Medical Internet of Things (M-IoT) synchronizes medical devices in a network to provide smart healthcare monitoring to doctors and to provide an interactive model for patients. This embedded networked system gained lo...
详细信息
The premise of a peer-to-peer (P2P) system is based on the voluntary contribution of peers. However, an inherent conflict between individual rationality and social welfare engenders a new situation called the free-rid...
详细信息
The system of Cyber Supply Chain (CSC) is characterized by its complexity, consisting of several subsystems, each responsible for a distinct set of responsibilities. Securing the supply chain presents a challenge due ...
详细信息
ISBN:
(纸本)9798350300093
The system of Cyber Supply Chain (CSC) is characterized by its complexity, consisting of several subsystems, each responsible for a distinct set of responsibilities. Securing the supply chain presents a challenge due to the presence of vulnerabilities and threats throughout the system that has the potential to be taken advantage of at any time, considering that any component of the system is susceptible to such attacks. As a result, supply chain security is difficult to achieve. This has the potential to create a significant interruption to the overall continuity of the company. Therefore, it is of the utmost importance to identify the hazards and make educated guesses about their likely outcomes so that organizations can take the appropriate precautions to ensure the safety of their supply chains. By leveraging a range of factors, such as the expertise and incentives of threat actors, Tactics, Techniques, and Procedures (TT and P), as well as Indicators of Compromise (IoC), the analysis of Cyber Threat Intelligence (CTI) offers valuable information on both identified ansignd unidentified cybersecurity threats. In order to increase the safety of the cyber supply chain, the purpose of this article is to investigate and speculate on potential dangers. The CTI and Machine Learning (ML) approaches have been employed by us in order to study and forecast the risks based on the CTI attributes. This makes it possible to detect the inherent CSC vulnerabilities, which enables suitable control. To enhance the overall security of computer systems, it is imperative to implement specific actions, including the collection of CTI data and the adoption of various machine learning techniques. These techniques encompass Logistic Regression (LG), Support Vector Machine (SVM), Random Forest (RF), Decision Tree (DT), Cat Boost, and Gradient Boost, which are employed in analyzing the Microsoft Malware Prediction dataset to create predictive analytics. This is done in order to illustrate t
Augmented Reality (AR) implemented on mobile devices has emerged as a prominent subject of study within the field of mobile applications and human-machine interaction. The mobile augmented reality (AR) technique integ...
详细信息
The primary objective of this research is to comprehensively explore and analyze the dynamics of the Ethereum network using innovative methodologies and system architectures. The study aims to extract meaningful stati...
详细信息
Today’s working IT professionals frequently struggle with stress issues. The patient is now more likely to experience stress due to changing lifestyle and workplace cultures. Even while many companies and sectors del...
详细信息
The accuracy and security of a biometric system are the two sides of a coin. A biometric system must be simple, flexible, efficient, and secure enough from unauthorized access. Concerning these requirements, this arti...
详细信息
The manual analysis of job resumes poses specific challenges, including the time-intensive process and the high likelihood of human error, emphasizing the need for automation in content-based recommendations. Recent a...
详细信息
Social Networking Sites(SNSs)are nowadays utilized by the whole world to share ideas,images,and valuable contents by means of a post to reach a group of *** use of SNS often inflicts the physical and the mental health ...
详细信息
Social Networking Sites(SNSs)are nowadays utilized by the whole world to share ideas,images,and valuable contents by means of a post to reach a group of *** use of SNS often inflicts the physical and the mental health of the ***,researchers often focus on identifying the illegal beha-viors in the SNS to reduce its negative infl*** state-of-art Natural Language processing techniques for anomaly detection have utilized a wide anno-tated corpus to identify the anomalies and they are often time-consuming as well as certainly do not guarantee maximum *** overcome these issues,the proposed methodology utilizes a Modified Convolutional Neural Network(MCNN)using stochastic pooling and a Leaky Rectified Linear Unit(LReLU).Here,each word in the social media text is analyzed based on its *** stochastic pooling accurately detects the anomalous social media posts and reduces the chance of overfi*** LReLU overcomes the high computational cost and gradient vanishing problem associated with other activation *** also doesn’t stop the learning process when the values are *** MCNN computes a specified score value using a novel integrated anomaly detection *** on the score value,the anomalies are identified.A Teaching Learn-ing based Optimization(TLBO)algorithm has been used to optimize the feature extraction phase of the modified CNN and fast convergence is *** this way,the performance of the model is enhanced in terms of classification *** efficiency of the proposed technique is compared with the state-of-art techni-ques in terms of accuracy,sensitivity,specificity,recall,and *** proposed MCNN-TLBO technique has provided an overall architecture of 97.85%,95.45%,and 97.55%for the three social media datasets namely Facebook,Twitter,and Reddit respectively.
This exploration paper explores the paradigm of Fog Computing as a transformative armature in the Internet of effects(IoT) geography. Fog Computing represents a decentralized approach, positioning computing coffers cl...
详细信息
暂无评论