|
|
|
Jee-Tae Park, Chang-Yui Shin, Ui-Jun Baek and Myung-Sup Kim
The classification of encrypted traffic plays a crucial role in network management and security. As encrypted network traffic becomes increasingly complicated and challenging to analyze, there is a growing need for more efficient and comprehensive analyt...
ver más
|
|
|
|
|
|
|
Matthias Arnold and Sina Keller
|
|
|
|
|
|
|
Gary Reyes, Roberto Tolozano-Benites, Laura Lanzarini, César Estrebou, Aurelio F. Bariviera and Julio Barzola-Monteses
Persistently, urban regions grapple with the ongoing challenge of vehicular traffic, a predicament fueled by the incessant expansion of the population and the rise in the number of vehicles on the roads. The recurring challenge of vehicular congestion ca...
ver más
|
|
|
|
|
|
|
Zhen Liu, Qifeng Yang, Anlue Wang and Xingyu Gu
In the process of driving in an underground interchange, drivers are faced with many challenges, such as being in a closed space, visual changes alternating between light and dark conditions, complex road conditions in the confluence section, and dense s...
ver más
|
|
|
|
|
|
|
Qasem Abu Al-Haija and Ahmed Al-Tamimi
Automatic dependent surveillance-broadcast (ADS-B) is the future of aviation surveillance and traffic control, allowing different aircraft types to exchange information periodically. Despite this protocol?s advantages, it is vulnerable to flooding, denia...
ver más
|
|
|
|
|
|
|
Omar Abdulkhaleq Aldabash and Mehmet Fatih Akay
An IDS (Intrusion Detection System) is essential for network security experts, as it allows one to identify and respond to abnormal traffic present in a network. An IDS can be utilized for evaluating the various types of malicious attacks. Hence, detecti...
ver más
|
|
|
|
|
|
|
Shuqi Jiang, Jiankui Yu, Shenglin Li, Junming Liu, Guang Yang, Guangshuai Wang, Jinglei Wang and Ni Song
This research provides a comprehensive analysis of the spatiotemporal evolution of the regional cropping structure and its influencing factors. Using Landsat satellite images, field surveys, and yearbook data, we developed a planting structure extraction...
ver más
|
|
|
|
|
|
|
Ahmad Reda Alzighaibi
Currently, the primary concerns on the Internet are security and privacy, particularly in encrypted communications to prevent snooping and modification of Domain Name System (DNS) data by hackers who may attack using the HTTP protocol to gain illegal acc...
ver más
|
|
|
|
|
|
|
James Msughter Adeke, Guangjie Liu, Junjie Zhao, Nannan Wu and Hafsat Muhammad Bashir
Machine learning (ML) models are essential to securing communication networks. However, these models are vulnerable to adversarial examples (AEs), in which malicious inputs are modified by adversaries to produce the desired output. Adversarial training i...
ver más
|
|
|
|
|
|
|
Weijie Zhang, Lanping Zhang, Xixi Zhang, Yu Wang, Pengfei Liu and Guan Gui
Network traffic classification (NTC) has attracted great attention in many applications such as secure communications, intrusion detection systems. The existing NTC methods based on supervised learning rely on sufficient labeled datasets in the training ...
ver más
|
|
|
|