The security risks are increasing due to software flaws. The vulnerability dataset used in this design had taken from the cve web site. Additionally, the updated error description is matched as input, cross-referenced...
详细信息
License plate recognition is one of the challenging tasks and it belongs to ITS, due to backgrounds, variation of illumination, occlusion the recognition is became the challenging task. These challenges enabled a comp...
详细信息
Emotions may be expressed in many different ways, making automatic affect recognition challenging. Several industries may benefit from this technology, including audiovisual search and human- machine interface. Recent...
详细信息
The rapid rise of manipulated videos in the digital era necessitates advanced forgery detection and localization techniques. This study presents a novel approach using a GAN-based framework integrated with a 3D Swin-B...
详细信息
Diabetes mellitus is a chronic metabolic dis-order characterised by elevated amounts of glucose in the bloodstream. The categorization and forecasting of diabetes are crucial for the effective administration of this p...
详细信息
The demand for novel Intrusion Detection Systems (IDS) has risen due to the increasing volume, velocity, and variety of data collected through modern wireless networks. Metaheuristic algorithms provide a viable method...
详细信息
The demand for novel Intrusion Detection Systems (IDS) has risen due to the increasing volume, velocity, and variety of data collected through modern wireless networks. Metaheuristic algorithms provide a viable method to improve IDS performance regarding optimal feature selection. The integration of methods with Machine Learning (ML) in the development of an Intrusion Detection System (IDS) facilitates improved detection accuracy, diminished false positives and negatives, and increased efficiency in network monitoring. This paper presents a hybridization of Grey Wolf Optimization and Lion Optimization, termed GWO-LOA-RF Optimization Algorithm, integrated with a Machine Learning Assisted Intrusion Detection System. The primary objective of the GWO-LOA-RF system is the effective identification and categorization of intrusions to ensure security. Data normalization is primarily conducted to scale the incoming data into a functional format. The GWO-LOA-RF approach features the GWO-LOA-RF base. The random feature selection method can be utilized to identify an optimal subset of features. We have derived multiple insights on feature selection scores in relation to accuracy, recall, precision and F-score as well as Mean Absolute Error (MAE), Mean Squared Error (MSE), and Root Mean Squared Error for the two datasets, CICDDOS2019 and UNSW-NB15. The duration of feature selection has been emphasized to illustrate the most efficient algorithm combinations. We have ultimately presented hybrid algorithmic to organizational IDS requirements, along with distinct solutions for each.
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma...
详细信息
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)may be vulnerable to a broad range of attacks(e.g.,eavesdropping and side-channel attacks).Hence,there have been attempts to design biometric-based authentication solutions,which rely on physiological and behavioral *** characteristics need continuous monitoring and specific environmental settings,which can be challenging to implement in ***,we can also leverage Artificial Intelligence(AI)in the extraction and classification of physiological characteristics from IoT devices processing to facilitate ***,we review the literature on the use of AI in physiological characteristics recognition pub-lished after *** use the three-layer architecture of the IoT(i.e.,sensing layer,feature layer,and algorithm layer)to guide the discussion of existing approaches and their *** also identify a number of future research opportunities,which will hopefully guide the design of next generation solutions.
Diabetic retinopathy (DR) is a common eye condition arising from the complications associated with diabetes. The diagnosis of DR is traditionally carried out by experienced clinicians who screen fundus images to ident...
详细信息
Traditionally cyber attackers have always had an upper hand over defenders as the latter can only react in the event of an attack. Moving Target Defense (MTD) has emerged as a potential game changer by reversing the a...
详细信息
Convolutional Neural Networks (CNNs) is revolutionized in the field of computer vision, with the high accuracy and capability to learn features from raw data. In this research work focused on a comparative analysis of...
详细信息
暂无评论