The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management *** machine learning–based...
详细信息
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management *** machine learning–based intrusion detection systems can capture complex network behaviours,their“black-box”nature often limits trust and actionable insight for security *** study introduces a novel approach that integrates Explainable Artificial Intelligence—xAI—with the Random Forest classifier to derive human-interpretable rules,thereby enhancing the detection of Distributed Denial of Service(DDoS)*** proposed framework combines traditional static rule formulation with advanced xAI techniques—SHapley Additive exPlanations and Scoped Rules-to extract decision criteria from a fully trained *** methodology was validated on two benchmark datasets,CICIDS2017 and *** rules were evaluated against conventional Security Information and Event Management systems rules with metrics such as precision,recall,accuracy,balanced accuracy,and Matthews Correlation *** results demonstrate that xAI-derived rules consistently outperform traditional static ***,the most refined xAI-generated rule achieved near-perfect performance with significantly improved detection of DDoS traffic while maintaining high accuracy in classifying benign traffic across both datasets.
This research aimed to reveal the information process in the brain of the patients who suffered from mild cognitive impairment (MCI) using the power spectra and timelag analysis in electroencephalogram (EEG). The pati...
详细信息
Heuristic algorithms are used to solve complex computational problems quickly in various computer applications. Such algorithms use heuristic functions that rank the search alternatives instead of a full enumeration o...
详细信息
The goal of future quantum networks is to enable new internet applications that are impossible to achieve using solely classical communication[1, 2, 3]. Up to now, demonstrations of quantum network applications[4, 5, ...
详细信息
Consciousness has been historically a heavily debated topic in engineering, science, and philosophy. On the contrary, awareness had less success in raising the interest of scholars in the past. However, things are cha...
详细信息
The estimation of systems is based on the analysis of data obtained after experimenting about the behavior of a real process in response to an external disturbance in order to find a scheme that allows the mathematica...
The estimation of systems is based on the analysis of data obtained after experimenting about the behavior of a real process in response to an external disturbance in order to find a scheme that allows the mathematical stages to be modeled. This is the importance of its in-depth study, since if it is carried out correctly, re-directing resources to other fields is one of the many benefits of its application. This PhD thesis seeks to highlight the importance of correcting the displacements that satellites in orbit may experience, due to the influence of various agents, both of their own functioning and those generated by the environment in which they operate, that is why the technique of systems estimation should be presented as a very useful option thanks to the analysis tools of the MATLAB program. The putting in orbit of a team of these characteristics implies investment of strong amounts of time, money and technology; likewise maintain its initial orientation leads to the analysis of new parameters, without mentioning the great problem generated in the orbit of the Earth, if for reasons other than those considered "normal", this orientation varied and the implemented processes did not fulfill their function. The necessary driver for our project is a PID Control since a control law can compensate with the integral and derivative actions. The necessary tool for the development of our controller is from MATLAB. With this tool we can reach our goal, since it shows us the trajectory of the roots, as well as the necessary graphs showing control characteristics such as the maximum overshoot, stabilization time, and percentage of system error, among others.
The process of reengineering business processes, in our opinion, is an iterative procedure in the process of enterprise management. Each subsequent business process in the business process chain is a logical continuat...
The process of reengineering business processes, in our opinion, is an iterative procedure in the process of enterprise management. Each subsequent business process in the business process chain is a logical continuation of the previous one. The reengineering procedure is characterized by the presence of some feedback about the impact of each individual business process on the overall set of business processes. During the implementation of reengineering, traditional business approaches may undergo revision. Often, many business rules need to be improved and are outdated. The use of public-private partnerships, in our opinion, can be considered as elements of reengineering, since partnerships with the state can open up new business development prospects for an enterprise, and many business processes used at this enterprise can be rethought and updated. The production of high-quality and high-performance agricultural machinery can be of great importance for solving the problem of ensuring food security of the state. The use of various forms of public-private partnership allows us to speed up the solution of this problem. The implementation of economic modernization requires the full use of the economic potential of the state. This can be achieved only if public-private partnerships are effectively implemented, since they allow combining the resources of the state and private business to achieve common goals.
We, the Editor, Institution and Publisher of the journal IETE Journal of Research, have retracted the following article, which is part of the Special Issue titled “Federated Learning for Blockchain systems and Indust...
We, the Editor, Institution and Publisher of the journal IETE Journal of Research, have retracted the following article, which is part of the Special Issue titled “Federated Learning for Blockchain systems and Industrial Internet of Things”:Abu Buker Siddique, Rafaqat Kazmi, Habib Ullah Khan, Sikandar Ali, Ali Samad & Gulraiz Javaid (2022) An Intelligent and Secure Air Quality Monitoring System Using Neural Network Algorithm and Blockchain, IETE Journal of Research, DOI:10.1080/03772063.2022.2052984Following publication, concerns were raised about the peer review and decision-making processes for this special *** an investigation by the Taylor & Francis Publishing Ethics & Integrity team, in full cooperation with the Editor-in-Chief and the Institution, it was confirmed that the articles included in this special issue were not reviewed appropriately, in line with the Journal’s peer review standards and *** the stringency of the peer review process is core to the integrity of the publication process, the Editor and Publisher have decided to retract all of the articles within the above-named Special *** journal has not confirmed if the authors were aware of this compromised peer review *** journal is committed to correcting the scientific record and will fully cooperate with any institutional investigations into this matter. The authors have been informed of this *** have been informed in our decision-making by our editorial policies and the COPE *** retracted articles will remain online to maintain the scholarly record, but they will be digitally watermarked on each page as “Retracted”.
Search techniques are an integral part for text authentication and plagiarism checks. In this work, our aim is to develop an efficient search algorithm for Arabic text (words and sentences) in a large database. The da...
详细信息
This paper presents a comparison of two Cholesky-like algorithms for solving symmetric quasi-definite system Mz = f. This pair of methods computes the block factorization M = RT DR, where R is upper triangular and D i...
This paper presents a comparison of two Cholesky-like algorithms for solving symmetric quasi-definite system Mz = f. This pair of methods computes the block factorization M = RT DR, where R is upper triangular and D is a diagonal matrix.
暂无评论