Video forgery detection has been necessary with recent spurt in fake videos like Deepfakes and doctored videos from multiple video capturing devices. In this paper, we provide a novel technique of detecting fake video...
详细信息
Money laundering is a serious threat to global financial systems, causing instability and inflation, and especially hurting middle-class savings. This paper suggests a new way to tackle these problems by using blockch...
详细信息
The COVID-19 pandemic has already ravaged the world for two years and infected more than 600 million people, having an irreparable impact on the health, economic, and political dimensions of human society. There have ...
详细信息
Windows malware is becoming an increasingly pressing problem as the amount of malware continues to grow and more sensitive information is stored on *** of the major challenges in tackling this problem is the complexit...
详细信息
Windows malware is becoming an increasingly pressing problem as the amount of malware continues to grow and more sensitive information is stored on *** of the major challenges in tackling this problem is the complexity of malware analysis,which requires expertise from human *** developments in machine learning have led to the creation of deep models for malware ***,these models often lack transparency,making it difficult to understand the reasoning behind the model’s decisions,otherwise known as the black-box *** address these limitations,this paper presents a novel model for malware detection,utilizing vision transformers to analyze the Operation Code(OpCode)sequences of more than 350000 Windows portable executable malware samples from real-world *** model achieves a high accuracy of 0.9864,not only surpassing the previous results but also providing valuable insights into the reasoning behind the *** model is able to pinpoint specific instructions that lead to malicious behavior in malware samples,aiding human experts in their analysis and driving further advancements in the *** report our findings and show how causality can be established between malicious code and actual classification by a deep learning model,thus opening up this black-box problem for deeper analysis.
Capturing the distributed platform with remotely controlled compromised machines using botnet is extensively analyzed by various ***,certain limitations need to be addressed *** provisioning of detection mechanism wit...
详细信息
Capturing the distributed platform with remotely controlled compromised machines using botnet is extensively analyzed by various ***,certain limitations need to be addressed *** provisioning of detection mechanism with learning approaches provides a better solution more broadly by saluting multi-objective *** bots’patterns or features over the network have to be analyzed in both linear and non-linear *** linear and non-linear features are composed of high-level and low-level *** collected features are maintained over the Bag of Features(BoF)where the most influencing features are collected and provided into the classifier ***,the linearity and non-linearity of the threat are evaluated with Support Vector Machine(SVM).Next,with the collected BoF,the redundant features are eliminated as it triggers overhead towards the predictor ***,a novel Incoming data Redundancy Elimination-based learning model(RedE-L)is built to classify the network features to provide robustness towards BotNets *** simulation is carried out in MATLAB environment,and the evaluation of proposed RedE-L model is performed with various online accessible network traffic dataset(benchmark dataset).The proposed model intends to show better tradeoff compared to the existing approaches like conventional SVM,C4.5,RepTree and so ***,various metrics like Accuracy,detection rate,Mathews Correlation Coefficient(MCC),and some other statistical analysis are performed to show the proposed RedE-L model's *** F1-measure is 99.98%,precision is 99.93%,Accuracy is 99.84%,TPR is 99.92%,TNR is 99.94%,FNR is 0.06 and FPR is 0.06 respectively.
The current large-scale Internet of Things(IoT)networks typically generate high-velocity network traffic *** use IoT devices to create botnets and launch attacks,such as DDoS,Spamming,Cryptocurrency mining,Phishing,**...
详细信息
The current large-scale Internet of Things(IoT)networks typically generate high-velocity network traffic *** use IoT devices to create botnets and launch attacks,such as DDoS,Spamming,Cryptocurrency mining,Phishing,*** service providers of large-scale IoT networks need to set up a data pipeline to collect the vast network traffic data from the IoT devices,store it,analyze it,and report the malicious IoT devices and types of ***,the attacks originating from IoT devices are dynamic,as attackers launch one kind of attack at one time and another kind of attack at another *** number of attacks and benign instances also vary from time to *** phenomenon of change in attack patterns is called concept ***,the attack detection system must learn continuously from the ever-changing real-time attack patterns in large-scale IoT network *** meet this requirement,in this work,we propose a data pipeline with Apache Kafka,Apache Spark structured streaming,and MongoDB that can adapt to the ever-changing attack patterns in real time and classify attacks in large-scale IoT *** concept drift is detected,the proposed system retrains the classifier with the instances that cause the drift and a representative subsample instances from the previous training of the *** proposed approach is evaluated with the latest dataset,IoT23,which consists of benign and several attack instances from various IoT *** classification accuracy is improved from 97.8%to 99.46%by the proposed *** training time of distributed random forest algorithm is also studied by varying the number of cores in Apache Spark environment.
