Social networking sites have come into demand as a way of sharing ideas and opinions with other people. But unfortunately, people tend to misuse social media to write nasty comments. Victims' lives might be negati...
详细信息
Reinforcement Learning(RL)is gaining importance in automating penetration testing as it reduces human effort and increases ***,given the rapidly expanding scale of modern network infrastructure,the limited testing sca...
详细信息
Reinforcement Learning(RL)is gaining importance in automating penetration testing as it reduces human effort and increases ***,given the rapidly expanding scale of modern network infrastructure,the limited testing scale and monotonous strategies of existing RLbased automated penetration testing methods make them less effective in practical *** this paper,we present CLAP(Coverage-Based Reinforcement Learning to Automate Penetration Testing),an RL penetration testing agent that provides comprehensive network security assessments with diverse adversary testing behaviours on a massive *** employs a novel neural network,namely the coverage mechanism,to address the enormous and growing action spaces in large *** also utilizes a Chebyshev decomposition critic to identify various adversary strategies and strike a balance between *** results across various scenarios demonstrate that CLAP outperforms state-of-the-art methods,by further reducing attack operations by nearly 35%.CLAP also provides enhanced training efficiency and stability and can effectively perform pen-testing over large-scale networks with up to 500 ***,the proposed agent is also able to discover pareto-dominant strategies that are both diverse and effective in achieving multiple objectives.
In today’s digital world, keeping data safe is a top priority. Two common methods used to protect data are steganography and cryptography. Steganography hides secret data within everyday files (like images, GIFs or v...
In today’s digital world, keeping data safe is a top priority. Two common methods used to protect data are steganography and cryptography. Steganography hides secret data within everyday files (like images, GIFs or videos), while cryptography scrambles the data into an unreadable format. This paper introduces a new way to hide data using a technique called Perfect Square Quotient Differencing. Instead of embedding data in a straight sequence, the method hides information in two steps within the components of an image pixel (called the quotient and remainder). In the first step, a perfect square quantization technique is applied to the quotient part. In the second step, the Two Least Significant Bit (2LSB) method is used on the remainder part. A new range-table is also introduced to help determine how much data can be hidden in the first step. This two-step approach allows a large amount of data to be hidden (about 3 bits per pixel on average). The method was tested on many animated color images, and its performance was measured using tools like Peak-Signal-to-Noise-Ratio (PSNR), Mean Square Error (MSE), Universal Image Quality Index (UIQI), and Payload Curve. The results show that this method works better than several modern steganography techniques. Additionally, tests were conducted to ensure the method is secure against potential attacks. This new algorithm could be particularly useful for protecting digital documents stored in cloud-based platforms, offering a robust and efficient way to keep data safe.
A wide range of real applications can be modelled as the multiobjective traveling salesman problem (MOTSP), one of typical combinatorial optimization problems. Meta-heuristics can be used to address MOTSP. However, du...
详细信息
This article introduces an Artificial Intelligent-driven system for Galliformes Farm Management, consulting, and disease control. Comprising both a web-based mobile app and a website, the system integrates physical el...
详细信息
This article proposes a new multi-level inverter (MLI) based on flying capacitor inverter (FCI), with focused on high-precision positioning control for a voice coil motor (VCM). Multi-level inverters (MLIs) have the c...
详细信息
The study examines the multifaceted determinants influencing a project's community utility, including technological refinement, team dynamics, market feasibility, and funding sources. Crowdfunding, a prominent pat...
详细信息
Maintaining high-quality service supply and sustainability in modern cloud computing is essential to ensuring optimal system performance and energy efficiency. A novel approach is introduced in this study to decrease ...
Maintaining high-quality service supply and sustainability in modern cloud computing is essential to ensuring optimal system performance and energy efficiency. A novel approach is introduced in this study to decrease a system.s overall delay and energy consumption by utilising a deep reinforcement learning(DRL)model to predict and allocate incoming workloads flexibly. The proposed methodology integrates workload prediction utilising long short-term memory(LSTM)networks with efficient load-balancing techniques led by deep Q-learning and Actor-Critic algorithms. By continuously analysing current and historical data,the model can efficiently allocate resources,prioritizing speed and energy preservation. The experimental findings demonstrate that our load balancing system,which utilises DRL,significantly reduces average response times and energy usage compared to traditional methods. This approach provides a scalable and adaptable strategy for enhancing cloud infrastructure performance. It consistently provides reliable and durable performance across a range of dynamic workloads.
The explosive growth of the Internet of Things (IoT) has had a substantial impact on daily life and businesses, allowing for real-time monitoring and decision-making. However, increased connectivity also brings higher...
详细信息
The explosive growth of the Internet of Things (IoT) has had a substantial impact on daily life and businesses, allowing for real-time monitoring and decision-making. However, increased connectivity also brings higher security risks, such as botnet attacks and the need for stronger user authentication. This research explores how machine learning can enhance Internet of Things security by identifying abnormal activity, utilizing behavioral biometrics to secure cloud-based dashboards, and detecting botnet threats early. Researchers tested numerous machine learning methods, including K-Nearest Neighbors (KNN), Decision Trees, Logistic Regression, and XGBoost on publicly available datasets. The Decision Tree model earned an impressive accuracy rate of 0.73 for anomaly identification, proving its supremacy in dealing with complex security risks, while the XGBoost model demonstrated strong performance with a 92% accuracy rate for detecting TCP SYN flood attacks. Research findings show the effectiveness of these strategies in enhancing the security and reliability of IoT devices. This study provides significant insights into the use of machine learning to protect IoT devices while also addressing crucial concerns such as power consumption and privacy.
Although collaborative edge computing(CEC)systems are beneficial in enhancing the performance of mobile edge computing(MEC),the issue of user privacy leakage becomes prominent during task *** address this issue,we des...
详细信息
Although collaborative edge computing(CEC)systems are beneficial in enhancing the performance of mobile edge computing(MEC),the issue of user privacy leakage becomes prominent during task *** address this issue,we design a privacy-preservation-aware delay optimization task-offloading algorithm(PPDO)in a CEC *** considering location and usage pattern privacy protection,we establish a privacy task model to interfere with the edge server and ensure user *** address the extra delay arising from privacy protection,we subsequently leverage a Markov decision processing(MDP)policy-iteration-based algorithm to minimize delays without compromising *** simultaneously accelerate the MDP operation,we develop an extension that improves the PPDO by optimizing the action ***,a comprehensive simulation was conducted using the edge user allocation(EUA)*** results demonstrated that PPDO achieves an optimal trade-off between privacy protection and delay with a minimum delay compared with existing ***,we examined the advantages and disadvantages of improving PPDO.
暂无评论