Cloud service providers offer flexible infrastructure scaling options, allowing users to adjust resources based on their requirements and pay only for what they use. This paper proposes an approach to efficiently dist...
详细信息
This study examines the design of fault tolerance mechanisms in cloud computing infrastructure, with particular emphasis on Amazon Web Services (A WS). Fault tolerance is critical to assure the continuous availability...
详细信息
Using text mining tools and machine learning algorithms, the paper presents a prototype for classifying strokes. The significance of machine learning extends across various domains, including surveillance, medicine, a...
详细信息
Insider threat detection (ITD) presents a significant challenge in cybersecurity, particularly within large and complex organizations. Traditionally, ITD has been overshadowed by the focus of external threats, resulti...
详细信息
ISBN:
(纸本)9798350362480
Insider threat detection (ITD) presents a significant challenge in cybersecurity, particularly within large and complex organizations. Traditionally, ITD has been overshadowed by the focus of external threats, resulting in less attention and development in this critical area. Conventional ITD approaches often rely heavily on event-driven approaches. On top of that, researchers developed various rule-based methods to conquer the tasks. Based on that, we often ignore the intrinsic temporal relationships that are naturally built in between events that occur in different moments. For instance, we may easily understand events with causality such as one anomalous event followed by another specific event to complete a malicious action;however, may not be aware of events that occur around 9 am every morning during working hours. In our opinion, we attempt to re-consider the temporal behavior to extract the information hidden in cyberspace activities. Specifically, some effective sentence embeddings can assist us in providing informative internal representations to summarize temporal behaviors in the temporal activity sequences to make the right judgment on insider threat detection. In this paper, we propose a novel methodology for insider threat detection that emphasizes temporal relationship modeling on top of already-matured event sequence analysis to effectively catch insider threats. The proposed approach leverages contrastive sentence embeddings to learn users' intentions in sequences, followed by the deployment of a user-level and event-level Contrastive Learning (euCL) model to incorporate temporal behaviors with user behavior embeddings. To validate the proposed methodology, we conduct extensive analyses and experiments using the publicly available CERT dataset. The results demonstrate the effectiveness and robustness of the proposed method in detecting insider threats and identifying malicious scenarios, highlighting its potential for enhancing cybersecurity measur
Picture steganography plays a crucial role in secure communication by discreetly altering images for various purposes such as data authentication, privacy protection, and watermarking. However, traditional methods oft...
详细信息
The aim of this paper is to show the possibility of generating general semi-stable periodic orbits using genetic programming (GP). This concept is a GP design of a perturbation sequence that forces a defined dynamical...
详细信息
Growing concerns about the environmental consequences of floating debris in aquatic ecosystems have underscored the need for the development of efficient and automated methods for debris classification and monitoring....
详细信息
ISBN:
(纸本)9798350344509
Growing concerns about the environmental consequences of floating debris in aquatic ecosystems have underscored the need for the development of efficient and automated methods for debris classification and monitoring. This research paper presents a comprehensive investigation into the application of neural networks, specifically Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM), and CNN-LSTM architectures, for this purpose. Our study entails the creation of a diverse dataset encompassing various debris types and environmental conditions, ensuring its real-world relevance and generalizability. Thorough exploration is conducted of the three neural network models to evaluate their effectiveness in classifying floating debris from images captured in aquatic environments. CNNs are chosen for their established image recognition capabilities, while LSTMs are incorporated to capture sequential information and potential temporal dependencies within debris trajectories. The outcomes of our study unveil the strengths and limitations of CNN, CNN-LSTM, and LSTM architectures in the context of floating debris classification. Proposed work provides insights into the suitability of each model in various real-world scenarios, including riverine systems, oceans, and coastal regions. Furthermore, we discuss the implications of our findings for environmental monitoring, debris removal strategies, and policy development. Throughout our research, each model's performance is assessed in terms of accuracy, precision, recall, and F1-score, considering the unique challenges posed by the inherently noisy and dynamic nature of aquatic environments. This research contributes to the evolving body of knowledge regarding the application of neural networks in environmental monitoring, with a particular focus on the critical domain of floating debris classification. Our findings are expected to guide the development of automated systems that can aid in mitigating the environmental i
This project proposes the development of an advanced job applicants assessment and recruitment system that harnesses the power of artificial intelligence (AI) to streamline and enhance the hiring process. The system i...
详细信息
Unconstrained low-resolution face recognition is a very hard and demanding task in the field of computer vision. Due to the scarcity of abundant visual features in low-resolution (LR) images, it is very challenging to...
详细信息
In this paper we describe the concept of Liminality and how it manifests in Feature Spaces of Data during processes of Deep Learning, with particular focus on data during transition, transformation and other states wh...
详细信息
暂无评论