258   Artículos

 
en línea
Jee-Tae Park, Chang-Yui Shin, Ui-Jun Baek and Myung-Sup Kim    
The classification of encrypted traffic plays a crucial role in network management and security. As encrypted network traffic becomes increasingly complicated and challenging to analyze, there is a growing need for more efficient and comprehensive analyt... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Matthias Arnold and Sina Keller    
Revista: Infrastructures    Formato: Electrónico

 
en línea
Gary Reyes, Roberto Tolozano-Benites, Laura Lanzarini, César Estrebou, Aurelio F. Bariviera and Julio Barzola-Monteses    
Persistently, urban regions grapple with the ongoing challenge of vehicular traffic, a predicament fueled by the incessant expansion of the population and the rise in the number of vehicles on the roads. The recurring challenge of vehicular congestion ca... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Zhen Liu, Qifeng Yang, Anlue Wang and Xingyu Gu    
In the process of driving in an underground interchange, drivers are faced with many challenges, such as being in a closed space, visual changes alternating between light and dark conditions, complex road conditions in the confluence section, and dense s... ver más
Revista: Infrastructures    Formato: Electrónico

 
en línea
Qasem Abu Al-Haija and Ahmed Al-Tamimi    
Automatic dependent surveillance-broadcast (ADS-B) is the future of aviation surveillance and traffic control, allowing different aircraft types to exchange information periodically. Despite this protocol?s advantages, it is vulnerable to flooding, denia... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Omar Abdulkhaleq Aldabash and Mehmet Fatih Akay    
An IDS (Intrusion Detection System) is essential for network security experts, as it allows one to identify and respond to abnormal traffic present in a network. An IDS can be utilized for evaluating the various types of malicious attacks. Hence, detecti... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Shuqi Jiang, Jiankui Yu, Shenglin Li, Junming Liu, Guang Yang, Guangshuai Wang, Jinglei Wang and Ni Song    
This research provides a comprehensive analysis of the spatiotemporal evolution of the regional cropping structure and its influencing factors. Using Landsat satellite images, field surveys, and yearbook data, we developed a planting structure extraction... ver más
Revista: Agronomy    Formato: Electrónico

 
en línea
Ahmad Reda Alzighaibi    
Currently, the primary concerns on the Internet are security and privacy, particularly in encrypted communications to prevent snooping and modification of Domain Name System (DNS) data by hackers who may attack using the HTTP protocol to gain illegal acc... ver más
Revista: Computers    Formato: Electrónico

 
en línea
James Msughter Adeke, Guangjie Liu, Junjie Zhao, Nannan Wu and Hafsat Muhammad Bashir    
Machine learning (ML) models are essential to securing communication networks. However, these models are vulnerable to adversarial examples (AEs), in which malicious inputs are modified by adversaries to produce the desired output. Adversarial training i... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Weijie Zhang, Lanping Zhang, Xixi Zhang, Yu Wang, Pengfei Liu and Guan Gui    
Network traffic classification (NTC) has attracted great attention in many applications such as secure communications, intrusion detection systems. The existing NTC methods based on supervised learning rely on sufficient labeled datasets in the training ... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 16     Siguiente »