The incredible progress in technologies has drastically increased the usage of Web *** share their credentials like userid and password or use their smart cards to get authenticated by the application *** cards are ha...
详细信息
The incredible progress in technologies has drastically increased the usage of Web *** share their credentials like userid and password or use their smart cards to get authenticated by the application *** cards are handy to use,but they are susceptible to stolen smart card attacks and few other notable security *** prefer to use Web applications that guarantee for security against several security attacks,especially insider attacks,which is *** of several existing schemes prove the security pitfalls of the protocols from preventing security attacks,specifically insider *** paper introduces LAPUP:a novel lightweight authentication protocol using physically unclonable function(PUF)to prevent security attacks,principally insider *** PUFs are used to generate the security keys,challenge-response pair(CRP)and hardware signature for designing the *** transmitted messages are shared as hash values and encrypted by the keys generated by *** messages are devoid of all possible attacks executed by any attacker,including insider *** is also free from stolen verifier attacks,as the databases are secured by using the hardware signature generated by *** analysis of the protocol exhibits the strength of LAPUP in preventing insider attacks and its resistance against several other security *** evaluation results of the communication and computation costs of LAPUP clearly shows that it achieves better performance than existing protocols,despite providing enhanced security.
Social network analysis provides quantifiable methods and topological metrics to examine the networked structure for several interdisciplinary applications. In our research, a social network of GitHub community is con...
详细信息
Distributed denial of service(DDoS) detection is still an open and challenging problem. In particular, sophisticated attacks, e.g., attacks that disguise attack packets as benign traffic always appear, which can easil...
详细信息
Distributed denial of service(DDoS) detection is still an open and challenging problem. In particular, sophisticated attacks, e.g., attacks that disguise attack packets as benign traffic always appear, which can easily evade traditional signature-based methods. Due to the low requirements for computing resources compared to deep learning, many machine learning(ML)-based methods have been realistically deployed to address this issue. However, most existing ML-based DDo S detection methods are highly dependent on the features extracted from each flow, which incur remarkable detection delay and computation overhead. This article investigates the limitations of typical ML-based DDo S detection methods caused by the extraction of flow-level features. Moreover, we develop a cost-efficient window-based method that extracts features from a fixed number of packets periodically, instead of per flow, aiming to reduce the detection delay and computation overhead. The newly proposed window-based method has the advantages of well-controlled overhead and wide support of common routers due to its simplicity and high efficiency by design. Through extensive experiments on real datasets, we evaluate the performance of flow-based and window-based *** experimental results demonstrate that our proposed window-based method can significantly reduce the detection delay and computation overhead while ensuring detection accuracy.
Ransomware is one of the most advanced malware which uses high computer resources and services to encrypt system data once it infects a system and causes large financial data losses to the organization and individuals...
详细信息
The paper presents a novel framework for optimizing LoRaWAN gateway placement to enhance network performance and reliability. By integrating Network Time Protocol (NTP) for global synchronization and Precision Time Pr...
详细信息
Because of recent COVID-19 epidemic, the Internet-of-Medical-Things (IoMT) has acquired a significant impetus to diagnose patients remotely, regulate medical equipment, and track quarantined patients via smart electro...
详细信息
Robots are increasingly being deployed in densely populated environments, such as homes, hotels, and office buildings, where they rely on explicit instructions from humans to perform tasks. However, complex tasks ofte...
详细信息
Robots are increasingly being deployed in densely populated environments, such as homes, hotels, and office buildings, where they rely on explicit instructions from humans to perform tasks. However, complex tasks often require multiple instructions and prolonged monitoring, which can be time-consuming and demanding for users. Despite this, there is limited research on enabling robots to autonomously generate tasks based on real-life scenarios. Advanced intelligence necessitates robots to autonomously observe and analyze their environment and then generate tasks autonomously to fulfill human requirements without explicit commands. To address this gap, we propose the autonomous generation of navigation tasks using natural language dialogues. Specifically, a robot autonomously generates tasks by analyzing dialogues involving multiple persons in a real office environment to facilitate the completion of item transportation between various *** propose the leveraging of a large language model(LLM) through chain-of-thought prompting to generate a navigation sequence for a robot from dialogues. We also construct a benchmark dataset consisting of 625 multiperson dialogues using the generation capability of LLMs. Evaluation results and real-world experiments in an office building demonstrate the effectiveness of the proposed method.
Dental caries detection holds the key to unlocking brighter smiles and healthier lives by identifying one of the most common oral health issues early on. This vital topic sheds light on innovative ways to combat tooth...
详细信息
This study focuses on enhancing Natural Language Processing (NLP) in generative AI chatbots through the utilization of advanced pre-trained models. We assessed five distinct Large Language Models (LLMs): TRANSFORMER M...
详细信息
Image captioning is a challenging task that involves generating natural language descriptions for images. In this article the proposed novel approach for image captioning that leverages grid-based fusion features usin...
详细信息
暂无评论