Results 11 to 20 of about 163,881 (272)

A survey of methods for encrypted network traffic fingerprinting

open access: yesMathematical Biosciences and Engineering, 2023
Privacy protection in computer communication is gaining attention because plaintext transmission without encryption can be eavesdropped on and intercepted. Accordingly, the use of encrypted communication protocols is on the rise, along with the number of
Sunghyun Yu , Yoojae Won
doaj   +1 more source

Tunable photon blockade in a hybrid system consisting of an optomechanical device coupled to a two-level system [PDF]

open access: yes, 2015
We study photon blockade and anti-bunching in the cavity of an optomechanical system in which the mechanical resonator is coupled to a two-level system (TLS).
Gu, Xiu   +4 more
core   +2 more sources

Translesion synthesis in mammalian cells [PDF]

open access: yes, 2006
DNA damage blocks the progression of the replication fork. In order to circumvent the damaged bases, cells employ specialized low stringency DNA polymerases, which are able to carry out translesion synthesis (TLS) past different types of damage. The five
Alan R. Lehmann   +35 more
core   +2 more sources

Cryptographic Stack Machine Notation One

open access: yesТруды Института системного программирования РАН, 2018
A worthy cryptographic protocol specification has to be human-readable (declarative and concise), executable and formally verified in a sound model. Keeping in mind these requirements, we present a protocol message definition notation named CMN.1, which ...
S. E. Prokopev
doaj   +1 more source

Sparsity-Cognizant Total Least-Squares for Perturbed Compressive Sampling [PDF]

open access: yes, 2010
Solving linear regression problems based on the total least-squares (TLS) criterion has well-documented merits in various applications, where perturbations appear both in the data vector as well as in the regression matrix.
Geert Leus   +4 more
core   +1 more source

ANALYSIS OF RIVER BANK EROSION BY COMBINED AIRBORNE AND LONG-RANGE TERRESTRIAL LASER SCANNING: PRELIMINARY RESULTS ON THE VISTULA RIVER

open access: yesГеодинамика и тектонофизика, 2018
In our study, high-resolution digital elevation models (HRDEM) were generated by combining the data from airborne laser scanning (ALS, 2012) and long-range terrestrial laser scanning (TLS, 2015) and used for qualitative and quantitative analysis of ...
S. Tyszkowski   +4 more
doaj   +1 more source

Generating Network Intrusion Detection Dataset Based on Real and Encrypted Synthetic Attack Traffic

open access: yesApplied Sciences, 2021
The lack of publicly available up-to-date datasets contributes to the difficulty in evaluating intrusion detection systems. This paper introduces HIKARI-2021, a dataset that contains encrypted synthetic attacks and benign traffic.
Andrey Ferriyan   +3 more
doaj   +1 more source

Analysis of high quality superconducting resonators: consequences for TLS properties in amorphous oxides [PDF]

open access: yes, 2015
$1/f$ noise caused by microscopic Two-Level Systems (TLS) is known to be very detrimental to the performance of superconducting quantum devices but the nature of these TLS is still poorly understood.
Efros A   +5 more
core   +3 more sources

Characterization of wavelength tunable lasers for future optical communication systems [PDF]

open access: yes, 2010
The use of tunable lasers (TL) in dense wavelength division multiplexed (DWDM) networks for optical switching, routing and networking has gained a lot of interest in recent years.
Anandarajah, Prince M.   +4 more
core   +1 more source

Application of laser scanning technology in creation of 3D city models [PDF]

open access: yesZbornik radova Departmana za geografiju, turizam i hotelijerstvo, 2017
Laser scanning technology is considered to be a fairly new active remote sensing technology and it finds its application in various fields. The data acquired trough terrestrial or aerial laser scanning is beneficial in representation of three-dimensional
Milovanov Stevan, Ruskovski Igor
doaj   +1 more source

Home - About - Disclaimer - Privacy