The objective of Advanced Persistent Threat (APT) attacks is to exploit Cyber-Physical Systems (CPSs) in combination with the Industrial Internet of Things (I-IoT) by using fast attack methods. Machine learning (ML) t...
详细信息
Introduction: The Industrial Internet of Things (IIoT) is a technology that connects devices to collect data and conduct in-depth analysis to provide value-added services to industries. The integration of the physical...
详细信息
The energy Internet (EI) presents a novel paradigm for renewable energy distribution that utilizes communication and computing technologies to revolutionize the conventional intelligent transportation systems (ITSs) a...
详细信息
Aerial Computing is one of the applications of Internet of Things (IoT) which makes use of autonomous aerial devices, such as drones and unmanned aerial vehicles (UAVs). The ubiquitous nature of IoT and aerial computi...
Aerial Computing is one of the applications of Internet of Things (IoT) which makes use of autonomous aerial devices, such as drones and unmanned aerial vehicles (UAVs). The ubiquitous nature of IoT and aerial computing is poised to revolutionize our daily lives by enabling seamless real-time information sharing among interconnected objects. However, ensuring the safety and security of such network is crucial in preventing potential threats and attacks. The purpose of this study is to develop a sophisticated intrusion detection system that is effective, efficient, and intelligent using complex machine learning models trained on relevant intrusion detection datasets. In this article, the multiclass classification approaches for intrusion detection in IoT-driven aerial computing environment are presented (in short, MCA-IDAC). In the comparative study, it has been observed that proposed MCA-IDAC performs significantly better than the other existing competing schemes, in terms of important performance parameters.
Maritime communication helps vessels and ports plan their movements, exchange environmental information, and communicate among themselves. The vessels' movement and changing location are critical to keep them secu...
详细信息
ISBN:
(数字)9781728190549
ISBN:
(纸本)9781728190556
Maritime communication helps vessels and ports plan their movements, exchange environmental information, and communicate among themselves. The vessels' movement and changing location are critical to keep them secure from data interception and data tampering by unauthorized parties during transmission. To secure maritime communication, we propose a novel lightweight authentication scheme sensitive to the current ship location. We assess the effectiveness of the proposed protocol in defending against a range of security threats while keeping communication and computation costs low, and meeting the desired security and functional requirements of anonymity and untraceability. The detailed security analysis using the widely accepted Scyther tool demonstrates that location-based keys as proposed in our protocol are secure against location inference and spoofing attacks among others.
In the present era, the increasing number of network devices and ubiquitous computing leads to the flow of enormous amounts of data traffic, including sensitive and confidential information, on the internet and carryi...
详细信息
ISBN:
(数字)9798350361261
ISBN:
(纸本)9798350361278
In the present era, the increasing number of network devices and ubiquitous computing leads to the flow of enormous amounts of data traffic, including sensitive and confidential information, on the internet and carrying out commercial and banking transactions online. This gives cybercriminals an opportunity to launch an attack like phishing to steal confidential information from the user and gain unauthorized access. This can be mitigated by the help of an intelligent machine learning-based phishing detection system, which can detect potential phishing attacks and take appropriate action. In this paper, we have addressed this major cyber issue and proposed a machine learning-based phishing detection scheme (in short, EM-PAD), which is trained on a benchmark dataset and evaluated on standard metrics: F1-score and Accuracy. The proposed model is compared with different existing schemes based on Accuracy, indicating that it has outperformed them with remarkable results.
Critical infrastructure refers to the key systems, assets, and facilities, whether they are physical or virtual, that are necessary for the overall functioning of a country. As our reliance on technology and networked...
详细信息
ISBN:
(数字)9798350361261
ISBN:
(纸本)9798350361278
Critical infrastructure refers to the key systems, assets, and facilities, whether they are physical or virtual, that are necessary for the overall functioning of a country. As our reliance on technology and networked systems continues to expand, so does the significance of taking precautions to protect critical infrastructure from being compromised by cyberattacks. We need some security schemes to secure the communication happening in the critical infrastructure devices. Therefore, in this paper, we focus on the design of an authentication and key establishment scheme, which is used in the critical infrastructure to secure its data transmissions. A secure authentication and key management mechanism for fog computing-based IoT-driven critical infrastructures (in short, AKM-FCCI) is proposed in the paper. We then provide the network model and threat model of the proposed AKM-FCCI to explain its deployment and organization of devices and servers. The threat model further explains the various threats of this communication environment. In addition, the security analysis of AKM-FCCI is presented to demonstrate that it is secure against the many different kinds of attacks that could be launched against it. The comparisons demonstrate that the performance of AKM-FCCI is superior to that of the other currently used schemes. In addition to that, it offers a high level of security and utility. Therefore, the proposed AKM-FCCI is appropriate for use in protecting critical infrastructure equipment against a wide variety of threats.
Meteorological experts achieved promising results in improving the effectiveness of neural weather networks in precipitation forecasting by incorporating precipitation-optimized objectives into the loss function. Howe...
详细信息
ISBN:
(数字)9798331505813
ISBN:
(纸本)9798331505820
Meteorological experts achieved promising results in improving the effectiveness of neural weather networks in precipitation forecasting by incorporating precipitation-optimized objectives into the loss function. However, since neural networks are not based on explicit physical processes, meteorological experts may lack understanding and trust in the model’s predictions, and they cannot perform bias correction by adjusting physical parameters. Additionally, precipitation events are highly imbalanced, with heavy rainfall events being relatively rare but of greater importance. Therefore, traditional metrics for evaluating deep models are insufficient to fully assess precipitation forecasting performance. In this paper, we present a neural weather network visual analysis system designed to help domain experts understand and comprehensively compare the impact of different loss functions on neural networks. We customize the model evaluation process based on the characteristics of precipitation forecasting tasks and provide a reference for bias correction using historically similar data. To validate our approach, we perform two case studies using real-world reanalysis datasets, with feedback from domain experts further confirming its effectiveness.
As the size of datasets and neural network models increases, automatic parallelization methods for models have become a research hotspot in recent years. The existing auto-parallel methods based on machine learning or...
详细信息
Distributed ledger technology (DLT) provides decentralised services by removing the need of trust among distributed nodes in the distributed system. Transactions across the network are visible to all participants. How...
详细信息
暂无评论