The growing application of smart home technologies has exposed significant vulnerabilities in cybersecurity. This research proposes a lightweight, AI-powered Threat Detection System (TDS) aimed at improving the securi...
详细信息
ISBN:
(数字)9798331506995
ISBN:
(纸本)9798331507008
The growing application of smart home technologies has exposed significant vulnerabilities in cybersecurity. This research proposes a lightweight, AI-powered Threat Detection System (TDS) aimed at improving the security of IoT devices in smart homes by combining Azure Cloud and Google big-Query for efficient data storage and processing. The proposed system implements firewalls and Transport Layer Security (TLS) encryption to secure communication channels and safeguard critical data from unauthorized access. The TDS utilizes Google bigQuery to analyze extensive IoT data for trained threat detection and mitigation decisions. Some necessary algorithms, such as Deep Q-Networks (DQN) and autoencoders-reinforce its functionality. DQN separates devices exhibiting atypical behavior, and autoencoders identify anomalies in device activity, network traffic, and access patterns. The technology quarantines the damaged device to avoid further damage, using safe data processing in Azure Cloud under strict encryption procedures. The TDS continually analyses data streams in real-time, instantly notifying administrators through a mobile application when abnormalities arise and autonomously upgrading security policies to address evolving threats. This research shows the essential function of cloud-based security solutions and artificial intelligence in safeguarding smart home ecosystems against evolving cyber threats.
In Vietnam, research and design activities related to recognition systems are making initial strides within universities. Previous scientific research and projects predominantly focused on areas like fingerprint recog...
详细信息
The proceedings contain 28 papers. The special focus in this conference is on Information Systems and Design. The topics include: Cyber Threat Risk Assessment in Energy Based on Cyber Situational Awareness Techniques;...
ISBN:
(纸本)9783030954932
The proceedings contain 28 papers. The special focus in this conference is on Information Systems and Design. The topics include: Cyber Threat Risk Assessment in Energy Based on Cyber Situational Awareness Techniques;features of Creating and Maintaining a Corporate Culture for Remote Workers Within the Organization in the Digital Transformation Era;simulation Modelling for Assessing the Adequacy of Decision Support Models with Choosing a Product Offer;the Study of Fuzzy Quantifiers in Multi-criteria Decision-Making;the Dialectic Interrelation Between Digital Organization Architecture Elements;New Areas of Blockchain Technology Applications During the COVID-19 Pandemic;development of Special Software for Solving Large-Dimensional Transport Problems with a Modified Genetic Algorithm Using Multithreading Properties;Analysis of the Estimates Quality in the Problem of Parametric Identification of Distributed Dynamic Processes Based on a Modified OLS;scheduling with Genetic algorithms Based on Binary Matrix Encoding;challenges and Prospects for Cloud-Based Enterprise Systems in Tradition-Focused Cultures: A Design Thinking Case Study;software for Researching the Processes of Curing of Polymer Compositions Using Mathematical Modeling;an Intelligent Approach to Decentralized Control in the Agro-industrial Complex;methodical Approach for Impact Assessment of Energy Facilities on Environment;Disadvantages of Relational DBMS for bigdata Processing;development of an Application for data Structuring with the Possibility of Displaying 3D Models;key Concepts for Experience-Driven Innovation;Development of a Robot for Building a Map of the Area;towards to Extended Empathy Methods in Design Thinking;The Use of Virtual Reality to Drive Innovations. VRE-IP Experiment.
bigdata Analysis(BDA) has attracted considerable interest and curiosity from scientists of various fields *** big size and complexity of bigdata,it is pivotal to uncover hidden patterns,bursts of activity,correlat...
详细信息
ISBN:
(纸本)9781509036202
bigdata Analysis(BDA) has attracted considerable interest and curiosity from scientists of various fields *** big size and complexity of bigdata,it is pivotal to uncover hidden patterns,bursts of activity,correlations and laws of *** network analysis could be effective method for this purpose,because of its powerful data organization and visualization *** the general complex software(Gephi),some bibliometrics software(Citespace and SCI) could also be used for this analysis,due to their powerful data process and visualization *** paper presents a comparison of Citespace,SCI and Gephi from the following three aspects:(1) data *** is timeconsuming and laborious on merging *** is efficient and suitable for massive *** of them could remove duplicate ***,Gephi lacks these.(2) Network *** pays more attention on temporal analysis,but SCI and Gephi pay less attention on ***,Citespace and SCI could provide pruning algorithms highlight the main structure of social network,but Gephi lacks this.(3) *** Citespace,co-occurrence network could present time,frequency and betweenness centrality simultaneously;cluster view could label the clusters with ***,SCI and Gephi provide more various layout algorithms to present ***,they have a better edit-ability than Citespace on generated network.
Domain terminology recognition and extraction is the primary work for construction of domain knowledge *** method is tedious,and time-consuming,as well as low *** paper presents an automatic domain feature extraction ...
详细信息
ISBN:
(纸本)9781509036202
Domain terminology recognition and extraction is the primary work for construction of domain knowledge *** method is tedious,and time-consuming,as well as low *** paper presents an automatic domain feature extraction method based on the Domain Feature Vectors(DFVs).Experimental results demonstrate that our approach is effectiveness and accuracy.
Unmanned mobile robots have broad application prospects in space exploration. In order to meet the increasing technical requirements, it is of great practical significance to study robot cluster work, path planning, a...
详细信息
The problem this work trying to solve is applying AlexNet, LeNet-5 and VGG Net to the CIF AR-10 database and tell the features and performance of these structures. Multiple strategies of training have been tested, the...
详细信息
ISBN:
(纸本)9781665427098
The problem this work trying to solve is applying AlexNet, LeNet-5 and VGG Net to the CIF AR-10 database and tell the features and performance of these structures. Multiple strategies of training have been tested, they are respectively AlexNet, LeNet5, VGG Net. These neural network algorithms are famous since they have achieved high accuracy in competitions. Although they are not designed for training CIFAR-10, it is worth to exploit that whether such an excellent model compatible to different input. Therefore, they will modified and tested the performance on CIFAR-10.
In the field of supply chain finance, small and medium-sized enterprises generally have financing difficulties, which are often caused by the difficulty of financing institutions to clearly define their financial cred...
详细信息
The No. 2 generator of a thermal power plant is a 25MW extraction generator produced by Nanjing Turbomotor (Group) Co., LTD. The excitation regulator of this unit uses DVR-2000B digital excitation regulator provided b...
详细信息
暂无评论