Human action recognition (HAR) systems need to process large volumes of data posing several challenges including, but not limited to, accurately identifying the actions and classifying them in near real time. Most of ...
详细信息
In this paper the various computational approaches for automatic generation control (AGC) of power systems is covers, with the goal of improving the automatic voltage regulator (AVR) and load frequency control (LFC) t...
详细信息
Mobile edge computing (MEC) promises to be a useful technology to enable applications in a smart city. However, the task offloading becomes challenging as the MEC infrastructure has limited resources. To solve the cha...
详细信息
In the context of modern services that use multiple Deep Neural Networks (DNNs), managing workloads on embedded devices presents unique challenges. These devices often incorporate diverse architectures, necessitating ...
详细信息
Advanced Persistent Threats (APT) in the current network environment are becoming increasingly complex and diverse. Most existing APT anomaly detection is based on attack knowledge bases and preset rules, which are di...
详细信息
ISBN:
(纸本)9798350386783;9798350386776
Advanced Persistent Threats (APT) in the current network environment are becoming increasingly complex and diverse. Most existing APT anomaly detection is based on attack knowledge bases and preset rules, which are difficult to design and cannot make good use of the rich semantic information in the original log data. This results in poor detection of unknown attacks. This paper proposes an anomaly detection method based on meta-path and heterogeneous provenance graph. We design a heterogeneous graph structure to represent provenance graph, and define the meta-paths of the PROCESS nodes. Then we use Heterogeneous Graph Attention Network (HAN) to learn the embedding representation of the nodes based on meta-paths. The resulting graph's node embedding is used as node features, and then we apply SVDD algorithm to identify anomalous nodes. A series of experiments were conducted on the Unicorn SC-2 dataset to validate the proposed method. The final results demonstrate that our method outperforms two current anomaly detection systems.
Urban traffic congestion at intersections poses a significant challenge, leading to inefficiencies in traffic flow and increased wait times. Traditional fixed-timer traffic signal systems fail to adapt to fluctuating ...
详细信息
CONTEXT: Web applications are exposed to malicious accesses through the Internet. SQL injection (SQLi) attacks are still a typical threat to web application providers. Although recent studies proposed deep learning-ba...
详细信息
Methods of ensuring interference immunity in radio relay systems, radio communication systems between ground stations and unmanned ground vehicles or unmanned aerial vehicles are considered. On the basis of the conduc...
详细信息
Fortran compilers that provide support for Fortran's native parallel features often do so with a runtime library that depends on details of both the compiler implementation and the communication library, while oth...
详细信息
Student management systems provide a data processing approach that universities in business processing widely use. Given the challenge of data storage and risks, weak concurrency and single-function controls are often...
详细信息
暂无评论