Today's internet is made up of nearly half a million different networks. In any network connection, identifying the attacks by their types is a difficult task as different attacks may have various connections, and...
详细信息
ISBN:
(纸本)9798400709234
Today's internet is made up of nearly half a million different networks. In any network connection, identifying the attacks by their types is a difficult task as different attacks may have various connections, and their number may vary from a few to hundreds of network connections. To solve this problem, IDS-based on machinelearning (ML) has been developed to monitor and analyze data packets to detect abnormal behaviors and new attacks. Security in cyberspace is currently receiving more and more attention. Making efficient defenses against many sorts of network attacks, as well as making sure that network equipment is safe and information is secure, has grown to be a major issue. Network intrusion detection systems (NIDSs) are critical components of the architecture for network security protection because they detect harmful attack behaviors by examining the network traffic of key nodes in a network [1, 2]. Intrusion detection systems (IDSs) can be classified as signature-based, and anomaly-based methods [3]. Signature-based IDS (SIDS), often referred to as Rule-based or Misuse IDS, perform ongoing network traffic monitoring and look for sequences or patterns of incoming network data that resemble an attack signature. By keeping error rates low, they are able to identify potential invasions with high accuracy rates. One of the weaknesses of these systems is the demand for an updated database that contains the attack signatures. Anomaly-based intrusion detection systems (AIDS), also known as behavior-based detection, examine the typical behavior of networks by keeping an eye on network traffic for signs of anomalous activity. AIDS can be taught using anomaly detection algorithms or self-taught using self-learning algorithms, allowing them to recognize new kinds of intrusions. Anomaly-based approach distinguishes itself significantly from the signature-based approach when it comes to recognizing new attacks. Essence to develop an efficient NIDS The majority of the mo
The data from remote sensing satellites provide opportunities to acquire information about land at varying resolutions and has been widely used for change detection studies. However, due to the noise interference and ...
详细信息
ISBN:
(纸本)9798400709234
The data from remote sensing satellites provide opportunities to acquire information about land at varying resolutions and has been widely used for change detection studies. However, due to the noise interference and redundancy in remote sensing multispectral images, it is valuable to transform the available spectral channels into a suitable feature space to alleviate noise and reduce redundancy. In this paper, we propose a supervised change detection method for optical aerial images based on deep Siam convolution network, which is mainly composed of two branch network, heuristic feature aggregation module and feature attention module. This method achieves better performance in experiments on remote sensing aerial public datasets. We show that our network can extract feature from two images at a same time, and depend on feature fusion strategy together with attention mechanism to further enrich the difference information. Subsequently, a decoder structure of semantic segmentation is developed to harvest binary change detection result. Experimental results show that our algorithm achieves a comprehensive F1 score of 83.9% on different data sets, which is superior to the traditional algorithm and other deep learning networks, and has a certain degree of effectiveness and robustness.
This paper aims to explore differences in hand motor capabilities with a focus for potential autistic intervention. In order to achieve that, a predefined drawing scenario is introduced with a metric of three complexi...
详细信息
The proceedings contain 91 papers. The topics discussed include: a cross-time zone transfer consumption model for base station computing tasks based on photovoltaic prediction;numerical embedding of categorical featur...
ISBN:
(纸本)9798350303780
The proceedings contain 91 papers. The topics discussed include: a cross-time zone transfer consumption model for base station computing tasks based on photovoltaic prediction;numerical embedding of categorical features in tabular data: a survey;SAPD: self-attention progressive seismic data denoising;heart rate measurement in low-light conditions and human natural sleeping positions based on video;on reinforcement learning in stabilizability of probabilistic Boolean control networks;anomaly detection in dynamic graphs via long short-term temporal attention network;prediction of laser drilling qualities for optical grade PMMA using artificial neural network;and samples on thin ice: re-evaluating adversarial pruning of neural networks.
Given the current increasing prevalence of autism, expensive and time-consuming manual diagnosis is highly detrimental to the management of the condition. With the development of computer-based methods of human behavi...
详细信息
The rapid development of artificial intelligence is inseparable from 5G technology. However, the energy consumption of 5G base station also affects the construction of 5G to a great extent. In recent years, 5G base st...
详细信息
This paper provides a comprehensive review of the significant literature in the area of user data security with a specific focus on how this integrates with the area of blockchain technologies and zero-knowledge proof...
详细信息
Many machine-learning applications rely on distributed machinelearning (DML) systems to train models from massive datasets using massive computing resources (e.g., GPUs and TPUs). However, given a DML system in most ...
详细信息
machinelearning models - deep neural networks in particular - have performed remarkably well on benchmark datasets across a wide variety of domains. However, the ease of finding adversarial counter-examples remains a...
详细信息
Convergence bounds are one of the main tools to obtain information on the performance of a distributed machinelearning task, before running the task itself. In this work, we perform a set of experiments to assess to ...
详细信息
暂无评论