Sfoglia per Soggetto "Network security"
Items 1-20 di 27
-
Anomaly detection via blockchained deep learning smart contracts in industry 4.0
(2020)The complexity of threats in the ever-changing environment of modern industry is constantly increasing. At the same time, traditional security systems fail to detect serious threats of increasing depth and duration. ... -
Assessment of Machine Learning Techniques for Building an Efficient IDS
(2020)Intrusion Detection Systems (IDS) are the systems that detect and block any potential threats (e.g. DDoS attacks) in the network. In this project, we explore the performance of several machine learning techniques when used ... -
The beneficial endophytic fungus fusarium solani strain K alters tomato responses against spider mites to the benefit of the plant
(2018)Beneficial microorganisms are known to promote plant growth and confer resistance to biotic and abiotic stressors. Soil-borne beneficial microbes in particular have shown potential in protecting plants against pathogens ... -
Collaborative agent-based detection of DDoS IoT botnets
(2019)The Internet of Things constitutes the latest paradigm shift in computing. Billions of devices sense the real world and store produced data in the cloud. Existing security models, approaches and solutions are not able to ... -
Collaborative blockchain-based detection of distributed denial of service attacks based on internet of things botnets
(2019)Internet of Things is one of the most significant latest developments in computer science. It is common for modern computing infrastructures to partially consist of numerous low power devices that are characterized by high ... -
Data Replication and Virtual Machine Migrations to Mitigate Network Overhead in Edge Computing Systems
(2017)Several virtual machine (VM) placement algorithms have been proposed and studied in the literature with various scopes such as server consolidation or network cost minimization. In most cases, decisions on VM migrations ... -
Detection of abnormal behavior in smart-home environments
(2019)Without a doubt, the security of Internet of Things (IoT) systems is of crucial importance. The use of such systems has significantly increased in the recent year, where in every aspect of our daily life we interact with ... -
Diagnosis of Induced Resistance State in Tomato Using Artificial Neural Network Models Based on Supervised Self-Organizing Maps and Fluorescence Kinetics
(2022)The aim of this study was to develop three supervised self-organizing map (SOM) models for the automatic recognition of a systemic resistance state in plants after application of a resistance inducer. The pathosystem ... -
DReDBox: Materializing a full-stack rack-scale system prototype of a next-generation disaggregated datacenter
(2018)Current datacenters are based on server machines, whose mainboard and hardware components form the baseline, monolithic building block that the rest of the system software, middleware and application stack are built upon. ... -
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks
(2022)Jamming is a terrifying attack that could harm 802.11p-based vehicular communications by occupying the communication channels by overwhelming the network with jamming packets, especially for self-driving cars, as it is ... -
Experimental evaluation of orchestration software for virtual network functions
(2021)The adoption of Network Functions Virtualization (NFV) is considered as one of the enablers for a fully softwarized 5G architecture, that allows significantly higher flexibility for network service providers to instantiate ... -
From internet of threats to internet of things: A cyber security architecture for smart homes
(2019)The H2020 European research project GHOST-Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control-aims to deploy a highly effective security framework for IoT smart home residents through a novel ... -
Further adjustment of the Defense Meteorological Satellite Program - Operational Linescan System using radar data
(2019)In the past, the Defense Meteorological Satellite Program - Operational Linescan System (DSMP/OLS) data have been successfully adjusted based on the presence of vegetation in each pixel. We propose a further adjustment ... -
Intrusion detection system for platooning connected autonomous vehicles
(2019)The deployment of Connected Autonomous Vehicles (CAVs) in Vehicular Ad Hoc Networks (VANETs) requires secure wireless communication in order to ensure reliable connectivity and safety. However, this wireless communication ... -
A Lipschitz - Shapley Explainable Defense Methodology Against Adversarial Attacks
(2021)Every learning algorithm, has a specific bias. This may be due to the choice of its hyperparameters, to the characteristics of its classification methodology, or even to the representation approach of the considered ... -
A Mechanism Design and Learning Approach for Revenue Maximization on Cloud Dynamic Spot Markets
(2021)Modern large-scale computing deployments consist of complex elastic applications running over machine clusters. A current trend adopted by providers is to set unused virtual machines, or else spot instances, in low prices ... -
The next generation cognitive security operations center: Adaptive analytic lambda architecture for efficient defense against adversarial attacks
(2019)A Security Operations Center (SOC) is a central technical level unit responsible for monitoring, analyzing, assessing, and defending an organization’s security posture on an ongoing basis. The SOC staff works closely with ... -
An open web services - Based framework for data mining of biomedical image data
(2009)Mining of biomedical image data is a complex procedure that requires several processing phases, such as data acquisition, preprocessing (e.g., image enhancement, color processing), feature extraction and classification. ... -
Patients Undergoing Surgery for Hip Fractures Suffer from Severe Oxidative Stress as Compared to Patients with Hip Osteoarthritis Undergoing Total Hip Arthroplasty
(2021)Hip fractures are associated with the highest degree of morbidity and mortality of all fractures in elderly patients and pose a major risk for subsequent fractures. Patients with hip fractures also present accelerated bone ... -
Private 5G Networks: Concepts, Architectures, and Research Landscape
(2022)A private fifth generation (5G) network is a dedicated 5G network with enhanced communication characteristics, unified connectivity, optimized services, and customized security within a specific area. By subsuming the ...