Although encrypted traffic ensures information security, it can also be exploited by malicious actors, leading to security risks. This paper addresses the limitations of existing behavior recognition technologies, par...
详细信息
The proceedings contain 27 papers. The topics discussed include: a load prediction method for data transmission in optical communicationnetworks based on LSTM model;Bayesian-LightGBM classification prediction model o...
ISBN:
(纸本)9798400711688
The proceedings contain 27 papers. The topics discussed include: a load prediction method for data transmission in optical communicationnetworks based on LSTM model;Bayesian-LightGBM classification prediction model of tennis match situation change;supplement to decomposition of mean squared error of weighted geometric mean combined forecasting method;reconstructing cosmic observations with artificial neural networks: a test of Hubble constant;a routing method for flying ad hoc networks based on node degree estimation and game-theoretic forwarding strategy;the study of a distributed networking method based on an improved raft protocol;research on network security spatial data asset protection technology based on deep learning;and introduction to integration technology based on dispatch telephone and human machine workstation.
In recent years, the rapid development of the Internet industry has made the network traffic show a diversified trend. Different application services have different characteristics and have different requirements on n...
详细信息
The massive transmission of data in optical communicationnetworks leads to an increase in the load of optical communication channels, making it more difficult to predict data transmission loads. A data transmission l...
详细信息
This paper establishes a hierarchical structural model for the brittleness link of computer network security, building upon definitions of brittleness, research methods and structure models. In addition, using the fuz...
详细信息
Spatial information network, as a typical functional network, plays a key role in the task system. On the basis of analyzing the topological structure of spatial information network, this paper uses the operational ri...
详细信息
Submarines are vital for military defense and national security in strategic communication systems. Power Spectral Density (PSD) characterizes signal spectrum frequency dependence and is crucial for analyzing broadban...
详细信息
Considering that UAV, serving as base stations, can enhance the flexibility of communication system transmission, reduce transmission delays, and provide temporary communication, this paper proposes a NOMA-assisted UA...
详细信息
This paper presents a novel network security situational prediction model, FusedCNN-LSTM-AttNet, which integrates Convolutional Neural networks (CNN), Long Short-Term Memory networks (LSTM), and Attention mechanisms. ...
详细信息
In order to solve the problem that telecom fraud data cannot be centralized for training due to privacy security and data island in the training of telecom fraud model in mobile communication, federated learning can b...
详细信息
暂无评论