With the exponential growth in information related applications and the continuous increase in voice over IP (VoIP) applications, the carriers are expanding their networks to provide improved services to their end use...
详细信息
This research looks at microwave devices, specifically, patch antenna along with electromagnetic spectrum, shape, mechanism, analytical methods, simulation tools, and feeding procedures. Patch antennas are distinguish...
详细信息
This research looks at microwave devices, specifically, patch antenna along with electromagnetic spectrum, shape, mechanism, analytical methods, simulation tools, and feeding procedures. Patch antennas are distinguished by their rectangular form, with a patch on one side and a ground plane on the other. Patch antennas work by exciting electromagnetic waves inside the patch, which are subsequently transmitted into the surrounding environment. The report also outlines numerous ways for evaluating the performance of microstrip patch antennas. The electromagnetic characteristics of the antenna are analyzed using the transmission line model, cavity model, and multiport network model (MNM). The integral equations that regulate the behavior of the antenna are solved using the method of moments (MoM) and the finite element method (FEM). The spectral domain technique (SDT) is used to analyze the antenna’s frequency response, while the finite difference time domain (FDTD) approach is used to analyze the antenna’s time-domain behavior. Overall, these methodologies give a thorough understanding of microstrip patch antenna performance and may be utilized to optimize their design. Furthermore, several patch antenna feeding methods, such as probe feed, microstrip line feeding, aperture coupling, proximity coupling, and CPW feed, are investigated. Attaching a microstrip line to the patch, which is subsequently linked to the RF source, is what microstrip line feeding entails. Aperture coupling entails making a hole in the ground plane that allows the RF source to feed the patch directly. Proximity coupling is accomplished by placing a probe near the patch, which creates an electromagnetic field on the patch. Patch antenna simulation software includes programmers such as HFSS, CST, and FEKO. These tools simulate the patch antenna’s performance, including its radiation pattern, gain, and input impedance. These simulations may be used to optimize the patch antenna design for specific a
This manuscript deems the proposal over utilization of computer digitized vision over the gesture recognition. Gesture language is a language that determines the requirement over combining the finger gesture, its orie...
详细信息
ISBN:
(纸本)9798331534950
This manuscript deems the proposal over utilization of computer digitized vision over the gesture recognition. Gesture language is a language that determines the requirement over combining the finger gesture, its orientation, arm and hand movement, facial & body expression that simultaneously explores and advertises the people thoughts. The digital camera makes the recording of live motion streams of pictures with which the acquisition of image is made with the assistance of interface. The training of system is made over each sort of Figureureureureure gestures as representing (5,4,3,2 or 1) atleast in a single time. Later on, the test symbol is delivered and the system makes a try for detecting it. In this proposed study the detection of Figureureureureure gestures is made using the strategy of image processing. The system makes the detection of cumulative finger count. Later on, it makes the identification of individual fingers above the palm. During the processing, it initially makes the detection of skin tone (Color) from the acquired image by the utilization of filter. The image is allowed to process through subsequent steps in order to depict the correct count of fingers. The model makes the detection over the nearer point from the threshold value. The detection of image is made as per the centroid value. Later on, the implication of certain steps is made for enhancing the normal image to an efficient image so that the exposure of fingers is made. Finally, the model makes the detection and decides the finger count and advertises the calculation to the tester. As a result, the classification is done using artificial neural networks based on the previously formulated training model that has been built and realized with more than 92.5% of accuracy in the finger gesture recognition. In this study, the comparison has also been enumerated with other state of art algorithms designed by many researchers. The classification has been illustrated with diagonal sum algori
The Telecare Medical Information System (TMIS) faces challenges in securely exchanging sensitive health information between TMIS nodes. A Mutual Authenticated Key Agreement (MAKA) scheme is used to eliminate security ...
详细信息
暂无评论