Results 11 to 20 of about 163,881 (272)
A survey of methods for encrypted network traffic fingerprinting
Privacy protection in computer communication is gaining attention because plaintext transmission without encryption can be eavesdropped on and intercepted. Accordingly, the use of encrypted communication protocols is on the rise, along with the number of
Sunghyun Yu , Yoojae Won
doaj +1 more source
Tunable photon blockade in a hybrid system consisting of an optomechanical device coupled to a two-level system [PDF]
We study photon blockade and anti-bunching in the cavity of an optomechanical system in which the mechanical resonator is coupled to a two-level system (TLS).
Gu, Xiu +4 more
core +2 more sources
Translesion synthesis in mammalian cells [PDF]
DNA damage blocks the progression of the replication fork. In order to circumvent the damaged bases, cells employ specialized low stringency DNA polymerases, which are able to carry out translesion synthesis (TLS) past different types of damage. The five
Alan R. Lehmann +35 more
core +2 more sources
Cryptographic Stack Machine Notation One
A worthy cryptographic protocol specification has to be human-readable (declarative and concise), executable and formally verified in a sound model. Keeping in mind these requirements, we present a protocol message definition notation named CMN.1, which ...
S. E. Prokopev
doaj +1 more source
Sparsity-Cognizant Total Least-Squares for Perturbed Compressive Sampling [PDF]
Solving linear regression problems based on the total least-squares (TLS) criterion has well-documented merits in various applications, where perturbations appear both in the data vector as well as in the regression matrix.
Geert Leus +4 more
core +1 more source
In our study, high-resolution digital elevation models (HRDEM) were generated by combining the data from airborne laser scanning (ALS, 2012) and long-range terrestrial laser scanning (TLS, 2015) and used for qualitative and quantitative analysis of ...
S. Tyszkowski +4 more
doaj +1 more source
Generating Network Intrusion Detection Dataset Based on Real and Encrypted Synthetic Attack Traffic
The lack of publicly available up-to-date datasets contributes to the difficulty in evaluating intrusion detection systems. This paper introduces HIKARI-2021, a dataset that contains encrypted synthetic attacks and benign traffic.
Andrey Ferriyan +3 more
doaj +1 more source
Analysis of high quality superconducting resonators: consequences for TLS properties in amorphous oxides [PDF]
$1/f$ noise caused by microscopic Two-Level Systems (TLS) is known to be very detrimental to the performance of superconducting quantum devices but the nature of these TLS is still poorly understood.
Efros A +5 more
core +3 more sources
Characterization of wavelength tunable lasers for future optical communication systems [PDF]
The use of tunable lasers (TL) in dense wavelength division multiplexed (DWDM) networks for optical switching, routing and networking has gained a lot of interest in recent years.
Anandarajah, Prince M. +4 more
core +1 more source
Application of laser scanning technology in creation of 3D city models [PDF]
Laser scanning technology is considered to be a fairly new active remote sensing technology and it finds its application in various fields. The data acquired trough terrestrial or aerial laser scanning is beneficial in representation of three-dimensional
Milovanov Stevan, Ruskovski Igor
doaj +1 more source

