in attack detection. However, ML-based methods often suffer from high false rates when tackling encrypted malicious traffic ...
Shiyu Tang   +3 more
doaj   +1 more source

A lightweight model design approach for few-shot malicious traffic classification. [PDF]

open access: yesSci Rep
Wang R   +6 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy