Results 81 to 90 of about 2,283,438 (277)
Adaptive sampling method for network traffic security monitoring based on queuing theory [PDF]
Present network monitoring systems need to cope with the ever-increasing amount of traffic in modern high-speed networks. These systems often perform sophisticated deep packet inspection (DPI) for anomaly detection, denial-of-service attacks detection ...
Maciej Sosnowski, Piotr Wiśniewski
doaj +1 more source
Reconfigurable monitoring for telecommunication networks
This article addresses the monitoring problem of the telecommunication networks. We consider these networks as multilevel dynamic objects. It shows that reconfigurable systems are necessary for their monitoring process in real life. We implement the reconfiguration abilities of the systems through the synthesis of monitoring programs and their ...
Man Tianxing +6 more
openaire +3 more sources
A Simple Monitoring Network System of Wireless Sensor Network [PDF]
A SSNS (simple sensor network sniffer) is used to analyze and evaluate the Wireless Sensor Networks (WSN) effectively. SSNS is designed to monitor IEEE 802.15.4 protocol frame, which based on the Ethernet. Unlike the existed monitoring system, our design
Su, S. (Shengjun), Wang, S. (Shuozhong)
core
Intelligent optical performance monitor using multi-task learning based artificial neural network
An intelligent optical performance monitor using multi-task learning based artificial neural network (MTL-ANN) is designed for simultaneous OSNR monitoring and modulation format identification (MFI).
Shu, * Liang +5 more
core +1 more source
A‐to‐I editing of miRNAs, particularly miR‐200b‐3p, contributes to HGSOC progression by enhancing cancer cell proliferation, migration and 3D growth. The edited form is linked to poorer patient survival and the identification of novel molecular targets.
Magdalena Niemira +14 more
wiley +1 more source
The Missing Link in Network Intrusion Detection: Taking AI/ML Research Efforts to Users
Intrusion Detection Systems (IDS) tackle the challenging task of detecting network attacks as fast as possible. As this is getting more complex in modern enterprise networks, Artificial Intelligence (AI) and Machine Learning (ML) have gained substantial ...
Katharina Dietz +7 more
doaj +1 more source
Aggressive prostate cancer is associated with pericyte dysfunction
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero +11 more
wiley +1 more source
Liquid biopsy epigenetics: establishing a molecular profile based on cell‐free DNA
Cell‐free DNA (cfDNA) fragments in plasma from cancer patients carry epigenetic signatures reflecting their cells of origin. These epigenetic features include DNA methylation, nucleosome modifications, and variations in fragmentation. This review describes the biological properties of each feature and explores optimal strategies for harnessing cfDNA ...
Christoffer Trier Maansson +2 more
wiley +1 more source
Detecting Top-
Efficient real-time top-k flows measurement plays a pivotal role in enhancing both network performance and security, including tasks such as timely traffic scheduling, optimizing network latency and identifying potential security threats.
Keke Zheng +3 more
doaj +1 more source
This paper presents a general framework for the reversible watermarking based on asymmetric histogram shifting of prediction error, which is inspired by reversible watermarking of prediction error.
Sheng Chen, Xianyi Chen, Huijuan Fu
doaj +1 more source

