Results 111 to 120 of about 1,097,826 (233)
“One Is a Frontier”: Settler Migration as Transmogrification
ABSTRACT This paper explores the trajectories and framing strategies of American Jewish migrants to Palestine–Israel. Drawing on original in‐depth interviews with immigrants who migrated between 1976 and 2021, alongside interviews with and observations of an “aliyah” agency, it examines meaning‐making around spatial relocation in relation to the ...
Joseph Kaplan Weinger
wiley +1 more source
Hide and rule: Accumulation by disappearance and necro‐periurbanisation in Brazil
Short Abstract This paper examines how peri‐urban spaces are governed through concealment and obfuscation. Focusing on the Baixada Fluminense near Rio de Janeiro, it connects land fraud (‘grilagem’) to the obfuscation of violence, proposing the concept of ‘accumulation by disappearance’.
Jan Simon Hutta
wiley +1 more source
In recent years, with the development of modern network, in order to avoid threats caused by cyber attacks, it is important to understand how to implement effective security measures.
Zhenguo Hu +3 more
doaj +1 more source
MTDecipher: robust encrypted malicious traffic detection via multi-task graph neural networks
The widespread adoption of encrypted traffic protocols has significantly increased the challenge of detecting malicious traffic. Existing detection methods based on deep learning typically rely on fine-grained features of data packets, such as length ...
Fan Li +4 more
doaj +1 more source
TorWard: Discovery of malicious traffic over Tor [PDF]
Zhen Ling +4 more
openaire +1 more source
Flow-Data Gathering Using NetFlow Sensors for Fitting Malicious-Traffic Detection Models. [PDF]
Campazas-Vega A +3 more
europepmc +1 more source
With the increasing sophistication of network attacks, machine learning (ML)-based methods have showcased promising performance in attack detection. However, ML-based methods often suffer from high false rates when tackling encrypted malicious traffic ...
Shiyu Tang +3 more
doaj +1 more source
Malicious traffic prediction model for ResNet based on Maple-IDS dataset. [PDF]
Li Q, Wang B, Wen X, Chen Y.
europepmc +1 more source
Research on encrypted malicious traffic detection in power information interaction: application of the electricity multi-granularity flow representation learning approach. [PDF]
Wu Z +5 more
europepmc +1 more source
A lightweight model design approach for few-shot malicious traffic classification. [PDF]
Wang R +6 more
europepmc +1 more source

