Machine Learning-Based Error Correction Codes and Communication Protocols for Power Line Communication: An Overview
This study endeavors to investigate the effectiveness of machine learning-based
methodologies in enhancing the performance and reliability of Power Line Communication …
methodologies in enhancing the performance and reliability of Power Line Communication …
[HTML][HTML] Повышение скорости обнаружения ошибок при формировании цепочек блоков данных на основе анализа числа совпадений хешей
МО Таныгин, ЕА Кулешова… - Прикаспийский …, 2022 - cyberleninka.ru
В статье исследуется практическая реализация системы контроля целостности и
аутентичности информации на основе CBC-кодов с целью повышения скорости …
аутентичности информации на основе CBC-кодов с целью повышения скорости …
SPYIPv6: Locating covert data in one or a combination of IPv6 header field (s)
Advancement in the utilization of IPv6 protocol has led to an increase in research related to
its security. In recent times, researchers proposed the possibility of the existence of covert …
its security. In recent times, researchers proposed the possibility of the existence of covert …
Ethernet–USB Bridge Application-Specific Integrated Circuit Incorporating the User Datagram Protocol and Address Resolution Protocol
GM Sung, ZY Li, CP Yu - IEEE Access, 2024 - ieeexplore.ieee.org
An application-specific integrated circuit (ASIC) bridge for translating and transmitting data
between Ethernet and USB was developed in this study. The Ethernet packets of this device …
between Ethernet and USB was developed in this study. The Ethernet packets of this device …
Detecting and locating storage-based covert channels in internet protocol version 6
Increased usage of the Internet has risen the demand for more IP addresses across the
globe resulting in replacement of IPv4 by IPv6 protocol. Hence, security of IPv6 has become …
globe resulting in replacement of IPv4 by IPv6 protocol. Hence, security of IPv6 has become …
DICCh-D: detecting IPv6-based covert channels using DNN
Stegomalware uses Information hiding techniques within Network protocols to leak out
sensitive data and/or to exchange hidden commands between secretly communicating …
sensitive data and/or to exchange hidden commands between secretly communicating …
[HTML][HTML] Covertvasion: Depicting threats through covert channels based novel evasive attacks in android
Privacy and security issues concerning mobile devices have substantial consequences for
individuals, groups, governments, and businesses. The Android operating system bolsters …
individuals, groups, governments, and businesses. The Android operating system bolsters …
[PDF][PDF] Machine Learning-Based Error Correction Codes and Communication Protocols for Power Line Communication: An Overview
S SEKER, AI IDRISS - 2023 - researchgate.net
This study endeavors to investigate the effectiveness of machine learning-based
methodologies in enhancing the performance and reliability of Power Line Communication …
methodologies in enhancing the performance and reliability of Power Line Communication …
Прикаспийский журнал: управление и высокие технологии
КС КОЛЕГОВ - ПРИКАСПИЙСКИЙ ЖУРНАЛ: УПРАВЛЕНИЕ И …, 2011 - elibrary.ru
В работе теоретически исследуется модификация метода испарительной литографии,
когда в систему добавлен ИК-излучатель. Полимерные покрытия с периодической …
когда в систему добавлен ИК-излучатель. Полимерные покрытия с периодической …