Nowadays, the Internet of Things (IoT) system is vulnerable to spoofing attacks that can easily where attackers can easily pose as a legal entity of the network. A 'spoofing attack' refers to a type of cyber-a...
详细信息
Nowadays, the Internet of Things (IoT) system is vulnerable to spoofing attacks that can easily where attackers can easily pose as a legal entity of the network. A “spoofing attack” refers to a type of cyber-attack ...
详细信息
ISBN:
(数字)9798350373363
ISBN:
(纸本)9798350373370
Nowadays, the Internet of Things (IoT) system is vulnerable to spoofing attacks that can easily where attackers can easily pose as a legal entity of the network. A “spoofing attack” refers to a type of cyber-attack when an attacker purposefully impersonates or masquerades as someone or something else to deceive the target or obtain unauthorized access to systems, information, or resources. In such attacks, the attacker alters their name, IP address, or other attributes to fool the victim into thinking they are engaging with a legitimate entity. Spoofing attacks can take place via a variety of channels, including, ARP and DNS spoofing. Therefore. Spoofing attacks can have serious consequences. We proposed a new approach based on three machine learning models LightGBM, Gradient Boost, and XGBoost to classify attacks on spoofing, we used Chi-square to select the best features to get the highest performance, and we demonstrated that the results using Chi-square achieved higher results than without Chi-square and improved the result with a rate three percent of accuracy. In terms of results, LightGBM outperformed other models by achieving 89%, 91 %, 87 %, and 89 % for accuracy, precision, recall, and f1-score, respectively. This shows the potential and efficiency of Chi-square to achieve the best performance by selecting the best features, thus providing a secure system and identifying cyber-attacks on systems.
Сardiovascular diseases, also known as CVDs, currently rank as the primary incidence of mortality. The present approach for identifying illnesses involves the analysis of the Electrocardiogram (ECG), an electronic di...
ISBN:
(纸本)9798400709036
Сardiovascular diseases, also known as CVDs, currently rank as the primary incidence of mortality. The present approach for identifying illnesses involves the analysis of the Electrocardiogram (ECG), an electronic diagnostic device utilized to capture the rhythm of the heart. Regrettably, the process of seeking out specialists to conduct analysis on a substantial volume of electrocardiogram (ECG) data results in a significant dep.etion of medical capabilities. Hence, the utilization of deep learning algorithms for the identification of ECG characteristics has progressively gained prominence. Nevertheless, there exist certain limitations associated with these conventional approaches, which necessitate the need for manual characteristic identification, intricate models, and extensive training duration. This study presents a novel and effective approach for categorizing the five different types of heartbeats in the MIT-BIH Arrhythmia database. The proposed method involves the utilization of a 16-layer deep one-dimensional convolutional neural network, which exhibits both robustness and efficiency in its classification performance. Thus, the designed model is consisting of five-groups, first to fourth groups are the main feature extraction and mapping blocks, while the fifth group is fully connected and classification layers. The findings indicate that the model presented in this study has superior performance in terms of accuracy, precision, and F1-score. The proper classification of medical cases has a significant impact on the conservation of medical resources, hence positively influencing clinical practice. Additionally, the model training phase is characterized by its efficiency, since it does not significantly dep.ete resources.
Deep learning (DL), a relatively recent AI technique, has been successfully applied to the problem of automated modulation categorization (AMC), with promising results. An essential part of developing the spectrum-sen...
ISBN:
(纸本)9798400709036
Deep learning (DL), a relatively recent AI technique, has been successfully applied to the problem of automated modulation categorization (AMC), with promising results. An essential part of developing the spectrum-sensing capabilities needed by software-defined radio is carrying out radio signal classification jobs, which we did in this research by introducing a better deep neural architecture. Different detection techniques were utilized in the literature; however, DL neural networks are recently utilized in this field. Recurrent Neural Network (RNN), Long Short-Term Memory (LSTM) which is one variation of the RNN network, and other techniques are some of the employed DL architectures in the field of AMC. In this paper, Convolutional Neural Network (CNN) model has been built to automatically classify ten-modulation formats correctly. The suggested CNN network is constructed mainly of six-Convolutional layers. The overall number of trainable parameters in the proposed network is 1,757,962. Thus, the network accuracy, which was achieved during the training reached more than 90%. Python programming packages have been used to implement the suggested approach using *** platform, which provides wide-range of facilities.
Energy efficiency is an essential requirement on future computer architectures. Thereby, the efficiency of the communication will play an important role. Within this paper, we present an energy model for a unicast mul...
详细信息
ISBN:
(纸本)9781467365567
Energy efficiency is an essential requirement on future computer architectures. Thereby, the efficiency of the communication will play an important role. Within this paper, we present an energy model for a unicast multi-hop communication. The model allows to derive predictions about the energy of a future computing platform. Further, it can be used to identify which components of the system or tasks related to communication have a significant influence on the overall energy and, hence, require special attention in the design phase. We discuss how values for processing delays and power consumption can be determined for a future computing platform and present values for a target platform. The energy model is applied to derive energy predictions for this platform.
In all kind of information exchange, security is essential. One protection goal that has to be enforced is confidentiality. In state-of-the-art protocols, messages are encrypted before they are transmitted to ensure t...
详细信息
ISBN:
(纸本)9781467365567
In all kind of information exchange, security is essential. One protection goal that has to be enforced is confidentiality. In state-of-the-art protocols, messages are encrypted before they are transmitted to ensure their confidentiality. However, incorporating novel technologies like network coding allows for more efficient solutions. Within this article, we compare different solutions for confidential communication by means of network coding at physical layer and at network layer. We discuss security, efficiency, and computational complexity of these approaches. The results allow to draw conclusions about the choice of a suited communication scheme dep.nding on the system model and the relevant parameters.
We consider the problem of secure communications in a Gaussian two-way relay network where two nodes exchange confidential messages only via an untrusted relay. The relay is assumed to be honest but curious, i.e., an ...
详细信息
We consider the problem of secure communications in a Gaussian two-way relay network where two nodes exchange confidential messages only via an untrusted relay. The relay is assumed to be honest but curious, i.e., an eavesdropper that conforms to the system rules and applies the intended relaying scheme. We analyze the achievable secrecy rates by applying network coding on the physical layer or the network layer and compare the results in terms of complexity, overhead, and efficiency. Further, we discuss the advantages and disadvantages of the respective approaches.
暂无评论