Results 61 to 70 of about 4,251 (194)

Adversarial Traffic Detection Method Based on Ensemble Learning and Anomaly Detection [PDF]

open access: yesJisuanji gongcheng
In recent years, deep learning technology has been increasingly used for malicious traffic detection. However, adversarial example attacks pose challenges to deep learning-based malicious traffic detection. To address this problem, this study proposes an
DONG Fanghe, SHI Qiong, SHI Zhibin
doaj   +1 more source

A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley   +1 more source

An LSTM-Based Deep Learning Approach for Classifying Malicious Traffic at the Packet Level

open access: yesApplied Sciences, 2019
Recently, deep learning has been successfully applied to network security assessments and intrusion detection systems (IDSs) with various breakthroughs such as using Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) to classify ...
Ren-Hung Hwang   +3 more
doaj   +1 more source

A Comprehensive Study on Lightweight Convolution Techniques for Malicious Traffic Synthesis in Diffusion Models

open access: yesIEEE Access
Network security relies on effective and accurate malicious traffic detection, which is increasingly important for edge devices. As computing resources are distributed across many devices, detecting malicious traffic at the edge becomes crucial ...
Fuhao Li, Ifiok Udoidiok, Jielun Zhang
doaj   +1 more source

A Hybrid parallel deep learning model for efficient intrusion detection based on metric learning

open access: yesConnection Science, 2022
With the rapid development of network technology, a variety of new malicious attacks appear while attack methods are constantly updated. As the attackers exploit the vulnerabilities of popular third-party components to invade target websites, further ...
Shaokang Cai   +4 more
doaj   +1 more source

Multiterminal High‐Voltage Direct Current Projects: A Comprehensive Assessment and Future Prospects

open access: yesHigh Voltage, EarlyView.
ABSTRACT Multiterminal high‐voltage direct current (MT‐HVDC) systems are an important part of modern power systems, addressing the need for bulk power delivery and efficient renewable energy integration. This paper provides a comprehensive overview of recent advances in MT‐HVDC technology, including launched projects and ongoing initiatives.
Mohammad Hossein Mousavi   +3 more
wiley   +1 more source

Guest Editorial: Unfolding the potential of 5G technologies for future wireless networks

open access: yesIET Networks, EarlyView.
Abstract With the rapid advancements in mobile Internet and smartphones, data traffic in current mobile communication systems is growing exponentially. At the same time, demands for lower latency, increased robustness, and higher energy efficiency are becoming more stringent.
Gwanggil Jeon   +3 more
wiley   +1 more source

Hyperreality, Polarization and Prejudice: Social Media Descriptions of Swedish Child Welfare Services

open access: yesChild &Family Social Work, EarlyView.
ABSTRACT This article examines how the Swedish child welfare services (CWSs) are described in Arabic‐speaking social media, with a focus on the ‘LVU campaign.’ The material consists of Facebook and YouTube posts and comments about the Swedish CWSs' actions in child mistreatment cases involving migrant families.
Dana Sofi, Jonas Stier, Emmie Wahlström
wiley   +1 more source

Parental Understandings of ‘Stranger Danger’: Balancing Fear of Victimisation by Strangers Against Enabling Autonomy and Independence in Children

open access: yesChildren &Society, EarlyView.
ABSTRACT For decades, children have been taught about ‘stranger danger’. Fear of the stranger has been associated with overly cautious parenting strategies, and the curtailing of freedoms as children transition to adolescents. This article aims to examine the extent to which parents consider this issue of stranger danger in their decisions to grant ...
Craig Collie
wiley   +1 more source

Do deepfakes, digital replicas and human digital twins justify personality rights?

open access: yesThe Journal of World Intellectual Property, EarlyView.
Abstract Unauthorised deepfakes are deeply problematic, from the spreading of misinformation to non‐consensual pornographic content. This paper asks whether deepfakes, digital replicas and human digital twins justify personality rights. To address this question, it examines the harms that deepfakes can cause through disinformation, demeaning content ...
Hayleigh Bosher
wiley   +1 more source

Home - About - Disclaimer - Privacy