Results 41 to 50 of about 82,373 (261)

Data-Driven Network Analysis for Anomaly Traffic Detection

open access: yesSensors, 2023
Cybersecurity is a critical issue in today’s internet world. Classical security systems, such as firewalls based on signature detection, cannot detect today’s sophisticated zero-day attacks.
Shumon Alam   +3 more
doaj   +1 more source

Evolutionarily divergent DUF4465 domains have a common vitamin B12‐binding function

open access: yesFEBS Open Bio, EarlyView.
We show that DUF4465 family proteins, widespread across bacteria from gut microbiomes, hydrothermal vents, and soil, share a common vitamin B12‐binding function. These augmented β‐jellyroll proteins bind vitamin B12 via extended loops. Our findings establish sequence‐diverse DUF4465 proteins as a widespread class of B12‐binding proteins, highlighting ...
Charlea Clarke   +4 more
wiley   +1 more source

Network Traffic Analysis Based on Graph Neural Networks: A Scoping Review

open access: yesBig Data and Cognitive Computing
Network traffic analysis is crucial for understanding network behavior and identifying underlying applications, protocols, and service groups. The increasing complexity of network environments, driven by the evolution of the Internet, poses significant ...
Ruonan Wang   +5 more
doaj   +1 more source

Diagnostic Utility of the ATG9A Ratio in AP‐4–Associated Hereditary Spastic Paraplegia

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Adaptor protein complex 4–associated hereditary spastic paraplegia (AP‐4‐HSP), a childhood‐onset neurogenetic disorder and frequent mimic of cerebral palsy, is caused by biallelic variants in the adaptor protein complex 4 (AP‐4) subunit genes (AP4B1 [for SPG47], AP4M1 [for SPG50], AP4E1 [for SPG51], and AP4S1 [for SPG52]).
Habibah A. P. Agianda   +12 more
wiley   +1 more source

Architectural Selection Framework for Synthetic Network Traffic: Quantifying the Fidelity–Utility Trade-off

open access: yesIEEE Access
The fidelity and utility of synthetic network traffic are critically compromised by architectural mismatch across heterogeneous network datasets and prevalent scalability failure.
Dure Adan Ammara   +2 more
doaj   +1 more source

Epilepsy‐Associated Variants of a Single SCN1A Codon Exhibit Divergent Functional Properties

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Pathogenic variants in SCN1A, which encodes the voltage‐gated sodium channel NaV1.1, are associated with multiple epilepsy syndromes exhibiting a range of clinical severity. SCN1A variants are reported in different syndromes, including Dravet syndrome, which is associated with loss‐of‐function, whereas neonatal/infantile‐onset ...
Lanie N. Liebovitz   +3 more
wiley   +1 more source

Fast Real-World Classification of ECH-Enabled Applications

open access: yesIEEE Transactions on Machine Learning in Communications and Networking
Encrypted Client Hello (ECH) reduces information leakage in encrypted packet connections, thereby complicating traditional Deep Packet Inspection (DPI) methods.
Yizhak Kahana   +2 more
doaj   +1 more source

Urban Road Network Emergency: An Integrative Vulnerability Identification Method

open access: yesComplexity, 2021
The vulnerability of an urban road network is affected by many factors, such as internal road network layout, network structure strength, and external destructive events, which have great uncertainty and complexity.
Huaikun Xiang
doaj   +1 more source

Innate Immune Reprogramming Mediated by Endogenous Retroelement Dysregulation Drives Multiple Sclerosis Progression

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
Epigenetic reprogramming in hematopoietic stem and progenitor cells (HSPCs) and downstream myeloid cells, mediated by H3.3 downregulation and endogenous retroelement (ERE) overexpression, contributes to the progression of multiple sclerosis (MS). ABSTRACT Background Skewed myelopoiesis in the bone marrow has been identified as a key driver of multiple ...
Li‐Mei Xiao   +6 more
wiley   +1 more source

Linear discriminant analysis in network traffic modelling

open access: yesInternational Journal of Communication Systems, 2006
It was not easy to give an accurate judgment of whether the traffic model fitting the actual traffic. The common method was to compare the Hurst parameter, data histogram and autocorrelation function. The method of comparing Hurst parameter could’t give exact results and judgment.
ZHANG Bing-yi   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy