作者:
Singh, AmitSindhu Madhuri, G.Teerthanker Mahaveer University
College of Computing Science & It Department of Computing Science & It Moradabad India
Faculty of Engineering and Technology Department of Computer Science and Engineering Bangalore India
On current days, the growing applications in Internet of Things (IoT) is increasing in various real-time sectors as smart city applications (air pollution, atmospheric noise canceling and traffic flow management). Now...
详细信息
The internet has become a part of every human ***,various devices that are connected through the internet are ***,the Industrial Internet of things(IIoT)is an evolutionary technology interconnecting various industries...
详细信息
The internet has become a part of every human ***,various devices that are connected through the internet are ***,the Industrial Internet of things(IIoT)is an evolutionary technology interconnecting various industries in digital platforms to facilitate their ***,IIoT is being used in various industrial fields such as logistics,manufacturing,metals and mining,gas and oil,transportation,aviation,and energy *** is mandatory that various industrial fields require highly reliable security and preventive measures against *** detection is defined as the detection in the network of security threats targeting privacy information and sensitive *** Detection Systems(IDS)have taken an important role in providing security in the field of computer *** of intrusion is completely based on the detection functions of the *** an IIoT network expands,it generates a huge volume of data that needs an IDS to detect intrusions and prevent network *** research works have been done for preventing network *** day,the challenges and risks associated with intrusion prevention are increasing while their solutions are not properly *** this regard,this paper proposes a training process and a wrapper-based feature selection With Direct Linear Discriminant Analysis LDA(WDLDA).The implemented WDLDA results in a rate of detection accuracy(DRA)of 97%and a false positive rate(FPR)of 11%using the Network Security Laboratory-Knowledge Discovery in Databases(NSL-KDD)dataset.
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell Computers and Humans Apart)has emerged as a key strategy for distinguishing huma...
详细信息
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell Computers and Humans Apart)has emerged as a key strategy for distinguishing human users from automated ***-based CAPTCHAs,designed to be easily decipherable by humans yet challenging for machines,are a common form of this ***,advancements in deep learning have facilitated the creation of models adept at recognizing these text-based CAPTCHAs with surprising *** our comprehensive investigation into CAPTCHA recognition,we have tailored the renowned UpDown image captioning model specifically for this *** approach innovatively combines an encoder to extract both global and local features,significantly boosting the model’s capability to identify complex details within CAPTCHA *** the decoding phase,we have adopted a refined attention mechanism,integrating enhanced visual attention with dual layers of Long Short-Term Memory(LSTM)networks to elevate CAPTCHA recognition *** rigorous testing across four varied datasets,including those from Weibo,BoC,Gregwar,and Captcha 0.3,demonstrates the versatility and effectiveness of our *** results not only highlight the efficiency of our approach but also offer profound insights into its applicability across different CAPTCHA types,contributing to a deeper understanding of CAPTCHA recognition technology.
Android devices are popularly available in the commercial market at different price levels for various levels of *** Android stack is more vulnerable compared to other platforms because of its open-source *** are many...
详细信息
Android devices are popularly available in the commercial market at different price levels for various levels of *** Android stack is more vulnerable compared to other platforms because of its open-source *** are many android malware detection techniques available to exploit the source code andfind associated components during execution *** obtain a better result we create a hybrid technique merging static and dynamic *** this paper,in thefirst part,we have proposed a technique to check for correlation between features and classify using a supervised learning approach to avoid Mul-ticollinearity problem is one of the drawbacks in the existing *** the proposed work,a novel PCA(Principal Component Analysis)based feature reduction technique is implemented with conditional dependency features by gathering the functionalities of the application which adds novelty for the given *** Android Sensitive Permission is one major key point to be considered while detecting *** select vulnerable columns based on features like sensitive permissions,application program interface calls,services requested through the kernel,and the relationship between the variables henceforth build the model using machine learning classifiers and identify whether the given application is malicious or *** goal of this paper is to check benchmarking datasets collected from various repositories like virus share,Github,and the Canadian Institute of cyber security,compare with models ensuring zero-day exploits can be monitored and detected with better accuracy rate.
Optical Wireless Communication (OWC), sometimes referred to as Free Space Optics (FSO), is the backbone of leading-edge communication systems that offer high performance and fast speed. The main pitfall of this system...
详细信息
Simultaneous and dynamic detection of diseases from infield images of citrus plants is the primary objective of this investigation. Refraining from discarding the disease-related issues would reduce agricultural yield...
详细信息
On-site warnings can decrease the range of late alert zone during earthquakes. This study develops a deep learning model to predict whether the maximum peak ground acceleration at a station exceeds 25 Gal based on the...
详细信息
One dangerous side effect of diabetes that affects the eyes is called diabetic retinopathy. It happens as a result of alterations in the retina’s blood vessels, which can cause harm and even blindness. The developmen...
详细信息
Anomaly detection is a task that involves identifying patterns or events that deviate significantly from the expected or normal behavior. In the context of classroom settings, it is essential to identify mischievous b...
详细信息
Traffic data analysis and forecasting is a multidimensional challenge that extracts details from sources such as social media and vehicle sensor data. This study proposes a three-stage framework using Deep Learning (D...
详细信息
暂无评论