Traffic encryption techniques facilitate cyberattackers to hide their presence and *** classification is an important method to prevent network ***,due to the tremendous traffic volume and limitations of computing,mos...
详细信息
Traffic encryption techniques facilitate cyberattackers to hide their presence and *** classification is an important method to prevent network ***,due to the tremendous traffic volume and limitations of computing,most existing traffic classification techniques are inapplicable to the high-speed network *** this paper,we propose a High-speed Encrypted Traffic Classification(HETC)method containing two ***,to efficiently detect whether traffic is encrypted,HETC focuses on randomly sampled short flows and extracts aggregation entropies with chi-square test features to measure the different patterns of the byte composition and distribution between encrypted and unencrypted ***,HETC introduces binary features upon the previous features and performs fine-grained traffic classification by combining these payload features with a Random Forest *** experimental results show that HETC can achieve a 94%F-measure in detecting encrypted flows and a 85%–93%F-measure in classifying fine-grained flows for a 1-KB flow-length dataset,outperforming the state-of-the-art comparison ***,HETC does not need to wait for the end of the flow and can extract mass computing *** average time for HETC to process each flow is only 2 or 16 ms,which is lower than the flow duration in most cases,making it a good candidate for high-speed traffic classification.
Service migration can solve the issue of frequent user switching caused by the restricted coverage of edge cloud, which is currently a major focus of research. Simultaneously, microservice architecture gains traction ...
详细信息
In the previous works, to further provide the continuous leakage resilience for the identity-based encryption scheme, a new cryptography primitive, called updatable identity-based hash proof system(U-IB-HPS),was propo...
详细信息
In the previous works, to further provide the continuous leakage resilience for the identity-based encryption scheme, a new cryptography primitive, called updatable identity-based hash proof system(U-IB-HPS),was proposed. However, most of the existing constructions have some deficiencies, they either do not have perfect key update function or the corresponding security with tight reduction relies on a non-static complexity assumption. To address the above problems, a new construction of U-IB-HPS is created, and the corresponding security of our system is proved based on the static complexity assumption. Also, the corresponding comparisons and analysis of performances show that our proposal not only achieves the perfect key update function and the anonymity, but also has the tight security reduction. In additional, our proposal achieves the same computational efficiency as other previous systems. To further illustrate the practical function of U-IB-HPS, a generic method of non-interactive data authorization protocol with continuous leakage resilience is designed by employing U-IB-HPS as an underlying tool, which can provide continuous leakage-resilient data authorization function for the cloud computing. Hence, the application field of U-IB-HPS is further extended through our study.
The dynamic landscape of sustainable smart cities is witnessing a significant transformation due to the integration of emerging computational technologies and innovative *** advancements are reshaping data-driven plan...
详细信息
The dynamic landscape of sustainable smart cities is witnessing a significant transformation due to the integration of emerging computational technologies and innovative *** advancements are reshaping data-driven planning strategies,practices,and approaches,thereby facilitating the achievement of environmental sustainability *** transformative wave signals a fundamental shift d marked by the synergistic operation of artificial intelligence(AI),artificial intelligence of things(AIoT),and urban digital twin(UDT)*** previous research has largely explored urban AI,urban AIoT,and UDT in isolation,a significant knowledge gap exists regarding their synergistic interplay,collaborative integration,and collective impact on data-driven environmental planning in the dynamic context of sustainable smart *** address this gap,this study conducts a comprehensive systematic review to uncover the intricate interactions among these interconnected technologies,models,and domains while elucidating the nuanced dynamics and untapped synergies in the complex ecosystem of sustainable smart *** to this study are four guiding research questions:*** theoretical and practical foundations underpin the convergence of AI,AIoT,UDT,data-driven planning,and environmental sustainability in sustainable smart cities,and how can these components be synthesized into a novel comprehensive framework?*** does integrating AI and AIoT reshape the landscape of datadriven planning to improve the environmental performance of sustainable smart cities?*** can AI and AIoT augment the capabilities of UDT to enhance data-driven environmental planning processes in sustainable smart cities?*** challenges and barriers arise in integrating and implementing AI,AIoT,and UDT in data-driven environmental urban planning,and what strategies can be devised to surmount or mitigate them?Methodologically,this study involves a rigorous analysis and synthesis of studies publis
INTRODUCTION With the rapid development of remote sensing technology,high-quality remote sensing images have become widely *** automated object detection and recognition of these images,which aims to automatically loc...
INTRODUCTION With the rapid development of remote sensing technology,high-quality remote sensing images have become widely *** automated object detection and recognition of these images,which aims to automatically locate objects of interest in remote sensing images and distinguish their specific categories,is an important fundamental task in the *** provides an effective means for geospatial object monitoring in many social applications,such as intelligent transportation,urban planning,environmental monitoring and homeland security.
In tennis and other competitive sports, momentum plays a pivotal role, where actions like consecutive scoring can enhance a player's momentum and increase his chances of winning the match. Quantifying momentum and...
详细信息
Comment analyzers were widely employed across industries for sentiment analysis, social media monitoring, and customer feedback evaluation. These tools facilitated insight into public opinions and sentiments expressed...
详细信息
Micro-expression (ME) recognition holds great potential for revealing true human emotions. A significant barrier to effective ME recognition is the lack of sufficient annotated ME video data because MEs are subtle and...
详细信息
The reconstruction of human pose using radar primarily focuses on effectively estimating the position and pose of a target based on radar echo signals. Compared to traditional optical methods, radar signals can operat...
详细信息
This study presents the successful integration of Virtual Reality (VR) tools as an element in computerscience curriculum at German University of technology, Oman. The research study investigates the use of MyScore, a...
详细信息
ISBN:
(纸本)9781917204194
This study presents the successful integration of Virtual Reality (VR) tools as an element in computerscience curriculum at German University of technology, Oman. The research study investigates the use of MyScore, a VR application developed by RWTH Aachen University - Teaching & Research Field Engineering Hydrology as an environment for computer hardware assembly and troubleshooting exercises. The VR simulation utilized in this study acts as a gamified environment, incorporating elements like scorekeeping and interactive challenges to enhance practical learning in computerscience, akin to game-based strategies that engage and motivate students. Over of some weeks, the project involved seven students and one tutor in immersive learning sessions to develop applied skills computer hardware assembly with VR technology over conventional teaching methods. Structured surveys and direct observations were used for data collection through students' interactions with the VR sessions. We also evaluated the students learning experiences as well as the usability of technology. The results showed that the user-friendliness of the VR interface and its ability to accurately simulate real-world tasks associated with computer assembly received both positive and negative reactions. While some students praised the technology for being pretty cutting-edge, some criticized it as unrealistic or non-interactive. We also received complaints that ranged from actually moving around in the virtual space to navigating only through teleportation spark points. Specifically, two students gotten motion sickness which is a well-known obstacle associated with VR environments and consequently left the sessions prematurely. The feedback of the instructor pointed towards that setting up the VR equipment is straightforward and described some potentials methods. Still, a call for more reliability in simulations and better interfaces began to surface as nevertheless less controversial agenda items. Howev
暂无评论