About 1,550,000 results
Open links in new tab
  1. Machine-Learning Based TCP Security Action Prediction

    This study aims to predict TCP security action based on the TCP transmission characteristics dataset provided by UCI machine learning repository by implementing machine learning …

  2. Machine-Learning Based TCP Security Action Prediction

    Dec 1, 2020 · This article proposes to enhance the new Modbus/TCP Security protocol with authentication and authorization functions that guarantee security against intentional …

  3. Prediction of TCP Firewall Action Using Different Machine Learning ...

    Oct 11, 2024 · Our proposed solution uses several different machine learning techniques to predict the TCP firewall action on the basis of the transmission characterisitics of the TCP …

  4. By using machine learning, firewall can process the data more quickly and make decisions on which packets to allow or block. Moreover, it will be able to detect and block new and …

  5. Machine-Learning Based TCP Security Action Prediction

    This study aims to predict TCP security action based on the TCP transmission characteristics dataset provided by UCI machine learning repository by implementing machine learning …

  6. Machine Learning Based TCP Security Action Prediction

    Machine Learning Based TCP Security Action Prediction - Free download as Powerpoint Presentation (.ppt / .pptx), PDF File (.pdf), Text File (.txt) or view presentation slides online.

  7. Machine Learning Based TCP Security Action Prediction

    UGC CARE Journal, UGC CARE Approved Journals, UGC CARE Journal List, UGC CARE Journal Impact Factor, UGC CARE Journal Publication Guidelines, UGC CARE Journal Call …

  8. Machine-Learning Based TCP Security Action Prediction

    With the continuous growth of Internet technology and the increasingly broadening applications of The Internet, network security incidents as well as cyber-attacks are also showin

  9. Leveraging the capabilities of machine learning (ML) has emerged as a pivotal strategy for bolstering cybersecurity defenses. This paper provides an in-depth exploration of the …

  10. This section discusses TCP variants with online learning. These variants try to overcome following limitations of rule based or TCP variants with offline learning.

  11. Some results have been removed
Refresh