Anomaly detection stands as a critical element in securing space information networks (SINs). This paper delves into the realm of anomaly detection within dynamic networks, shedding light on established methodologies....
详细信息
ISBN:
(数字)9798350372274
ISBN:
(纸本)9798350372281
Anomaly detection stands as a critical element in securing space information networks (SINs). This paper delves into the realm of anomaly detection within dynamic networks, shedding light on established methodologies. The focus lies on scrutinizing various anomaly detection strategies in space information networks, conducting a comprehensive assessment of their practical applications, advantages, and drawbacks. Moreover, it introduces a novel anomaly detection approach driven by deep learning principles. This innovative method merges graph convolution techniques with a network security-oriented knowledge graph, presenting a cutting-edge solution. As a final contribution, the paper extends its purview to the future landscape of anomaly detection within space information networks, offering valuable insights into potential advancements and forthcoming trends in this domain. This holistic investigation seeks to enhance the understanding of anomaly detection paradigms within the unique context of space information networks, aiming to fortify their security measures and operational resilience.
As a typical industrial Internet of things(IIOT)service,demand response(DR)is becoming a promising enabler for intelligent energy management in 6 G-enabled smart grid systems,to achieve quick response for supply-deman...
详细信息
As a typical industrial Internet of things(IIOT)service,demand response(DR)is becoming a promising enabler for intelligent energy management in 6 G-enabled smart grid systems,to achieve quick response for supply-demand ***-ever,existing literatures try to adjust customers’load profiles optimally,instead of electricity overhead,energy consumption patterns of residential appliances,customer satisfaction levels,and energy consumption *** this paper,a novel DR method is investigated by mixing the aforementioned factors,where the residential customer cluster is proposed to enhance the *** approaches are leveraged to study the electricity consumption habits of various customers by extracting their features and characteristics from historical *** on the extracted information,the residential appliances can be scheduled effectively and ***,we propose and study an efficient optimization framework to obtain the optimal scheduling solution by using clustering and deep learning *** simulation experiments are conducted with real-world *** results show that the proposed DR method and optimization framework outperform other baseline schemes in terms of the system overhead and peak-to-average ratio(PAR).The impact of various factors on the system utility is further analyzed,which provides useful insights on improving the efficiency of the DR *** the achievement of efficient and intelligent energy management,the proposed method also promotes the realization of China’s carbon peaking and carbon neutrality goals.
A blockchain is a growing list of cryptographically secured blocks to maintain shared data on decentralized systems, in order to archive transactions between untrusted participants. Smart contracts are computer progra...
详细信息
Binary neural network (BNN) is widely used in speech recognition, image processing and other fields to save memory and speed up computing. However, the accuracy of the existing binarization scheme in the realistic dat...
详细信息
Mobile edge computing (MEC) has become an extremely hot topic in recent years. Mobile edge cloud relies on storage and computing resources on network edge to provide users with delay-sensitive services. However, the t...
详细信息
software user experience (UX) and usability (UXU) plays a vital role in the quality users perceived. The existence of user experience and usability issues (UXUIs) affects the software quality perceived by users. A var...
详细信息
The increasing demands of data computation and storage for cloud-based services motivate the development and deployment of large-scale data centers (DCs). The energy demand of these devices is rising rapidly and becom...
详细信息
The increasing demands of data computation and storage for cloud-based services motivate the development and deployment of large-scale data centers (DCs). The energy demand of these devices is rising rapidly and becoming a noticeable challenge for current power networks. The smart grid (SG) is deemed as the future power system paradigm enabling more affordable and sustainable energy supply, which can effectively relieve the load pressure from DCs. Moreover, with growing concerns regarding harmful emissions due to combustion of fossil fuels, the exploitation of renewable energy sources (RES) has attracted extensive attention, which can benefit SGs and DCs, as well as society at large. However, the geo-distributed property of DCs and SGs and the uncertain nature of RES production pose severe challenges to the optimal management of computation and energy resources in such a tripartite coupling system. Focusing on these issues, a joint energy and computation workload management framework is proposed for enabling a sustainable DC paradigm with distributed RES. Specifically, a three-layer game is formulated to model the iterations among entities including the energy market, data center operators (DCOs), and SGs. The market includes a certain amount of RES that must be dispatched. The SG offers the DCO an electricity selling price while simultaneously importing RES from the market at a buying price in order to maximize the benefit. The DCO allocates the workload to different DCs, aiming to minimize the costs of energy consumption and carbon emissions. The interactive processes between different entities are further decomposed into two coupling Stackelberg games. We obtain the equilibrium state of the game and prove its uniqueness and optimality. Simulation experiments are conducted to evaluate the performance of the joint energy and computation workload management scheme and show its superiority over counterparts in utilizing renewable energy and reducing emissions. Furthe
In higher education institutions graduation project students, selecting an appropriate methodology is one of the most challenging and complex choices. Furthermore, some students haven’t experience and knowledge in th...
详细信息
ISBN:
(数字)9798350351484
ISBN:
(纸本)9798350351491
In higher education institutions graduation project students, selecting an appropriate methodology is one of the most challenging and complex choices. Furthermore, some students haven’t experience and knowledge in the methods that should be used to complete their graduation projects. This paper proposes and highlights one of the most important methodologies used recently in the design of computer network called PPDIOO model (Prepare, Plan, Design, Implement, Operate, and Optimize). This methodology is a clear strategy that engineers, and computer network specialists must follow in order to design an integrated computer network. The main contribution of this paper is to assist students in networking departments with their graduation projects, ensuring they meet their requirements accurately and without errors. For supervisors and students who used PPDIOO methodology, questionnaires have been published to assess the quality and efficacy of this methodology. Positive feedback was received regarding the effectiveness of all the students who used the model, and it was highly satisfying.
Despite the growing research and development of botnet detection tools, an ever-increasing spread of botnets and their victims is being witnessed. Due to the frequent adaptation of botnets to evolving responses offere...
Despite the growing research and development of botnet detection tools, an ever-increasing spread of botnets and their victims is being witnessed. Due to the frequent adaptation of botnets to evolving responses offered by host-based and network-based detection mechanisms, traditional methods are found to lack adequate defense against botnet threats. In this regard, the suggestion is made to employ flow-based detection methods and conduct behavioral analysis of network traffic. To enhance the performance of these approaches, this paper proposes utilizing a hybrid deep learning method that combines convolutional neural network (CNN) and long short-term memory (LSTM) methods. CNN efficiently extracts spatial features from network traffic, such as patterns in flow characteristics, while LSTM captures temporal dependencies critical to detecting sequential patterns in botnet behaviors. Experimental results reveal the effectiveness of the proposed CNN-LSTM method in classifying botnet traffic. In comparison with the results obtained by the leading method on the identical dataset, the proposed approach showcased noteworthy enhancements, including a 0.61% increase in precision, a 0.03% augmentation in accuracy, a 0.42% enhancement in the recall, a 0.51% improvement in the F1-score, and a 0.10% reduction in the false-positive rate. Moreover, the utilization of the CNN-LSTM framework exhibited robust overall performance and notable expeditiousness in the realm of botnet traffic identification. Additionally, we conducted an evaluation concerning the impact of three widely recognized adversarial attacks on the Information Security Centre of Excellence dataset and the Information Security and Object Technology dataset. The findings underscored the proposed method’s propensity for delivering a promising performance in the face of these adversarial challenges.
High dropout rates globally perpetuate educational disparities with various underlying causes. Despite numerous strategies to address this issue, more attention should be given to understanding and addressing student ...
详细信息
暂无评论