An efficient visual aid is essential for visually impaired candidate. At the same instance it has to be simple, robust and cost effective. However, regardless of being expensive, it is challenging to incorporate high ...
详细信息
Recently, as messenger phishing has been occurring more frequently, the need for its detection has increased; however, datasets for messenger phishing detection are publicly unavailable. In this paper, we address the ...
详细信息
ISBN:
(数字)9798331510756
ISBN:
(纸本)9798331510763
Recently, as messenger phishing has been occurring more frequently, the need for its detection has increased; however, datasets for messenger phishing detection are publicly unavailable. In this paper, we address the data scarcity problem of the newly collected messenger phishing dataset by leveraging various types of pre-existing auxiliary phishing data. Experimental results demonstrate that the error rate decreased by up to 1.81 % and the F1 score improved by 7.35% when smishing and voice phishing data are used. These findings confirm that integrating heterogeneous phishing data can mitigate the data scarcity problem and enhance messenger phishing detection performance.
In this study, we introduce a new dataset specifically designed for detecting messenger phishing, an increasingly significant issue in cybercrime. To overcome the scarcity of labeled phishing data, we employ large lan...
详细信息
ISBN:
(数字)9798331510756
ISBN:
(纸本)9798331510763
In this study, we introduce a new dataset specifically designed for detecting messenger phishing, an increasingly significant issue in cybercrime. To overcome the scarcity of labeled phishing data, we employ large language models (LLMs) to generate synthetic data, thereby expanding the dataset and improving detection capabilities. Our experimental results show that a model trained exclusively on synthetic data performs comparably to those trained with labeled data. Furthermore, combining synthetic data with labeled data achieves superior F1 and accuracy scores compared to using labeled data only while reducing misclassification errors.
There are various traditional methods used for securing sensitive data, such as cryptography algorithms like AES-HMAC-SHA256, Twofish, and Chacha20. However, several studies showed that these cryptography algorithms s...
详细信息
ISBN:
(数字)9798350373974
ISBN:
(纸本)9798350373981
There are various traditional methods used for securing sensitive data, such as cryptography algorithms like AES-HMAC-SHA256, Twofish, and Chacha20. However, several studies showed that these cryptography algorithms suffer from security vulnerabilities. In this paper, we explore the use of a cryptography model based on a Deep Convolutional Autoencoder and we compare its performances to the cryptography algorithms. We report the results of a comparative study based on several metrics. We incorporate more nuanced metrics such as cosine similarity, entropy, Kendall and Spearman rate, and Mean Squared Error (MSE) for a comprehensive assessment of model performance and security, in addition to encryption and decryption time *** results obtained are very promising. Our model performs the best on two essential metrics, entropy and MSE. We obtain a decrypted file entropy of 8.01, compared to 7.99 for the three other standard models, with a very low MSE of 0.003, compared to 105.43 for AES, which remains the most efficient compared to the other algorithms.
Capturing data from dynamic processes through cross-sectional measurements is seen in many fields, such as computational biology. Trajectory inference deals with the challenge of reconstructing continuous processes fr...
详细信息
Automated grading of SQL queries is a challenging task due to the complexity of the language and the variety of acceptable solutions for a given problem. In this paper, we propose a novel approach that leverages deep ...
Automated grading of SQL queries is a challenging task due to the complexity of the language and the variety of acceptable solutions for a given problem. In this paper, we propose a novel approach that leverages deep learning with a BERT model to understand the syntax and semantics of SQL statements. By training BERT on a dataset of SQL queries and their corresponding grades, we create a model that can automatically grade new questions accurately. Our experiments demonstrate that the proposed methodology achieves high accuracy and consistency in grading SQL queries, outperforming existing state-of-the-art models. Furthermore, we provide an analysis of the model's explainability, revealing a new capability that can be extremely beneficial for understanding the decision-making process. Overall, our work demonstrates the potential of deep learning with BERT for improving the efficiency and accuracy of SQL query grading.
