Deep convolutional neural networks (CNNs) have facilitated remarkable success in recognizing various food items and agricultural stress. A decent performance boost has been witnessed in solving the agro-food challenge...
详细信息
Cloud computing is one of the most attractive and cost-saving models,which provides online services to *** computing allows the user to access data directly from any *** nowadays,cloud security is one of the biggest i...
详细信息
Cloud computing is one of the most attractive and cost-saving models,which provides online services to *** computing allows the user to access data directly from any *** nowadays,cloud security is one of the biggest issues that *** types of malware are wreaking havoc on the *** on the cloud server are happening from both internal and external *** paper has developed a tool to prevent the cloud server from spamming *** an attacker attempts to use different spamming techniques on a cloud server,the attacker will be intercepted through two effective techniques:Cloudflare and K-nearest neighbors(KNN)*** will block those IP addresses that the attacker will use and prevent spamming ***,the KNN classifiers will determine which area the spammer belongs *** the end of the article,various prevention techniques for securing cloud servers will be discussed,a comparison will be made with different papers,a conclusion will be drawn based on different results.
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the *** are many algorithms designed to protect the cloud server from a...
详细信息
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the *** are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server ***,the attackers have designed even better mechanisms to break these security *** cryptography is the best data protection algorithm that exchanges data between authentic *** this article,one symmetric cryptography algorithm will be designed to secure cloud server data,used to send and receive cloud server data securely.A double encryption algorithm will be implemented to send data in a secure ***,the XOR function will be applied to plain text,and then salt technique will be ***,a reversing mechanism will be implemented on that data to provide more data *** decrypt data,the cipher text will be reversed,salt will be removed,andXORwill be *** the end of the paper,the proposed algorithm will be compared with other algorithms,and it will conclude how much better the existing algorithm is than other algorithms.
作者:
Ribeiro, LucasOliveira, Helder P.Hu, XiaoPereira, TaniaUniversity of Porto
Inesc Tec Inesc Tec - Institute for Systems and Computer Engineering Technology and Science Feup - Faculty of Engineering Porto Portugal University of Porto
Inesc Tec - Institute for Systems and Computer Engineering Technology and Science Fcup - Faculty of Science Porto Portugal Emory University
Nell Hodgson Woodruff School of Nursing Department of Biomedical Informatics School of Medicine Department of Computer Science College of Arts and Sciences Atlanta United States Technology and Science
Inesc Tec - Institute for Systems and Computer Engineering Porto Portugal
PPG signal is a valuable resource for continuous heart rate monitoring;however, this signal suffers from artifact movements, which is particularly relevant during physical exercise and makes this biomedical signal dif...
详细信息
User-centric data sharing is essential to encourage citizens'active participation in the digital *** key to smart cities,a form of the digital economy,is the promotion of public use of citizen ***,it is not easy t...
详细信息
User-centric data sharing is essential to encourage citizens'active participation in the digital *** key to smart cities,a form of the digital economy,is the promotion of public use of citizen ***,it is not easy to utilize data without citizens’*** this study,we took a technological approach to these *** access(UMA)is a well-known framework for delegating resource access rights to others on the *** UMA,authorization mechanisms are designed to be centralized so that resource owners can centrally manage access rights for various resources stored in different ***,the lack of transparency in the authorization mechanism is a barrier to its implementation in large-scale systems such as smart *** this study,we developed a blockchain-based cross-domain authorization architecture that enables a resource-sharing ecosystem in which organizations that wish to utilize data can freely trade with each *** proposed architecture solves the transparency problem that conventional authorization systems have had by designing the authorization mechanism on blockchain *** implemented the proposed architecture as smart contracts and evaluated its processing *** resultant time required for delegating access rights and accessing resources was less than 500 ***,we found that the fluctuation in the processing time overhead was *** on these results,we concluded that performance degradation with the proposed architecture is minor.
The data collected from all the States and Union Territories has been compiled in the Publication, according to the ministry of road transport and roads transport research wing. The total number of accident-related de...
详细信息
The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access *** privacy of health data can only be preserved by keep...
详细信息
The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access *** privacy of health data can only be preserved by keeping it in an encrypted form,but it affects usability and flexibility in terms of effective ***-based searchable encryption(ABSE)has proven its worth by providing fine-grained searching capabilities in the shared cloud ***,it is not practical to apply this scheme to the devices with limited resources and storage capacity because a typical ABSE involves serious *** a healthcare cloud-based cyber-physical system(CCPS),the data is often collected by resource-constraint devices;therefore,here also,we cannot directly apply ABSE *** the proposed work,the inherent computational cost of the ABSE scheme is managed by executing the computationally intensive tasks of a typical ABSE scheme on the blockchain ***,it makes the proposed scheme suitable for online storage and retrieval of personal health data in a typical *** the assistance of blockchain technology,the proposed scheme offers two main ***,it is free from a trusted authority,which makes it genuinely decentralized and free from a single point of ***,it is computationally efficient because the computational load is now distributed among the consensus nodes in the blockchain ***,the task of initializing the system,which is considered the most computationally intensive,and the task of partial search token generation,which is considered as the most frequent operation,is now the responsibility of the consensus *** eliminates the need of the trusted authority and reduces the burden of data users,***,in comparison to existing decentralized fine-grained searchable encryption schemes,the proposed scheme has achieved a significant reduction in storage and computational cost for the secret
Drone based terrorist attacks are increasing daily. It is not expected to be long before drones are used to carry out terror attacks in urban areas. We have developed the DUCK multiagent testbed that security agencies...
详细信息
Data breach is a serious issue as it leaks the personal information of more than billions of users and their privacy is compromised. More than 77% of organizations do not have a Cyber Security Incident Response plan. ...
详细信息
In the Field of computer science, artificial intelligence (AI) is a broad field, which is concerned with structuring smart products and machines able to perform tasks which require the intellectual capability of human...
详细信息
暂无评论