The cyber security has become a hot research topic nowadays. The term cyber security is frequently employed replaceable with the term data security. In recent days, each system faces the cyber security threat virtuall...
详细信息
One of the major challenges in bioinformatics lies in identification of modified gene expressions of an affected person due to medical ailments. Focused research has been observed till date in such identification, lea...
详细信息
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing ac...
详细信息
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing across the participating entities, a malicious agent may gain access to outsourced data from the cloud environment. A malicious agent is an entity that deliberately breaches the data. This information accessed might be misused or revealed to unauthorized parties. Therefore, data protection and prediction of malicious agents have become a demanding task that needs to be addressed appropriately. To deal with this crucial and challenging issue, this paper presents a Malicious Agent Identification-based Data Security (MAIDS) Model which utilizes XGBoost machine learning classification algorithm for securing data allocation and communication among different participating entities in the cloud system. The proposed model explores and computes intended multiple security parameters associated with online data communication or transactions. Correspondingly, a security-focused knowledge database is produced for developing the XGBoost Classifier-based Malicious Agent Prediction (XC-MAP) unit. Unlike the existing approaches, which only identify malicious agents after data leaks, MAIDS proactively identifies malicious agents by examining their eligibility for respective data access. In this way, the model provides a comprehensive solution to safeguard crucial data from both intentional and non-intentional breaches, by granting data to authorized agents only by evaluating the agent’s behavior and predicting the malicious agent before granting data. The performance of the proposed model is thoroughly evaluated by accomplishing extensive experiments, and the results signify that the MAIDS model predicts the malicious agents with high accuracy, precision, recall, and F1-scores up to 95.55%, 95.30%, 95.50%, and 95.20%, respectively. This enormously enhances the system’s sec
The paper presents a novel approach for detecting anomalies like arson, explosion, vandalism, etc in public spaces using CCTV camera feeds. We propose a deep learning-based system that analyzes video streams to identi...
详细信息
During the unprecedented expansion of global data, efficient storage solutions are essential for processing massive datasets stored on modern storage devices. B-epsilon-tree (Bϵ-tree) is one of the most well-known tec...
详细信息
In the majority of Western nations including America, Australia and Europe, skin cancer is badly-behaved. Skin concealing, inadequacy of Sun-lights, climate, age, and inherited are major risk factors. Early identifica...
详细信息
The rapid growth in the use of IoT devices has highlighted significant challenges due to their limited computational power and battery life, often resulting in long task execution times and potential battery depletion...
详细信息
This research discusses an emotion recognition system, which is an important component of many effective computing technologies for natural language processing, based on open-source platforms with automatic speech rec...
详细信息
Elections are a vital component of democracy because they allow citizens to exercise their right to vote and choose representatives at all levels of government. The exponential growth of social media platforms has fac...
详细信息
A crucial problem in cloud computing is load balancing, which makes it challenging to guarantee that services operate as intended in accordance with quality of service (QoS), performance reviews, and service contracts...
详细信息
暂无评论