This research paper reports a very thin 2-port multiple-input multiple-output (MIMO) antenna with a small footprint of 14× 10× 0.58mm3. The proposed design works between the frequencies of 8.73 to 15.86 GHz....
详细信息
Nonlinear stream ciphers hold a vital position in ensuring confidentiality within contemporary cryptographic systems. In this context, we interduce a new approach known as the Adaptive Three Sub-Swarm PSO based on Reg...
Nonlinear stream ciphers hold a vital position in ensuring confidentiality within contemporary cryptographic systems. In this context, we interduce a new approach known as the Adaptive Three Sub-Swarm PSO based on Regrouping Strategy (ATSPSO-RG) to enhance the effectiveness of deciphering nonlinear stream ciphers, particularly those based on the Bruer generator system. Our method significantly reduces the complexity of cipher-only attacks, making the extraction of the correct secret key more efficient. The proposed system dividing the population size into three distinct subswarm, each incorporating its evolving strategies, namely the single score, four score, and nine score strategies. In the single score strategy, we employed, the traditional PSO evolving process. In the four scores strategy, we used three additional scores in addition to the single score of the traditional PSO to update the velocity and position of particles. lastly, the nine score strategy employed five scores to update the velocity and position, as well as the four scores of the previous score. To counteract the issue of premature convergence, we employ a regrouping strategy that periodically reinitializes the population. Experimental results vividly demonstrate the success of the ATSPSO-RG method in deciphering the Bruer cipher, even when dealing with a varying number of Linear Feedback Shift Registers (LFSRs) and polynomial degrees, spanning up to 15, and secret initial values extending up to 39. The method proves its efficiency in cryptanalysis, offering a potent solution for nonlinear stream ciphers with substantial key sizes while ensuring a reasonable timeframe for analysis. The research outcomes underscore the efficacy of ATSPSO-RG, highlighting both its accuracy and time efficiency in deciphering nonlinear stream ciphers.
Short message spam poses a significant threat for all mobile phone users, as it can act as an efficient tool for cyberattacks including spreading malware and phishing. Traditional anti-spam measures are only minimally...
Short message spam poses a significant threat for all mobile phone users, as it can act as an efficient tool for cyberattacks including spreading malware and phishing. Traditional anti-spam measures are only minimally effective against modern spammers. Intelligent analysis of the content to categorise the messages as Spam (unwanted and unsolicited) or Ham (useful messages) is therefore essential to safeguard the user from such attacks. Various artificial intelligence (AI) techniques are proving to be useful in the analysis of the content of such short messages to classify and filter spam. We have trained, validated and tested seven such AI techniques on the SMS spam collection dataset to identify the best model for designing and developing a content based classification system. Recurrent Neural Networks (RNN) have shown the highest performance metrics (Test Accuracy: 99.28%) and hence our proposed system includes a RNN model for classification. A web app of this system has also been deployed where a single SMS can be input and the designed system can classify it as Spam or Ham. The designed system is compared against existing systems and is found to be significantly better.
The Distributed Denial-of-Service (DDoS) attacks are one of the most critical threats to the stability and security of the Internet. With the increasing number of devices connected to the Internet, the frequency and s...
详细信息
ISBN:
(数字)9798350374131
ISBN:
(纸本)9798350374148
The Distributed Denial-of-Service (DDoS) attacks are one of the most critical threats to the stability and security of the Internet. With the increasing number of devices connected to the Internet, the frequency and severity of DDoS attacks are also increasing. To mitigate the impact of DDoS attacks, intelligent detection systems are becoming increasingly important. This paper reviews the recent literature on intelligent techniques, including machine learning (ML), Deep Learning (DL), and artificial intelligence (AI), for detecting DDoS attacks. We will provide an overview of the existing research in the field and analyse the trends in using time series data analysis for DDoS attack detection. A taxonomy and conceptual framework for DDoS mitigation are presented. This study highlights the use of several intelligent techniques for detecting DDoS attacks and evaluates the performance utilizing real datasets and also discusses future research directions in this field.
暂无评论