UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 2,049
11.
Full text

PDF
12.
  • Wireless Local Area Network... Wireless Local Area Networks Threat Detection Using 1D-CNN
    Natkaniec, Marek; Bednarz, Marcin Sensors (Basel, Switzerland), 06/2023, Volume: 23, Issue: 12
    Journal Article
    Peer reviewed
    Open access

    Wireless Local Area Networks (WLANs) have revolutionized modern communication by providing a user-friendly and cost-efficient solution for Internet access and network resources. However, the ...
Full text
13.
Full text

PDF
14.
  • IoT Traffic Analyzer Tool w... IoT Traffic Analyzer Tool with Automated and Holistic Feature Extraction Capability
    Subahi, Alanoud; Almasre, Miada Sensors (Basel, Switzerland), 05/2023, Volume: 23, Issue: 11
    Journal Article
    Peer reviewed
    Open access

    The Internet of Things (IoT) is an emerging technology that attracted considerable attention in the last decade to become one of the most researched topics in computer science studies. This research ...
Full text
15.
  • Traffic analysis of two-lay... Traffic analysis of two-layer coupled networks
    Zhang, Min Journal of physics. Conference series, 12/2022, Volume: 2396, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Abstract Since many systems in the real world are structured and characterized by multilayer networks, more and more scholars have started to investigate the coupling mechanism in multilayer network. ...
Full text
16.
  • Multiple Strategies Differe... Multiple Strategies Differential Privacy on Sparse Tensor Factorization for Network Traffic Analysis in 5G
    WangWangWangWang, Jin; Han, Hui; Li, Hao ... IEEE transactions on industrial informatics, 03/2022, Volume: 18, Issue: 3
    Journal Article
    Open access

    Due to high capacity and fast transmission speed, 5G plays a key role in modern electronic infrastructure. Meanwhile, sparse tensor factorization (STF) is a useful tool for dimension reduction to ...
Full text

PDF
17.
  • Comparative analysis of zon... Comparative analysis of zonal systems for macro-level crash modeling
    Cai, Qing; Abdel-Aty, Mohamed; Lee, Jaeyoung ... Journal of safety research, 06/2017, Volume: 61
    Journal Article
    Peer reviewed

    Macro-level traffic safety analysis has been undertaken at different spatial configurations. However, clear guidelines for the appropriate zonal system selection for safety analysis are unavailable. ...
Full text
18.
  • Analysis of high volumes of... Analysis of high volumes of network traffic for Advanced Persistent Threat detection
    Marchetti, Mirco; Pierazzi, Fabio; Colajanni, Michele ... Computer networks (Amsterdam, Netherlands : 1999), 11/2016, Volume: 109
    Journal Article
    Peer reviewed
    Open access

    Advanced Persistent Threats (APTs) are the most critical menaces to modern organizations and the most challenging attacks to detect. They span over long periods of time, use encrypted connections and ...
Full text

PDF
19.
  • Assessing veracity of big d... Assessing veracity of big data: An in-depth evaluation process from the comparison of Mobile phone traces and groundtruth data in traffic monitoring
    Nalin, Alessandro; Vignali, Valeria; Lantieri, Claudio ... Journal of transport geography, June 2024, 2024-06-00, Volume: 118
    Journal Article
    Peer reviewed

    Veracity is a critical dimension of Big Data, as it is related to the quality of data. Its role is even more important when Big Data are supposed to be a counterpart or a substitute of official data. ...
Full text
20.
  • Ransomware early detection ... Ransomware early detection by the analysis of file sharing traffic
    Morato, Daniel; Berrueta, Eduardo; Magaña, Eduardo ... Journal of network and computer applications, 12/2018, Volume: 124
    Journal Article
    Peer reviewed
    Open access

    Crypto ransomware is a type of malware that locks access to user files by encrypting them and demands a ransom in order to obtain the decryption key. This type of malware has become a serious threat ...
Full text

PDF
1 2 3 4 5
hits: 2,049

Load filters