The proceedings contain 32 papers. The special focus in this conference is on networksecurity and Blockchain Technology. The topics include: Exploring the Limits of Classical Random Number Generation and...
ISBN:
(纸本)9789819780501
The proceedings contain 32 papers. The special focus in this conference is on networksecurity and Blockchain Technology. The topics include: Exploring the Limits of Classical Random Number Generation and Unveiling Quantum Alternatives;LWT-Based Watermarking Scheme for Image Authentication;Robust Image Steganography Using DCT, GrabCut, and Quantization;spread-Spectrum Based a New Secured Robust Image Watermarking Scheme;Zero Trust network Access (ZTNA) Architecture: A Novel Perspective to Cloud security;Enhancing Healthcare IoT security: A CCN-Based Approach for FIB Establishment and Content Delivery;cryptanalysis and Countermeasures on Multivariate Cubic Polynomial-Based Digital Signature;Evaluation of Objective Functions of RPL in the Contiki Simulator on Various Radio Models;lattice-Based Authentication Scheme for Smart Agriculture system;lightweight Symmetric Key Exchange Protocols for Enhanced security in Elastic Optical Fiber Communication;Nonlinearity in AES Subkey Scheduling—An Augmented security;Privacy-Preserved Covid and Inter-BAN Communication Status Maintenance with Key and Random Value Update in Blockchain;Secure Sharing of CCTV Feed;some Notes on Deniability, Obfuscation, and Multiparty Computation;blockchain-Based Secured Ration Distribution system;autoBloc: Blockchain-Based Automotive Supply Chain Management;BHealth: A Blockchain-Based Platform for Healthcare Data;design of a Mechanism for the Analysis of Cybersecurity Breaches and Their Ripple Effect on Global Financial Market;Secure Management of Patient Test Data Using Blockchain and IPFS;intrusion Detection system Using Stacked Ensemble Learning with Light Gradient Boosting Machine and Decision Tree;A Post-benchmarking Framework Towards Evaluating and Ranking Deep Learning Models for Breast Cancer Detection Using Hybrid MCDM;case-Based Spam Filtering for Encrypted Emails;designing and Deploying Blockchain with Truffle and Smart Contracts;ESMDP: Encrypted ML Framework for Secure Medical Data Proc
The proceedings contain 110 papers. The topics discussed include: experimental design of Intranet penetration for anti-virus traffic characterization;software-define cloud-edge collaborative defense architecture again...
ISBN:
(纸本)9798400716959
The proceedings contain 110 papers. The topics discussed include: experimental design of Intranet penetration for anti-virus traffic characterization;software-define cloud-edge collaborative defense architecture against unknown attacks;attribute encryption based blockchain electronic medical record traceability method;a study on blockchain-based data proxy re-encryption privacy protection;data interaction security monitoring technology based on behavior graph representation;research on commercial password design and unified password monitoring platform based on hash function;slice-level vulnerability detection model based on graph neural network;time encoding graph attention model for financial fraud detection in large-scale financial social networks;and research on flexible secure access and unknown attack awareness technology for new-type business terminals.
The proceedings contain 17 papers. The topics discussed include: on the equilibrium points for a discrete system of two fractional-type difference equations;predication of 400kA aluminum electrolytic cell output based...
ISBN:
(纸本)9781450384964
The proceedings contain 17 papers. The topics discussed include: on the equilibrium points for a discrete system of two fractional-type difference equations;predication of 400kA aluminum electrolytic cell output based on the generative adversarial networks;research on the correlation model between equipment status and carbon emissions of emission control enterprises based on convolutional neural network;comparison of support vector machine for apron allocation;landing runway assignment by airport traffic using machine learning;prediction of isobaric vapor-liquid equilibrium data for the ternary and quaternary acetonitrile + water mixture containing ionic liquid using artificial neural network: development of feedforward backpropagation artificial neural network as an alternative to conventional thermodynamic models for the estimation of vapor-liquid equilibrium data;relations learning between BMI and injuries by Bayesian matrix completion;and a discussion on computer security technology and security preventive measures.
The proceedings contain 68 papers. The special focus in this conference is on Machine Learning, Image Processing, networksecurity and Data Sciences. The topics include: Analyzing Wearable Data for Diagnosing COVID-19...
ISBN:
(纸本)9789811958670
The proceedings contain 68 papers. The special focus in this conference is on Machine Learning, Image Processing, networksecurity and Data Sciences. The topics include: Analyzing Wearable Data for Diagnosing COVID-19 Using Machine Learning Model;comparative Analysis of Classification Methods to Predict Diabetes Mellitus on Noisy Data;a Robust Secure Access Entrance Method Based on Multi Model Biometric Credentials Iris and Finger Print;region Classification for Air Quality Estimation Using Deep Learning and Machine Learning Approach;neuroevolution-Based Earthquake Intensity Classification for Onsite Earthquake Early Warning;detection of Credit Card Fraud by Applying Genetic Algorithm and Particle Swarm Optimization;traditional Indian Textile Designs Classification Using Transfer Learning;classification of Electrocardiogram Signal Using Hybrid Deep Learning Techniques;automated Detection of Type 2 Diabetes with Imbalanced and Machine Learning Methods;fault Diagnosis in Wind Turbine Blades Using Machine Learning Techniques;real-Time Detection of Vehicles on South Asian Roads;stock Market Prediction Using Ensemble Learning and Sentimental Analysis;Multiple Feature-Based Tomato Plant Leaf Disease Classification Using SVM Classifier;a Methodological Review of Time Series Forecasting with Deep Learning Model: A Case Study on Electricity Load and Price Prediction;unexpected Alliance of Cardiovascular Diseases and Artificial Intelligence in Health Care;a Novel Smartphone-Based Human Activity Recognition Using Deep Learning in Health care;An Enhanced Deep Learning Approach for Smartphone-Based Human Activity Recognition in IoHT;classification of Indoor–Outdoor Scene Using Deep Learning Techniques;prediction of the Reference Evapotranspiration Data from Raipur Weather Station in Chhattisgarh using Decision Tree-Based Machine Learning Techniques;deep Transfer Learning and Intelligent Item Packing in Retail Management;preface.
