Internet of Things (IoT) devices are a fast-growing market, but they also possess a great challenge in terms of cyber-security, and therefore need a strong intrusion detection system (IDS). We present a machine learni...
详细信息
ISBN:
(数字)9798331509934
ISBN:
(纸本)9798331509941
Internet of Things (IoT) devices are a fast-growing market, but they also possess a great challenge in terms of cyber-security, and therefore need a strong intrusion detection system (IDS). We present a machine learning-based IDS that improves attack classification through effective Feature engineering and optimized Model Selection. Whereas traditional methods rely on static and well-known features, our approach offers novel ones tcp. payload and tcp. options to improve your detection of injection and vulnerability attacks. Our results demonstrate that Random Forest outperforms the convolutional models while achieving the highest accuracy of 99.07% (6-class) and 98.53% (I5-class) in five models evaluated on the Edge-IIoTset dataset. Using SMOTE to handle class im-balance and incorporating network features related to behavior, the method is able to better detect minority class general attacks. Building upon that foundation, we utilized behavioral feature extraction, data balancing, and deep learning optimization techniques that top centralized IDS models use to improve accuracy and resilience across our framework.
Ensuring the authenticity and integrity of digital images is a major concern in multimedia forensics, driving research on universal schemes for detecting diverse image manipulations (or processing operations). Althoug...
详细信息
Industry 4.0 applications demand strict reliability guarantee of 99%. For example, repeated packet losses can cause communication failures in supply chain systems. Now-a-days, many such industrial applications use the...
详细信息
ISBN:
(数字)9798331531195
ISBN:
(纸本)9798331531201
Industry 4.0 applications demand strict reliability guarantee of 99%. For example, repeated packet losses can cause communication failures in supply chain systems. Now-a-days, many such industrial applications use the benefits of Internet of Things (IoT) for data transmission by forming Mission-critical IoT (MC-IoT) networks. However, the IoT networks are resource constraint in nature, and thus, the data transmissions are lossy by default. This contradictory feature imposes severe challenges on the traditional routing protocol RPL designed for IoT networks. As a solution to that issue, several multi-path based solutions have been proposed. Specifically, the Reliable Multi-Path RPL (RMP-RPL) was designed focusing on hard reliability requirement. However, the solutions either cannot achieve the goal on hard reliability requirement or achieves the goal by sacrificing energy consumption. Therefore, this paper introduces an energy-efficient multi-path selection strategy in RPL called EEMP-RPL which is designed to achieve the hard reliability goal in mission-critical applications. The proposed protocol EEMP-RPL achieves the desired reliability requirement by strategically transmitting a data packet multiple times to multiple parents so that at least one of them can receive the data packet successfully. On the other hand, it saves energy by allowing only a few nodes among the receiving parents to forward the data packets further. Limited forwarding is achieved by assigning a data packet forwarding probability (P D ) to each receiving node of a data packet. This paper also proposes a method to calculate the probability P D of a node dynamically. Execution results on Cooja simulator show that EEMP-RPL achieves the hard reliability requirement goal of 99% up to a certain limit in reference to the size of the network while reducing energy consumption of the network by 25.74% compared to the RMP-RPL. EEMP-RPL also shows an improvement of 40.23% and 33.75% in terms of end-to-end
In the era of artificial intelligence generated content (AIGC), conditional multimodal synthesis technologies (e.g., text-to-image) are dynamically reshaping the natural content. Brain signals, serving as potential re...
详细信息
The rapid development of digital technology across industries has highlighted the growing need for enhanced competencies in Artificial Intelligence (AI), Cyber security (CS), and Digital Transformation (DT). While the...
