A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers
Recently, a majority of security operations centers (SOCs) have been facing a critical issue of increased adoption of transport layer security (TLS) encryption on the Internet, in network traffic analysis (NTA).
Chaeyeon Oh, Joonseo Ha, Heejun Roh
doaj +1 more source
Unsupervised two-class and multi-class support vector machines for abnormal traffic characterization [PDF]
Although measurement-based real-time traffic classification has received considerable research attention, the timing constraints imposed by the high accuracy requirements and the learning phase of the algorithms employed still remain a challenge. In this
Hutchison, D. +3 more
core
Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes +3 more
wiley +1 more source
Classification of traffic flows into QoS classes by unsupervised learning and KNN clustering [PDF]
Traffic classification seeks to assign packet flows to an appropriate quality of service (QoS) class based on flow statistics without the need to examine packet payloads. Classification proceeds in two steps.
Chen, T., Zeng, Y.
core +1 more source
Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe +3 more
wiley +1 more source
Internet-of-Things (IoT) devices are massively interconnected, which generates a massive amount of network traffic. The concept of edge computing brings a new paradigm to monitor and manage network traffic at the network’s edge.
Bushra Mohammed +8 more
doaj +1 more source
Adaptive Clustering-based Malicious Traffic Classification at the Network Edge
The rapid uptake of digital services and Internet of Things (IoT) technology gives rise to unprecedented numbers and diversification of cyber attacks, with which commonly-used rule-based Network Intrusion Detection Systems (NIDSs) are struggling to cope.
A. Diallo, P. Patras
semanticscholar +1 more source
In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka +11 more
wiley +1 more source
Zero-Shot Traffic Identification with Attribute and Graph-Based Representations for Edge Computing
With the proliferation of mobile terminals and the rapid growth of network applications, fine-grained traffic identification has become increasingly challenging.
Zikui Lu +3 more
doaj +1 more source
KAJIAN PENERAPAN ZoSS (ZONA SELAMAT SEKOLAH) DI KOTA BOGOR [PDF]
Placing of (location) school facility (elementary school) as basic equipment facilitation of environment is sometimes accessible to road gives feeling of insecure/unsafe, cause of its impact on interaction conflict within its user (especially toward ...
SUPRAPTO, AGUS
core

