Cloud computing is a high network infrastructure where users,owners,third users,authorized users,and customers can access and store their information *** use of cloud computing has realized the rapid increase of infor...
详细信息
Cloud computing is a high network infrastructure where users,owners,third users,authorized users,and customers can access and store their information *** use of cloud computing has realized the rapid increase of information in every field and the need for a centralized location for processing *** cloud is nowadays highly affected by internal threats of the *** applications such as banking,hospital,and business are more likely affected by real user *** intruder is presented as a user and set as a member of the *** becoming an insider in the network,they will try to attack or steal sensitive data during information sharing or *** major issue in today's technological development is identifying the insider threat in the cloud *** data are lost,compromising cloud users is *** and security are not ensured,and then,the usage of the cloud is not *** solutions are available for the external security of the cloud ***,insider or internal threats need to be *** this research work,we focus on a solution for identifying an insider attack using the artificial intelligence *** insider attack is possible by using nodes of weak users’*** will log in using a weak user id,connect to a network,and pretend to be a trusted ***,they can easily attack and hack information as an insider,and identifying them is very *** types of attacks need intelligent solutions.A machine learning approach is widely used for security *** date,the existing lags can classify the attackers *** information hijacking process is very absurd,which motivates young researchers to provide a solution for internal *** our proposed work,we track the attackers using a user interaction behavior pattern and deep learning *** usage of mouse movements and clicks and keystrokes of the real user is stored in a *** deep belief neural
Today's marketing strategies place a high priority on comprehending customer sentiments. It will not only give businesses a better understanding of how their clients view their goods and/or services, but it will a...
详细信息
People of all ages can contract pneumonia, a deadly respiratory illness that is more common in underdeveloped countries. For successful treatment and higher survival rates, pneumonia must be accurately and quickly dia...
详细信息
Motor pattern recognition paradigms are the main forms of Brain-computer Interfaces(BCI) aimed at motor function rehabilitation and are the most easily promoted applications. In recent years, many researchers have sug...
详细信息
We study the maximum weight convex polytope problem, in which the goal is to find a convex polytope maximizing the total weight of enclosed points. Prior to this work, the only known result for this problem was an O(n...
The application of virtual reality (VR) across various sectors is becoming more widespread, playing a pivotal role in the advancement of the metaverse. However, the prevalence of VR sickness undermines user experience...
详细信息
Computational narrative is a complex field. While the computational processing of narratives has been tackled from different perspectives, the literature has focused on the analysis of a main plot, even if it is compo...
详细信息
Threat intelligence provides a platform for cybersecurity engineers for attack traceability, which provides substantial knowledge database logs to defend against future security threats. Threat intelligence relationsh...
详细信息
Medical image segmentation is a challenging task especially when dealing with unlabeled data. It has been proven that the use of complementary information for co-training is effective for medical image segmentation. W...
详细信息
Potato is the most widely grown and consumed food throughout the world. There are a number of potato crop diseases that affect production, and these diseases differ in symptoms, circumstances, and controls. Early dete...
详细信息
暂无评论