Results 51 to 60 of about 1,097,826 (233)

Tracing Three Decades of Low Earth Orbit Satellite Communication Development: A Bibliometric and Main Path Analysis of Network Architectures, Protocol Evolution, and Emerging Intelligent Services

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT Low Earth Orbit (LEO) satellite communication systems have evolved into a critical component of global broadband networks, enabling wide‐area connectivity, IoT services, and intelligent multilayer satellite–terrestrial integration. Despite rapid advancements in constellation deployment, routing mechanisms, resource management, and LEO–5G/6G ...
Wei‐Hao Su   +2 more
wiley   +1 more source

Research on Malicious Mobile Application Detection Based on Domain Name Association [PDF]

open access: yesJisuanji gongcheng, 2020
In order to realize the accurate detection of malicious mobile applications and ensure the security of mobile devices,a malicious mobile application detection method based on DNS is proposed.DNS domain name is used as the analysis object of detection to ...
CAI Rongyan, WANG He, YAO Qigui, HE Gaofeng
doaj   +1 more source

Securing 5G/6G IoT Using Transformer and Personalized Federated Learning: An Access-Side Distributed Malicious Traffic Detection Framework

open access: yesIEEE Open Journal of the Communications Society
Malicious traffic has posed a significant threat to current 5G networks. In the upcoming 6G era, with the rapid development of the Internet of Things (IoT), defending against malicious traffic has become even more challenging due to the diverse nature ...
Yantian Luo   +6 more
semanticscholar   +1 more source

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Metaverse and Artificial Intelligence as Web 4.0: The Next Generation of the Internet

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT This study utilizes systems thinking to explore and entwine an evolving metaverse scholarship to a relatively underexplored phenomenon of Web 4.0. We adopt a soft systems thinking framework to guide the interpretation of complex and evolving metaverse scholarship, using bibliometric mapping of 5587 publications sourced from Scopus.
Anton Klarin   +3 more
wiley   +1 more source

TCN enhanced novel malicious traffic detection for IoT devices

open access: yesConnection science, 2022
With the development of IoT technology, more and more IoT devices are connected to the network. Due to the hardware constraints of IoT devices themselves, it is difficult for developers to embed security software into them.
Xin Liu   +5 more
semanticscholar   +1 more source

Lifecycle‐Based Governance to Build Reliable Ethical AI Systems

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT Artificial intelligence (AI) systems represent a paradigm shift in technological capabilities, offering transformative potential across industries while introducing novel governance and implementation challenges. This paper presents a comprehensive framework for understanding AI systems through three critical dimensions: trustworthiness ...
Maikel Leon
wiley   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

METHODS AND MEANS TO IMPROVE THE EFFICIENCY OF NETWORK TRAFFIC SECURITY MONITORING BASED ON ARTIFICIAL INTELLIGENCE

open access: yesВісник Національного технічного університету "ХПÌ": Системний аналіз, управління та інформаційні технології, 2023
This paper aims to provide a solution for malicious network traffic detection and categorization. Remote attacks on computer systems are becoming more common and more dangerous nowadays. This is due to several factors, some of which are as follows: first
Artem Dremov
doaj   +1 more source

GCN-ETA: High-Efficiency Encrypted Malicious Traffic Detection

open access: yesSecur. Commun. Networks, 2022
Encrypted network traffic is the principal foundation of secure network communication, and it can help ensure the privacy and integrity of confidential information.
Juan Zheng, Zhiyong Zeng, Tao Feng
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy