The effects of changing learning rates, data augmentation percentage and numbers of epochs on the performance of Wasserstein Generative Adversarial Networks with Gradient Penalties (WGAN-GP) are evaluated in this stud...
详细信息
Ransomware attacks pose a significant threat to critical infrastructures,demanding robust detection *** study introduces a hybrid model that combines vision transformer(ViT)and one-dimensional convolutional neural net...
详细信息
Ransomware attacks pose a significant threat to critical infrastructures,demanding robust detection *** study introduces a hybrid model that combines vision transformer(ViT)and one-dimensional convolutional neural network(1DCNN)architectures to enhance ransomware detection *** common challenges in ransomware detection,particularly dataset class imbalance,the synthetic minority oversampling technique(SMOTE)is employed to generate synthetic samples for minority class,thereby improving detection *** integration of ViT and 1DCNN through feature fusion enables the model to capture both global contextual and local sequential features,resulting in comprehensive ransomware *** on the UNSW-NB15 dataset,the proposed ViT-1DCNN model achieved 98%detection accuracy with precision,recall,and F1-score metrics surpassing conventional *** approach not only reduces false positives and negatives but also offers scalability and robustness for real-world cybersecurity *** results demonstrate the model’s potential as an effective tool for proactive ransomware detection,especially in environments where evolving threats require adaptable and high-accuracy solutions.
Nowadays,cloud computing provides easy access to a set of variable and configurable computing resources based on user demand through the *** computing services are available through common internet protocols and netwo...
详细信息
Nowadays,cloud computing provides easy access to a set of variable and configurable computing resources based on user demand through the *** computing services are available through common internet protocols and network standards.n addition to the unique benefits of cloud computing,insecure communication and attacks on cloud networks cannot be *** are several techniques for dealing with network *** this end,network anomaly detection systems are widely used as an effective countermeasure against network *** anomaly-based approach generally learns normal traffic patterns in various ways and identifies patterns of *** anomaly detection systems have gained much attention in intelligently monitoring network traffic using machine learning *** paper presents an efficient model based on autoencoders for anomaly detection in cloud computing *** autoencoder learns a basic representation of the normal data and its reconstruction with minimum ***,the reconstruction error is used as an anomaly or classification *** addition,to detecting anomaly data from normal data,the classification of anomaly types has also been *** have proposed a new approach by examining an autoencoder's anomaly detection method based on data reconstruction *** the existing autoencoder-based anomaly detection techniques that consider the reconstruction error of all input features as a single value,we assume that the reconstruction error is a *** enables our model to use the reconstruction error of every input feature as an anomaly or classification *** further propose a multi-class classification structure to classify the *** use the CIDDS-001 dataset as a commonly accepted dataset in the *** evaluations show that the performance of the proposed method has improved considerably compared to the existing ones in terms of accuracy,recall,false-positive rate,and F1-score
Person re-identification involves the task of identifying a specific person among multiple images obtained from different locations. Re-identifying individuals with complex clothing changes poses a greater challenge a...
详细信息
Vector limiter is a computationally complex component of vector control, but its hardware-friendly algorithm is rarely discussed. This paper presents an efficient solution with pure shift-and-add operations, namely th...
详细信息
The IEEE 1588 Precision Time Protocol (PTP) has emerged as a critical standard for achieving highly accurate time synchronization across distributed systems, particularly where precision and low latency are essential....
详细信息
Variable-flux permanent magnet synchronous machines (VF-PMSMs) were proposed to avoid the additional losses of conventional PMSMs during flux weakening (FW) operation at high speeds, as they allow dynamic manipulation...
详细信息
Point clouds are unordered sets of coordinates in 3-D with no functional relation imposed on them. The Rigid Transformation Universal Manifold Embedding (RTUME) [1] is a mapping of volumetric or surface measurements o...
详细信息
Underwater Wireless Sensor Networks (UWSNs) face significant communication and performance challenges due to their harsh and dynamic underwater environment. To address these issues, efficient and robust communication ...
详细信息
Electronic Voting Machines and online voting systems have been intermittently employed but have faced scrutiny due to concerns about transparency and verifiability. The methodology employed in this study ensures trans...
详细信息
暂无评论