Results 81 to 90 of about 2,283,438 (277)

Adaptive sampling method for network traffic security monitoring based on queuing theory [PDF]

open access: yesInternational Journal of Electronics and Telecommunications
Present network monitoring systems need to cope with the ever-increasing amount of traffic in modern high-speed networks. These systems often perform sophisticated deep packet inspection (DPI) for anomaly detection, denial-of-service attacks detection ...
Maciej Sosnowski, Piotr Wiśniewski
doaj   +1 more source

Reconfigurable monitoring for telecommunication networks

open access: yesPeerJ Computer Science, 2020
This article addresses the monitoring problem of the telecommunication networks. We consider these networks as multilevel dynamic objects. It shows that reconfigurable systems are necessary for their monitoring process in real life. We implement the reconfiguration abilities of the systems through the synthesis of monitoring programs and their ...
Man Tianxing   +6 more
openaire   +3 more sources

A Simple Monitoring Network System of Wireless Sensor Network [PDF]

open access: yes, 2012
A SSNS (simple sensor network sniffer) is used to analyze and evaluate the Wireless Sensor Networks (WSN) effectively. SSNS is designed to monitor IEEE 802.15.4 protocol frame, which based on the Ethernet. Unlike the existed monitoring system, our design
Su, S. (Shengjun), Wang, S. (Shuozhong)
core  

Intelligent optical performance monitor using multi-task learning based artificial neural network

open access: yes, 2018
An intelligent optical performance monitor using multi-task learning based artificial neural network (MTL-ANN) is designed for simultaneous OSNR monitoring and modulation format identification (MFI).
Shu, * Liang   +5 more
core   +1 more source

Adenosine‐to‐inosine editing of miR‐200b‐3p is associated with the progression of high‐grade serous ovarian cancer

open access: yesMolecular Oncology, EarlyView.
A‐to‐I editing of miRNAs, particularly miR‐200b‐3p, contributes to HGSOC progression by enhancing cancer cell proliferation, migration and 3D growth. The edited form is linked to poorer patient survival and the identification of novel molecular targets.
Magdalena Niemira   +14 more
wiley   +1 more source

The Missing Link in Network Intrusion Detection: Taking AI/ML Research Efforts to Users

open access: yesIEEE Access
Intrusion Detection Systems (IDS) tackle the challenging task of detecting network attacks as fast as possible. As this is getting more complex in modern enterprise networks, Artificial Intelligence (AI) and Machine Learning (ML) have gained substantial ...
Katharina Dietz   +7 more
doaj   +1 more source

Aggressive prostate cancer is associated with pericyte dysfunction

open access: yesMolecular Oncology, EarlyView.
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero   +11 more
wiley   +1 more source

Liquid biopsy epigenetics: establishing a molecular profile based on cell‐free DNA

open access: yesMolecular Oncology, EarlyView.
Cell‐free DNA (cfDNA) fragments in plasma from cancer patients carry epigenetic signatures reflecting their cells of origin. These epigenetic features include DNA methylation, nucleosome modifications, and variations in fragmentation. This review describes the biological properties of each feature and explores optimal strategies for harnessing cfDNA ...
Christoffer Trier Maansson   +2 more
wiley   +1 more source

Detecting Top-k Flows Combining Probabilistic Sketch and Sliding Window

open access: yesIEEE Access
Efficient real-time top-k flows measurement plays a pivotal role in enhancing both network performance and security, including tasks such as timely traffic scheduling, optimizing network latency and identifying potential security threats.
Keke Zheng   +3 more
doaj   +1 more source

General Framework of Reversible Watermarking Based on Asymmetric Histogram Shifting of Prediction Error

open access: yesAdvances in Multimedia, 2017
This paper presents a general framework for the reversible watermarking based on asymmetric histogram shifting of prediction error, which is inspired by reversible watermarking of prediction error.
Sheng Chen, Xianyi Chen, Huijuan Fu
doaj   +1 more source

Home - About - Disclaimer - Privacy