Results 41 to 50 of about 4,251 (194)

TSFN: A Novel Malicious Traffic Classification Method Using BERT and LSTM

open access: yesEntropy, 2023
Traffic classification is the first step in network anomaly detection and is essential to network security. However, existing malicious traffic classification methods have several limitations; for example, statistical-based methods are vulnerable to hand-
Zhaolei Shi   +3 more
doaj   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

MT-FBERT: Malicious Traffic Detection Based on Efficient Federated Learning of BERT

open access: yesFuture Internet
The rising frequency of network intrusions has significantly impacted critical infrastructures, leading to an increased focus on the detection of malicious network traffic in recent years.
Jian Tang, Zhao Huang, Chunqiang Li
doaj   +1 more source

Tracing Three Decades of Low Earth Orbit Satellite Communication Development: A Bibliometric and Main Path Analysis of Network Architectures, Protocol Evolution, and Emerging Intelligent Services

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT Low Earth Orbit (LEO) satellite communication systems have evolved into a critical component of global broadband networks, enabling wide‐area connectivity, IoT services, and intelligent multilayer satellite–terrestrial integration. Despite rapid advancements in constellation deployment, routing mechanisms, resource management, and LEO–5G/6G ...
Wei‐Hao Su   +2 more
wiley   +1 more source

Two-Stage Intelligent Model for Detecting Malicious DDoS Behavior

open access: yesSensors, 2022
5G technologies provide ubiquitous connectivity. However, 5G security is a particularly important issue. Moreover, because public datasets are outdated, we need to create a self-generated dataset on the virtual platform. Therefore, we propose a two-stage
Man Li, Huachun Zhou, Yajuan Qin
doaj   +1 more source

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Review of Key Technologies of Incremental Intrusion Detection for Network Encrypted Traffic [PDF]

open access: yesJisuanji gongcheng
As cyber threats continue to intensify, the concealment of encrypted traffic attacks and the suddenness of zero-day exploits have significantly reduced the detection efficiency of traditional intrusion detection systems.
CHEN Liangchen, FU Deyin, LIU Baoxu, GAO Shu, ZHANG Xuyao
doaj   +1 more source

Metaverse and Artificial Intelligence as Web 4.0: The Next Generation of the Internet

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT This study utilizes systems thinking to explore and entwine an evolving metaverse scholarship to a relatively underexplored phenomenon of Web 4.0. We adopt a soft systems thinking framework to guide the interpretation of complex and evolving metaverse scholarship, using bibliometric mapping of 5587 publications sourced from Scopus.
Anton Klarin   +3 more
wiley   +1 more source

Lifecycle‐Based Governance to Build Reliable Ethical AI Systems

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT Artificial intelligence (AI) systems represent a paradigm shift in technological capabilities, offering transformative potential across industries while introducing novel governance and implementation challenges. This paper presents a comprehensive framework for understanding AI systems through three critical dimensions: trustworthiness ...
Maikel Leon
wiley   +1 more source

Malicious Traffic Detection on Tofino Using Graph Attention Model

open access: yesApplied Sciences
With the surge of malicious traffic in networks, existing detection methods struggle to balance real-time performance and efficiency. Data plane programmability, as an emerging technology, offers rapid control loops that can more effectively detect and ...
Xichang Gao   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy