The biggest obstacle that students have when participating in a virtual learning environment (e-learning) is discovering a platform that has functionalities that can be customized to fit their needs. This is usually a...
详细信息
The Canadian air travel sector has seen a significant increase in flight delays, cancellations, and other issues concerning passenger rights. Recognizing this demand, we present a chatbot to assist passengers and educ...
详细信息
Software defect prediction is an essential task during the software development Lifecycle as it can help managers to identify the most defect-proneness modules. Thus, it can reduce the test cost and assign testing res...
详细信息
In recent years, blockchain technology is found to be the most significant discovery in this digital era, after the discovery of the Internet and Cloud Computing. Blockchain is a simple, distributed public ledger that...
详细信息
In this work, we leverage state-of-the-art machine learning algorithms to predict Channel State Information (CSI), for enhancing performance of wireless communication systems. The simulation and analysis stop with tra...
详细信息
Modern engineering society requires qualified solutions to many practical problems, to meet accurate outcomes. Emotion detection through face landmarks has unique coordination toward improving the feedback system. Bio...
详细信息
The advent of Software-Defined Networking has revolutionized network management by decoupling the control and data planes, catering to diverse network requirements across various domains. SDNs may seem more secure tha...
详细信息
Human Activity Recognition (HAR) is a fascinating process that involves identifying and categorizing human activities based on observations of subject behavior and environmental factors. Out of the major phases of HAR...
详细信息
As cloud computing adoption in colleges continues to rise, the security of private cloud systems has become a paramount concern. data breaches resulting from cyber attacks can inflict severe damage to a university'...
详细信息
ISBN:
(纸本)9798350300857
As cloud computing adoption in colleges continues to rise, the security of private cloud systems has become a paramount concern. data breaches resulting from cyber attacks can inflict severe damage to a university's revenue and reputation. This research proposes a novel machine learning-based cyber threat detection system tailored to the university's private cloud environment. The system's main objective is to continuously monitor the cloud infrastructure and employ advanced machine learning algorithms to analyze network traffic, identify and prevent unusual activities that may indicate potential cyber-attacks. Here, the challenges posed on two sides of known possible threats and attack worldwide come across, and administrative defaults leads to security hole. By leveraging the power of machine learning, this innovative system aims to enhance the university's cyber defence capabilities. It considers the dynamic and evolving nature of cyber threats, enabling real-time detection and proactive measures against malicious activities. The integration of cutting-edge machine learning models and feature extraction techniques empowers the system to identify patterns of anomalous behaviour, even in the face of sophisticated attacks. Key components of the proposed system include network traffic analysis, anomaly detection and threat intelligence integration. Through the analysis of network packets and access logs, the system can effectively detect signs of unauthorized access, data exhilaration, and other cyber threats. Additionally, threat intelligence feeds provide the system with up-to-date information on emerging threats, enabling quick responses to potential risks. Moreover, the system's implementation adheres to privacy and data protection regulations, ensuring secure handling of sensitive information within the private cloud environment. Regular updates and adaptive learning capabilities enable the system to evolve with changing cyber threats, ensuring continued robustn
Conventional threshold-based dual-channel methods, as well as recent deep learning-based methods, can deterministically detect fog using satellite observations. However, stochastic processes like fog are best represen...
详细信息
暂无评论