In contemporary society, our everyday routines and industrial output are intricately linked to the availability of essential energy resources. Thus, ensuring the sustained and secure functioning of the power system is...
详细信息
ISBN:
(纸本)9798400716959
In contemporary society, our everyday routines and industrial output are intricately linked to the availability of essential energy resources. Thus, ensuring the sustained and secure functioning of the power system is pivotal for the advancement of the power industry and upholding societal stability. This paper explores approaches for evaluating and forecasting the security status of the power information network, recognizing its crucial role in both industry development and the preservation of societal norms. Starting with the general situation of China's power information networksecurity problems, the concept and main contents of power information networksecurity situation awareness technology are further analyzed. Finally, the strategy of improving networksecurity situation under multi-step attack is put forward, the networksecurity situation assessment model is established, the data fusion platform is established and advanced information security protection technology is adopted.
This paper introduces a corporate financial performance evaluation system based on fuzzy neural networks. After presenting the fundamental theories of neural networks, it provides a detailed description of the constru...
详细信息
ISBN:
(纸本)9798400716959
This paper introduces a corporate financial performance evaluation system based on fuzzy neural networks. After presenting the fundamental theories of neural networks, it provides a detailed description of the construction and determination of the corporate performance evaluation indicator system, as well as the development process of the combination model for corporate performance evaluation based on fuzzy neural networks. In response to the practical needs of enterprises, a comprehensive, accurate, and easily deployable evaluation system has been designed, followed by thorough system testing. Through this system, enterprises can evaluate their financial performance in a more comprehensive and accurate manner, providing effective support for business decision-making. This paper offers new perspectives and approaches for research in the relevant field.
with the development of network technology, the number of network applications increases rapidly, public network protocols and private network protocols are booming, which puts forward higher requirements for the iden...
详细信息
ISBN:
(纸本)9798400716959
with the development of network technology, the number of network applications increases rapidly, public network protocols and private network protocols are booming, which puts forward higher requirements for the identification and analysis of network protocols. bitstream-oriented network protocol analysis is of great significance for network monitoring, networksecurity and quality of service assurance. at present, most of the methods used in network protocol identification are highly targeted, and there are some limitations in the accuracy of known protocol identification, encrypted data identification, automatic mining of new protocol types and so on. this paper proposes BONPR (a bitstream oriented network protocol recognizer), which realizes known network protocol data recognition based on deep flow detection. a new run test method is used to test the randomness of the data, and the unknown protocol types are identified by data slicing and fixed position data *** the test data are constructed to prove the effectiveness of the system.
To deeply analyze the characterization and destruction resistance of the command and control (C2) system, based on the complex network theory, a model of the C2 system is established. The network model of the C2 syste...
详细信息
ISBN:
(纸本)9798400718212
To deeply analyze the characterization and destruction resistance of the command and control (C2) system, based on the complex network theory, a model of the C2 system is established. The network model of the C2 system is attacked using the method of real-time attack, and it is found that the network is more sensitive to the deliberate attack method and performs poorly. The node-degree based edge-adding method is proposed to enhance the destructibility of the network, and it is found that the policy of low-degree edge-adding method can effectively increase the destructibility of the C2 networksystem to a certain extent.
The network architecture design scheme of networksecurity protection for intelligent connected vehicles is based on the functional performance and implementation scheme of each functional domain of the vehicle. The k...
详细信息
ISBN:
(纸本)9798400718212
The network architecture design scheme of networksecurity protection for intelligent connected vehicles is based on the functional performance and implementation scheme of each functional domain of the vehicle. The key controller of intelligent connected vehicles, the status of the controller in the vehicle and the network interface in the vehicle that is vulnerable to external attacks are analyzed from the functional domain division of the vehicle, and the realization process of real data detection and dangerous data generation in the detection network is studied. Design the classification principle of connected vehicle domain controller, complete the design of vehicle networksecurity architecture, strengthen the security measures of central gateway and area controller, ensure the security of bus communication, provide comprehensive security protection for vehicle network, and realize the security protection of vehicle network.
Computer networksecurity is an important issue faced in today39;s Internet era, and traditional security techniques can no longer meet the complex and changing network attacks and threats. In this paper, based on t...
详细信息
ISBN:
(纸本)9798400716959
Computer networksecurity is an important issue faced in today's Internet era, and traditional security techniques can no longer meet the complex and changing network attacks and threats. In this paper, based on the convolutional neural network (CNN) algorithm, computer networksecurity technology is studied. The detection and prevention of network attacks are realized by deep learning and classification of network traffic data. By constructing a CNN model, extracting the features of network traffic data and classifying them, malicious traffic can be effectively identified and corresponding defense measures can be taken in time. The experimental results show that the computer networksecurity technology based on CNN algorithm has high accuracy and reliability, and can effectively improve the security of the network.
暂无评论