|
|
|
Jiaming Song, Xiaojuan Wang, Mingshu He and Lei Jin
In computer networks, Network Intrusion Detection System (NIDS) plays a very important role in identifying intrusion behaviors. NIDS can identify abnormal behaviors by analyzing network traffic. However, the performance of classifier is not very good in ...
ver más
|
|
|
|
|
|
|
Merve Ozkan-Okay, Refik Samet, Ömer Aslan, Selahattin Kosunalp, Teodor Iliev and Ivaylo Stoyanov
The fast development of communication technologies and computer systems brings several challenges from a security point of view. The increasing number of IoT devices as well as other computing devices make network communications more challenging. The num...
ver más
|
|
|
|
|
|
|
Sapna Sadhwani, Baranidharan Manibalan, Raja Muthalagu and Pranav Pawar
The study in this paper characterizes lightweight IoT networks as being established by devices with few computer resources, such as reduced battery life, processing power, memory, and, more critically, minimal security and protection, which are easily vu...
ver más
|
|
|
|
|
|
|
Rajesh Natarajan, Gururaj Harinahallo Lokesh, Francesco Flammini, Anitha Premkumar, Vinoth Kumar Venkatesan and Shashi Kant Gupta
Background: The Internet of Medical Things, often known as IoMT, is a revolutionary method of connecting medical equipment and the software that operates on it to the computer networks that are used in healthcare 5.0. The rapid development of smart medic...
ver más
|
|
|
|
|
|
|
Sergey Golubev, Evgenia Novikova and Elena Fedorchenko
Recently, approaches based on the transformation of tabular data into images have gained a lot of scientific attention. This is explained by the fact that convolutional neural networks (CNNs) have shown good results in computer vision and other image-bas...
ver más
|
|
|
|
|
|
|
Hamza Mohammed Ridha Al-Khafaji
The Internet of things (IoT) points to billions of devices located worldwide which are connected and share their data based on the Internet. Due to the new technologies that provide cheap computer chips and universal wireless networks, it is feasible tha...
ver más
|
|
|
|
|
|
|
Yousef-Awwad Daraghmi, Mamoun Abu Helou, Eman-Yasser Daraghmi and Waheeb Abu-ulbeh
The violation traffic laws by driving at high speeds, the overloading of passengers, and the unfastening of seatbelts are of high risk and can be fatal in the event of any accident. Several systems have been proposed to improve passenger safety, and the ...
ver más
|
|
|
|
|
|
|
Sachin Sharma, Saish Urumkar, Gianluca Fontanesi, Byrav Ramamurthy and Avishek Nag
In computer networking, simulations are widely used to test and analyse new protocols and ideas. Currently, there are a number of open real testbeds available to test the new protocols. In the EU, for example, there are Fed4Fire testbeds, while in the US...
ver más
|
|
|
|
|
|
|
Joao da Mata Liborio, Cesar Melo and Marcos Silva
In recent years, image and video super-resolution have gained attention outside the computer vision community due to the outstanding results produced by applying deep-learning models to solve the super-resolution problem. These models have been used to i...
ver más
|
|
|
|
|
|
|
E.E. Istratova,A.E. Smirnov,E.V. Glinin
Pág. 73 - 79
The article presents the results of the development and research of software for monitoring the characteristics of traffic in a corporate computer network. To implement the software, a preliminary analysis of the subject area was carried out, a review of...
ver más
|
|
|
|