Suggested Topics within your search.
Suggested Topics within your search.
- English language 19
- Law 19
- Management 19
- Information technology 17
- History 14
- Research 11
- methods 11
- Philosophy 10
- Economic development 9
- Economic policy 9
- English 9
- Methodology 9
- Anesthesia 8
- Biochemistry 8
- Grammar 8
- History and criticism 8
- Study and teaching 8
- Contracts 7
- Criminal law 7
- Economic conditions 7
- Entrepreneurship 7
- Moral and ethical aspects 7
- Politics and government 7
- Social service 7
- Administrative law 6
- Human anatomy 6
- Mass media 6
- Psychological tests 6
- Social aspects 6
- literature 6
-
66681
Detection of SSL/TLS protocol attacks based on flow spectrum theory
Published 2022-02-01“…Network attack detection plays a vital role in network security.Existing detection approaches focus on typical attack behaviors, such as Botnets and SQL injection.The widespread use of the SSL/TLS encryption protocol arises some emerging attack strategies against the SSL/TLS protocol.With the network traffic collection environment that built upon the implements of popular SSL/TLS attacks, a network traffic dataset including four SSL/TLS attacks, as well as benign flows was controlled.Considering the problems that limited observability of existing detection and limited separation of the original-flow spatiotemporal domains, a flow spectrum theory was proposed to map the threat behavior in the cyberspace from the original spatiotemporal domain to the transformed domain through the process of “potential change” and obtain the “potential variation spectrum”.The flow spectrum theory is based on a set of separable and observable feature representations to achieve efficient analysis of network flows.The key to the application of flow spectrum theory in actual cyberspace threat behavior detection is to find the potential basis matrix for a specific threat network flow under the condition of a given transformation operator.Since the SSL/TLS protocol has a strong timing relationship and state transition process in the handshake phase, and there are similarities between some SSL/TLS attacks, the detection of SSL/TLS attacks not only needs to consider timing context information, but also needs to consider the high-separation representation of TLS network flows.Based on the flow spectrum theory, the threat template idea was used to extract the potential basis matrix, and the potential basis mapping based on the long-short-term memory unit was used to map the SSL/TLS attack network flow to the flow spectrum domain space.On the self-built SSL/TLS attack network flow data set, the validity of the flow spectrum theory is verified by means of classification performance comparison, potential variation spectrum dimensionality reduction visualization, threat behavior feature weight evaluation, threat behavior spectrum division assessment, and potential variation base matrix heatmap visualization.…”
Get full text
Article -
66682
Descriptive Analysis Regarding Optic Canal Variations: A Study In South Punjab Region Of Pakistan
Published 2024-09-01“…These results hold practical implications for clinicians, informing diagnostic imaging, surgical planning, and interventions involving the optic canal. …”
Get full text
Article -
66683
Analysis and calculation of higher harmonics of power supply system of plant on basis of packet wavelet conversion
Published 2022-02-01“…Based on the data obtained, a simulation model is formed and an analysis of higher harmonics is performed using the packet wavelet transform method. …”
Get full text
Article -
66684
Uso de la inteligencia artificial como recurso para potenciar las competencias investigativas y el pensamiento crítico en la educación superior
Published 2025-01-01“…Sin embargo, estudios recientes han demostrado que su uso ha sido de impacto para el sector universitario en general, en tanto estudiantes y docentes, de manera formal e informal, aplican estas herramientas tecnológicas para potenciar las experiencias educativas e investigativas, haciendo más flexible, abierto y dinámico el acceso al conocimiento. …”
Get full text
Article -
66685
Heat exchange processes in volume of fire-tube boiler with non-water heat transfer fluid
Published 2018-07-01Get full text
Article -
66686
Exploring Seasonality Indices for Low-Flow Analysis on Tibagi Watershed (Brazil)
Published 2025-01-01“…The indices were computed and compared using previously calculated low-flow discharge data (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>Q</mi><mn>95</mn></msub></semantics></math></inline-formula>) and physiographic information on sub-watersheds. A ‘Seasonality Calendar’ was developed, illustrating the period and intensity of low-flow discharge occurrences in the watershed. …”
Get full text
Article -
66687
Physical One‐Way Functions for Decentralized Consensus Via Proof of Physical Work
Published 2025-02-01Get full text
Article -
66688
-
66689
Archéologie d’un jardin de sculptures du xxe siècle
Published 2011-01-01“….), data production (texts, photographs), careful study of these information according to an experimental protocol and finally, connecting all the produced data together in a book combining text and photography.…”
Get full text
Article -
66690
Clinicians’ experience with infographic summaries from the BMJ Rapid Recommendations: a qualitative user-testing study among residents and interns at a large teaching hospital in S...
Published 2025-02-01“…Some users felt intimidated by numbers or the amount of information, although they perceived there could be a learning curve while using generic formats. …”
Get full text
Article -
66691
A comparative study of the effect of physical-social factors on the quality of life of residents of different types of housing in quarantine conditions (Case study: different type...
Published 2022-03-01“…The documentary and field method and a questionnaire were used to collect information. To analyze the data, single sample t-test and mean test and to study the normalization of data were used by colomogorov-smarinov test. …”
Get full text
Article -
66692
Robust Classification of Smartphone Captured Handwritten Document Images Using Deep Learning
Published 2025-01-01Get full text
Article -
66693
A study on the carbon emission reduction pathways of China’s digital economy from multiple perspectives
Published 2025-01-01Get full text
Article -
66694
The highly prolific phenotype of Lacaune sheep is associated with an ectopic expression of the B4GALNT2 gene within the ovary.
Published 2013-01-01“…With the aim to identify the FecL gene, we developed a high throughput sequencing strategy of long-range PCR fragments spanning the locus of FecL(L) carrier and non-carrier ewes. Resulting informative markers defined a new 194.6 kb minimal interval. …”
Get full text
Article -
66695
A non-linear approach to the establishment of local biological control agent production units: a case study of fall armyworm in Bangladesh
Published 2022-07-01“…Methods Qualitative and quantitative data from maize growing areas in Bangladesh was collected via telephone interviews from key informants representing four key stakeholders—national research institute, regional research stations, farmer producer organisations and agro-dealers. …”
Get full text
Article -
66696
Performance of indirect adherence measures for daily oral pre-exposure prophylaxis for HIV among adolescent men who have sex with men and transgender women in Brazil.
Published 2024-01-01“…Combining measures can provide wider information on adherence.…”
Get full text
Article -
66697
-
66698
Exploring the relationship between facilitating factors and adherence to nursing ethical standards
Published 2025-01-01Get full text
Article -
66699
Unexplained Illnesses Associated With a Subscription Meal Service, 2022
Published 2025-01-01“…We independently reviewed data on 338 people, including 264 people with supplemental food exposure information, and calculated minimal attack rates. Of 264 people who completed the supplemental survey, all (100%) consumed the Lentil and Leek Crumbles. …”
Get full text
Article -
66700
VDCM: A Data Collection Mechanism for Crowd Sensing in Vehicular Ad Hoc Networks
Published 2023-12-01“…It selects sub mechanism 1 when there exist very few vehicles or the coalition cannot be formed, otherwise selects sub mechanism 2. Single aggregation is used to collect data in sub mechanism 1. …”
Get full text
Article