Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by e...
详细信息
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by each of these devices can jeopardize the security of the entire ***,they can allow malicious software installed on end nodes to penetrate the *** paper presents a parallel ensemble model for threat hunting based on anomalies in the behavior of IIoT edge *** proposed model is flexible enough to use several state-of-the-art classifiers as the basic learner and efficiently classifies multi-class anomalies using the Multi-class AdaBoost and majority *** evaluations using a dataset consisting of multi-source normal records and multi-class anomalies demonstrate that our model outperforms existing approaches in terms of accuracy,F1 score,recall,and precision.
This paper proposes a credit-driven practical byzantine fault tolerance based on a consensus algorithm for sustainable 6G communication to address the potential threat of malicious activity in green and sustainable 6G...
详细信息
Remote sensing images (RSI), such as aerial or satellite images, produce a large-scale view of the Earth's surface, which gets them used to track and monitor vehicles from several settings, like border control, di...
详细信息
Remote sensing images (RSI), such as aerial or satellite images, produce a large-scale view of the Earth's surface, which gets them used to track and monitor vehicles from several settings, like border control, disaster response, and urban traffic surveillance. Vehicle detection and classification using RSIs is a vital application of computer vision and image processing. It contains locating and identifying vehicles from the image. It is done using many approaches that have object detection approaches, namely YOLO, Faster R-CNN, or SSD, which utilize deep learning (DL) to locate and identify the image. Additionally, the classification of vehicles from RSIs contains classification of them based on their variety, such as trucks, motorcycles, cars or buses, utilizing machine learning (ML) techniques. This article designed and developed an automated vehicle type detection and classification using a chaotic equilibrium optimization algorithm with deep learning (VDTC-CEOADL) on high-resolution RSIs. The VDTC-CEOADL technique presented examines high-quality RSIs for the accurate detection and classification of vehicles. The VDTC-CEOADL technique employs a YOLO-HR object detector with a residual network as the backbone model to accomplish this. In addition, CEOA based hyperparameter optimizer is designed for the parameter tuning of the ResNet model. For the vehicle classification process, the VDTC-CEOADL technique exploits the attention-based long-short-term memory (ALSTM) mod-el. Performance validation of the VDTC-CEOADL technique is validated on a high-resolution RSI dataset, and the results portrayed the supremacy of the VDTC-CEOADL technique in terms of different measures.
Video surveillance is widely adopted across various sectors for purposes such as law enforcement, COVID-19 isolation monitoring, and analyzing crowds for potential threats like flash mobs or violence. The vast amount ...
详细信息
With the pandemic, coaching or tutoring classes became to halt as the underlying system wasn't facilitating to adapt to emergency teaching mechanisms due to sparse of relevant technologies and tutor unawareness. S...
详细信息
Component-based software systems evolve during their life cycle in order to meet changing requirements or to improve quality properties. At the same time, maintaining continuous availability of services is an issue of...
详细信息
In this work, we introduce a class of black-box(BB) reductions called committed-programming reduction(CPRed) in the random oracle model(ROM) and obtain the following interesting results:(1) we demonstrate that some we...
详细信息
In this work, we introduce a class of black-box(BB) reductions called committed-programming reduction(CPRed) in the random oracle model(ROM) and obtain the following interesting results:(1) we demonstrate that some well-known schemes, including the full-domain hash(FDH) signature(Eurocrypt1996) and the Boneh-Franklin identity-based encryption(IBE) scheme(Crypto 2001), are provably secure under CPReds;(2) we prove that a CPRed associated with an instance-extraction algorithm implies a reduction in the quantum ROM(QROM). This unifies several recent results, including the security of the Gentry-Peikert-Vaikuntanathan IBE scheme by Zhandry(Crypto 2012) and the key encapsulation mechanism(KEM) variants using the Fujisaki-Okamoto transform by Jiang et al.(Crypto 2018) in the ***, we show that CPReds are incomparable to non-programming reductions(NPReds) and randomly-programming reductions(RPReds) formalized by Fischlin et al.(Asiacrypt 2010).
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the...
详细信息
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the challenges of security risks and data analysis *** IIoT grows,cyber-attacks become more diverse and complex,making existing anomaly detection models less effective to *** this paper,an ensemble deep learning model that uses the benefits of the Long Short-Term Memory(LSTM)and the AutoEncoder(AE)architecture to identify out-of-norm activities for cyber threat hunting in IIoT is *** this model,the LSTM is applied to create a model on normal time series of data(past and present data)to learn normal data patterns and the important features of data are identified by AE to reduce data *** addition,the imbalanced nature of IIoT datasets has not been considered in most of the previous literature,affecting low accuracy and *** solve this problem,the proposed model extracts new balanced data from the imbalanced datasets,and these new balanced data are fed into the deep LSTM AE anomaly detection *** this paper,the proposed model is evaluated on two real IIoT datasets-Gas Pipeline(GP)and Secure Water Treatment(SWaT)that are imbalanced and consist of long-term and short-term dependency on *** results are compared with conventional machine learning classifiers,Random Forest(RF),Multi-Layer Perceptron(MLP),Decision Tree(DT),and Super Vector Machines(SVM),in which higher performance in terms of accuracy is obtained,99.3%and 99.7%based on GP and SWaT datasets,***,the proposed ensemble model is compared with advanced related models,including Stacked Auto-Encoders(SAE),Naive Bayes(NB),Projective Adaptive Resonance Theory(PART),Convolutional Auto-Encoder(C-AE),and Package Signatures(PS)based LSTM(PS-LSTM)model.
Aspect-oriented mechanisms are characterized by their join point models, which define join points (meaningful points in a program's representation), pointcuts (means of specifying a set of join points), and advice...
详细信息
Aspect-oriented mechanisms are characterized by their join point models, which define join points (meaningful points in a program's representation), pointcuts (means of specifying a set of join points), and advice (means of affecting the bahaviour of selected join points). Dynamic join point models define join points as the meaningful points in program execution. Pointcuts select a set of join points of interest, each of which is selected and advised individually and independently. That is, the relationships between join points are not taken into account in join point selection and advice, except in a limited predefined way (e.g. cflow). However, there are natural situations in which join points should only be selected if they play a specific role in a defined relationship with other join points. We propose a new join point model that takes join point interrelationships into account and allows designation of arbitrary computations as join points.
Today, refactorings are supported in some integrated development environments (IDEs). The refactoring operations can only work correctly if all source code that needs to be changed is available to the IDE. However, th...
详细信息
ISBN:
(纸本)1595933751
Today, refactorings are supported in some integrated development environments (IDEs). The refactoring operations can only work correctly if all source code that needs to be changed is available to the IDE. However, this precondition neither holds for application programming interface (API) evolution, nor in team development. The research presented in this paper aims to support refactoring in API evolution and team development by extending IDE and version control to allow refactoring-aware merging and migration.
暂无评论