Thereis an urgent need for strong security measures to protect Body Area Networks (BANs) from malicious threats, as their use in health monitoring and telemedicine continues to grow. To improve BAN security, this rese...
详细信息
Ambient vibration measurements of a cable-stayed bridge in Taiwan were first conducted to identify its dominant modal parameters with a reliable stochastic subspace identification algorithm recently developed. A finit...
详细信息
Nomadic Vehicular Cloud(NVC)is envisaged in this *** predo-minant aspects of NVC is,it moves along with the vehicle that initiates it and functions only with the resources of moving vehicles on the heavy traffic road ...
详细信息
Nomadic Vehicular Cloud(NVC)is envisaged in this *** predo-minant aspects of NVC is,it moves along with the vehicle that initiates it and functions only with the resources of moving vehicles on the heavy traffic road without relying on any of the static infrastructure and NVC decides the initiation time of container migration using cell transmission model(CTM).Containers are used in the place of Virtual Machines(VM),as containers’features are very apt to NVC’s dynamic *** specifications of 5G NR V2X PC5 interface are applied to NVC,for the feature of not relying on the network ***-days,the peak traffic on the road and the bottlenecks due to it are inevitable,which are seen here as the benefits for VC in terms of resource availability and residual in-network *** speed range of high-end vehicles poses the issue of dis-connectivity among VC participants,that results the container migration *** the entire VC participants are on the move,to maintain proximity of the containers hosted by them,estimating their movements plays a vital *** infer the vehicle movements on the road stretch and initiate the container migration prior enough to avoid the migration failure due to vehicles dynamicity,this paper proposes to apply the CTM to the container based and 5G NR V2X enabled *** simulation results show that there is a significant increase in the success rate of vehicular cloud in terms of successful container migrations.
In this paper,we propose a game theory framework to solve advanced persistent threat problems,especially considering two types of insider threats:malicious and *** this framework,we establish a unified three-player ga...
详细信息
In this paper,we propose a game theory framework to solve advanced persistent threat problems,especially considering two types of insider threats:malicious and *** this framework,we establish a unified three-player game model and derive Nash equilibria in response to different types of insider *** analyzing these Nash equilibria,we provide quantitative solutions to advanced persistent threat problems pertaining to insider ***,we have conducted a comparative assessment of the optimal defense strategy and corresponding defender's costs between two types of insider ***,our findings advocate a more proactive defense strategy against inadvertent insider threats in contrast to malicious ones,despite the latter imposing a higher burden on the *** theoretical results are substantiated by numerical results,which additionally include a detailed exploration of the conditions under which different insiders adopt risky *** conditions can serve as guiding indicators for the defender when calibrating their monitoring intensities and devising defensive strategies.
Text-based hate speech has been prevalent and is usually used to incite hostility and violence. Detecting this content becomes imperative, yet the task is challenging, particularly for low-resource languages in the De...
详细信息
Compared with traditional environments,the cloud environment exposes online services to additional vulnerabilities and threats of cyber attacks,and the cyber security of cloud platforms is becoming increasingly promin...
详细信息
Compared with traditional environments,the cloud environment exposes online services to additional vulnerabilities and threats of cyber attacks,and the cyber security of cloud platforms is becoming increasingly prominent.A piece of code,known as a Webshell,is usually uploaded to the target servers to achieve multiple *** Webshell attacks has become a hot spot in current ***,the traditional Webshell detectors are not built for the cloud,making it highly difficult to play a defensive role in the cloud ***,a Webshell detection system based on deep learning that is successfully applied in various scenarios,is proposed in this *** system contains two important components:gray-box and neural network *** gray-box analyzer defines a series of rules and algorithms for extracting static and dynamic behaviors from the code to make the decision *** neural network analyzer transforms suspicious code into Operation Code(OPCODE)sequences,turning the detection task into a classification *** experiment results show that SmartEagleEye achieves an encouraging high detection rate and an acceptable false-positive rate,which indicate its capability to provide good protection for the cloud environment.
Partitional clustering techniques such as K-Means(KM),Fuzzy C-Means(FCM),and Rough K-Means(RKM)are very simple and effective techniques for image ***,because their initial cluster centers are randomly determined,it is...
详细信息
Partitional clustering techniques such as K-Means(KM),Fuzzy C-Means(FCM),and Rough K-Means(RKM)are very simple and effective techniques for image ***,because their initial cluster centers are randomly determined,it is often seen that certain clusters converge to local *** addition to that,pathology image segmentation is also problematic due to uneven lighting,stain,and camera settings during the microscopic image capturing ***,this study proposes an Improved Slime Mould Algorithm(ISMA)based on opposition based learning and differential evolution’s mutation strategy to perform illumination-free White Blood Cell(WBC)*** ISMA helps to overcome the local optima trapping problem of the partitional clustering techniques to some *** paper also performs a depth analysis by considering only color components of many well-known color spaces for clustering to find the effect of illumination over color pathology image *** and visual results encourage the utilization of illumination-free or color component-based clustering approaches for image ***-KM and“ab”color channels of CIELab color space provide best results with above-99%accuracy for only nucleus ***,for entire WBC segmentation,ISMA-KM and the“CbCr”color component of YCbCr color space provide the best results with an accuracy of above 99%.Furthermore,ISMA-KM and ISMA-RKM have the lowest and highest execution times,*** the other hand,ISMA provides competitive outcomes over CEC2019 benchmark test functions compared to recent well-established and efficient Nature-Inspired Optimization Algorithms(NIOAs).
INTRODUCTION: Cloud computing, a still emerging technology, allows customers to pay for services based on usage. It provides internet-based services, whilst virtualization optimizes a PC’s available resources. OBJECT...
详细信息
Behavior-Driven Development (BDD) user stories are widely used in agile methods for capturing user requirements and acceptance criteria due to their simplicity and clarity. However, the concise structure of BDD-based ...
详细信息
Wireless Sensor Networks are composed of autonomous sensing devices which are interconnected to form a closed *** closed network is intended to share sensitive location-centric information from a source node to the ba...
详细信息
Wireless Sensor Networks are composed of autonomous sensing devices which are interconnected to form a closed *** closed network is intended to share sensitive location-centric information from a source node to the base station through efficient routing *** efficiency of the sensor node is energy bounded,acts as a concentrated area for most researchers to offer a solution for the early draining power of *** management plays a significant role in wireless sensor networks,which was obsessed with the factors like the reliability of the network,resource management,energy-efficient routing,and scalability of *** topology of the wireless sensor networks acts dri-ven factor for network efficiency which can be effectively maintained by perform-ing the clustering process *** solutions and clustering algorithms have been offered by various researchers,but the concern of reduced efficiency in the routing process and network management still *** research paper offers a hybrid algorithm composed of a memetic algorithm which is an enhanced version of a genetic algorithm integrated with the adaptive hill-climbing algorithm for performing energy-efficient clustering process in the wireless sensor *** memetic algorithm employs a local searching methodology to mitigate the premature convergence,while the adaptive hill-climbing algorithm is a local search algorithm that persistently migrates towards the increased elevation to determine the peak of the mountain(i.e.,)best cluster head in the wireless sensor *** proposed hybrid algorithm is compared with the state of art clus-tering algorithm to prove that the proposed algorithm outperforms in terms of a network life-time,energy consumption,throughput,etc.
暂无评论