详细信息
The rapid development of digital technology across industries has highlighted the growing need for enhanced competencies in Artificial Intelligence (AI), Cyber security (CS), and Digital Transformation (DT). While there is extensive research on each of these domains in isolation, few studies have investigated their relationship and joint impact on organizational maturity. This study aims to address this gap by analyzing the relationships among the maturity levels of AI, CS, and DT at the organizational level using Structural Equation Modeling (SEM) and descriptive statistical methods. A mixed-methods design combines quantitative survey data with synthetic modeling techniques to assess organizational preparedness. The findings demonstrate significant bidirectional correlations among AI, CS, and DT, with technology and finance being more advanced than government and education. The research highlights the necessity of an integrated AI-CS strategy and provides actionable recommendations to increase investments in these domains. In contrast to the preceding fragmented evaluations, the current research establishes a comprehensive, empirically grounded framework that acts as a strategic reference point for digital resilience. Follow-up studies will involve collecting real-world industry data in support of empirical validation and predictive ability in measuring AI and CS maturity. This research adds to the existing literature by filling the gaps among fragmented digital maturity models and providing a consistent empirical base for organizations to thrive in an evolving technological environment.
Generation of human 3D models has become one of the most interesting topics in the domain of computer vision. This is because the process of reconstructing 3D human body models from 2D images has of course attracted a...
详细信息
Generation of human 3D models has become one of the most interesting topics in the domain of computer vision. This is because the process of reconstructing 3D human body models from 2D images has of course attracted a lot of attention in the present days because of the potential importance of the same in several different application areas. Such are the virtual trial rooms for online shopping clothes, virtual reality for general and sporting activities and diagnostic assessment of neurological diseases. The ever increasing relevance of 3D models in fields like e-commerce underlines the requirements of converting 2D images into 3D reconstructions. In this study, a new method is presented to animating various human models from single images employing advanced mesh deformer and volume renderer. The effectiveness of the proposed method is tested on the THuman4.0 and DeepCap datasets, where the evaluation indicators include PSNR, SSIM, LPIPS, and FID. The proposed approach is shown to be more effective than the current state of the art methods, enhancing the existing methods of 3D human model reconstruction.
Coastal regions face significant challenges due to climate change, requiring effective adaptation strategies to protect ecosystems, infrastructure, and communities. Selecting appropriate strategies remains complex due...
详细信息
Adaptable sensors, circuits, and substrates are joined with unbending electronic parts to make adaptable flexible hybrid electronics (FHE). The printing of nanomaterials has benefits over the costly, multi-step, and b...
详细信息
An empirical investigation uses AES, RSA, and a character replacement approach, along with the unsupervised neural network RBM, to enhance the security of Remote Desktop Protocol communication. It was discovered that ...
详细信息
ISBN:
(数字)9798350353839
ISBN:
(纸本)9798350353846
An empirical investigation uses AES, RSA, and a character replacement approach, along with the unsupervised neural network RBM, to enhance the security of Remote Desktop Protocol communication. It was discovered that Remote Access Trojans, such as PlugX, are used to establish control through remote access to compromised systems. Unauthorized access is obtained by an intruder to a system, resulting in the theft of sensitive data and the exploitation of a vulnerable workstation for malicious activities using a Remote Access Trojan (RAT). The proposed hybrid model is combined with RBM to ensure data transaction security between nodes. In addition, a comparative classification algorithm is integrated to further enhance the model. This study evaluates key size, data size, execution time, and memory usage of the algorithm. Cryptography is essentially a resource-intensive approach to computing security. Competitive and comparative analyses are being conducted to investigate the performance measures of the proposed model. In most cases, it was found that resource utilization was correlated with the key lengths of the AES and RSA algorithms. Due to the use of multiple categorical attacks on the remote desktop protocol, researchers have limited focus on secure data transaction of the remote desktop protocol. Therefore, the study limits the analysis of advanced security technologies that are used to gain a deeper understanding of the threats. This suggests that proposed algorithm is more reliable compared to AES and RSA when considering both security and efficacy. The research introduces a cutting-edge hybrid cryptographic model, enhanced with an unsupervised neural network, to outsmart potential intruders and protect sensitive data. By employing a Restricted Boltzmann Machine (RBM) for smart, autonomous threat recognition, the study assesses performance metrics crucial for real-world application and achieves a remarkable 98.75% accuracy, setting a new standard in RDP security
暂无评论