ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Religion
Education
Technology
Literature
Languages
Computing
Communication
Computing
Public health
Social Sciences
all records (73)

Languages
English
Spanish
Portuguese
German
French

Countries
Indonesia
South Africa
USA
Brazil
Italy
Ukraine
Canada
Austria
Spain
Netherlands
all records (76)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
197.223  Articles
1 of 19.723 pages  |  10  records  |  more records»
The Next Generation mobile network expected to be fully automated to meet the growing need for data rates and quality in communication. These prodigious demands have also increased the amount of data being handled in these wireless networks. The cellular ... see more

Caching close to users in a radio access network (RAN) has been identified as a promising method to reduce a backhaul traffic load and minimize latency in 5G and beyond. In this paper, we investigate a novel community detection inspired by a proactive cac... see more

The network traffic dataset is a crucial part of anomaly based intrusion detection systems (IDSs). These IDSs train themselves to learn normal and anomalous activities. Properly labeled dataset is used for the training purpose. For the activities based ID... see more

Intrusion Detection System (IDS) is a software or hardware that can be used to detect any abnormal activity in the network. Situations often arise from various network access in the form of information or data that can cause problems. Detection is a syste... see more

This paper proposes a novel detection engine, called the Wavelet-Recurrence-Clustering (WRC) detection model, to study the network anomaly detection problem that is widely attractive in Internet security area. The WRC model firstapplies the wavelet t... see more

Energy systems have to deal with energy cost and environmental concerns such as greenhouse gas emission. Industrial buildings considered as Microgrid (µG) with heavy load worsen these issues even more. Further, cyber-attacks on the data communication chan... see more

Research Question: This paper investigates into how machine learning can be applied for the purpose of detecting anomalies in the data describing transport component within the cellular network. Motivation: In the field of telecommunications, terabytes of... see more

The subject matter of the article is information and communication networks (ICN) of critical infrastructure systems (CIS). The goal of the work is to create methods for managing the data flows and resources of the ICN of CIS to improve the efficiency of ... see more

Bots earn their unique name as they perform a wide variety of automated task. These tasks include stealing sensitive user information. Detection of bots using solutions such as behavioral correlation of flow records, group activity in DNS traffic, observi... see more

1 of 19.723 pages  |  10  records  |  more records»