Smart home automation is protective and preventive measures that are taken to monitor elderly people in a non-intrusive manner using simple and pervasive sensors termed Ambient Assistive Living. The smart home produce...
详细信息
This paper proposes a novel framework to detect cyber-attacks using Machine Learning coupled with User Behavior *** framework models the user behavior as sequences of events representing the user activities at such a ...
详细信息
This paper proposes a novel framework to detect cyber-attacks using Machine Learning coupled with User Behavior *** framework models the user behavior as sequences of events representing the user activities at such a *** represented sequences are thenfitted into a recurrent neural network model to extract features that draw distinctive behavior for individual ***,the model can recognize frequencies of regular behavior to profile the user manner in the *** subsequent procedure is that the recurrent neural network would detect abnormal behavior by classifying unknown behavior to either regu-lar or irregular *** importance of the proposed framework is due to the increase of cyber-attacks especially when the attack is triggered from such sources inside the *** detecting inside attacks are much more challenging in that the security protocols can barely recognize attacks from trustful resources at the network,including ***,the user behavior can be extracted and ultimately learned to recognize insightful patterns in which the regular patterns reflect a normal network workfl*** contrast,the irregular patterns can trigger an alert for a potential *** framework has been fully described where the evaluation metrics have also been *** experimental results show that the approach performed better compared to other approaches and AUC 0.97 was achieved using RNN-LSTM *** paper has been concluded with pro-viding the potential directions for future improvements.
The study of gaze tracking is a significant research area in computer vision. It focuses on real-world applications and the interface between humans and computers. Recently, new eye-tracking applications have boosted ...
详细信息
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the exis...
详细信息
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the existing literature on offshore outsourcing deals with the outsourcing of software development *** frameworks have been developed focusing on guiding software systemmanagers concerning offshore software ***,none of these studies delivered comprehensive guidelines for managing the whole process of *** is a considerable lack of research working on managing OSMO from a vendor’s ***,to find the best practices for managing an OSMO process,it is necessary to further investigate such complex and multifaceted phenomena from the vendor’s *** study validated the preliminary OSMO process model via a case study research *** results showed that the OSMO process model is applicable in an industrial setting with few *** industrial data collected during the case study enabled this paper to extend the preliminary OSMO process *** refined version of the OSMO processmodel has four major phases including(i)Project Assessment,(ii)SLA(iii)Execution,and(iv)Risk.
The widespread availability of GPS has opened up a whole new market that provides a plethora of location-based ***-based social networks have become very popular as they provide end users like us with several such ser...
详细信息
The widespread availability of GPS has opened up a whole new market that provides a plethora of location-based ***-based social networks have become very popular as they provide end users like us with several such services utilizing GPS through our ***,when users utilize these services,they inevitably expose personal information such as their ID and sensitive location to the *** to untrustworthy servers and malicious attackers with colossal background knowledge,users'personal information is at risk on these ***,many privacy-preserving solutions for protecting trajectories have significantly decreased utility after *** have come up with a new trajectory privacy protection solution that contraposes the area of interest for ***,Staying Points Detection Method based on Temporal-Spatial Restrictions(SPDM-TSR)is an interest area mining method based on temporal-spatial restrictions,which can clearly distinguish between staying and moving ***,our privacy protection mechanism focuses on the user's areas of interest rather than the entire ***,our proposed mechanism does not rely on third-party service providers and the attackers'background knowledge *** test our models on real datasets,and the results indicate that our proposed algorithm can provide a high standard privacy guarantee as well as data availability.
This study presents the design of a modified attributed control chart based on a double sampling(DS)np chart applied in combination with generalized multiple dependent state(GMDS)sampling to monitor the mean life of t...
详细信息
This study presents the design of a modified attributed control chart based on a double sampling(DS)np chart applied in combination with generalized multiple dependent state(GMDS)sampling to monitor the mean life of the product based on the time truncated life test employing theWeibull *** control chart developed supports the examination of the mean lifespan variation for a particular product in the process of *** control limit levels are used:the warning control limit,inner control limit,and outer control ***,they enhance the capability for variation detection.A genetic algorithm can be used for optimization during the in-control process,whereby the optimal parameters can be established for the proposed control *** control chart performance is assessed using the average run length,while the influence of the model parameters upon the control chart solution is assessed via sensitivity analysis based on an orthogonal experimental design withmultiple linear regression.A comparative study was conducted based on the out-of-control average run length,in which the developed control chart offered greater sensitivity in the detection of process shifts while making use of smaller samples on average than is the case for existing control ***,to exhibit the utility of the developed control chart,this paper presents its application using simulated data with parameters drawn from the real set of data.
Mobile banking security has witnessed significant R&D attention from both financial institutions and *** is due to the growing number of mobile baking applications and their reachability and usefulness to ***,thes...
详细信息
Mobile banking security has witnessed significant R&D attention from both financial institutions and *** is due to the growing number of mobile baking applications and their reachability and usefulness to ***,these applications are also attractive prey for cybercriminals,who use a variety of malware to steal personal banking *** literature in mobile banking security requiresmany permissions that are not necessary for the application’s intended security *** this context,this paper presents a novel efficient permission identification approach for securing mobile banking(MoBShield)to detect and prevent malware.A permission-based dataset is generated for mobile banking malware detection that consists large number of malicious adware apps and benign apps to use as training *** dataset is generated from 1650 malicious banking apps of the Canadian Institute of Cybersecurity,University of New Brunswick and benign apps from Google Play.A machine learning algorithm is used to determine whether amobile banking application ismalicious based on its permission ***,an eXplainable machine learning(XML)approach is developed to improve trust by explaining the reasoning behind the algorithm’s *** evaluation tests that the approach can effectively and practically identify mobile banking malware with high precision and reduced false ***,the adapted artificial neural networks(ANN),convolutional neural networks(CNN)and XML approaches achieve a higher accuracy of 99.7%and the adapted deep neural networks(DNN)approach achieves 99.6%accuracy in comparison with the state-of-the-art *** promising results position the proposed approach as a potential tool for real-world scenarios,offering a robustmeans of identifying and thwarting malware inmobile-based banking ***,MoBShield has the potential to significantly enhance the security and trustworthiness of
In Taiwan, the current electricity prices for residential users remain relatively low. This results in a diminished incentive for these users to invest in energy-saving improvements. Consequently, devising strategies ...
详细信息
Plant diseases are one of the major contributors to economic loss in the agriculture industry worldwide. Detection of disease at early stages can help in the reduction of this loss. In recent times, a lot of emphasis ...
详细信息
Community question and answer (Q&A) websites have become invaluable information and knowledge-sharing sources. Effective topic modelling on these platforms is crucial for organising and navigating the vast amount ...
详细信息
暂无评论