Clustering algorithms have been widely studied in many scientific areas, such as data mining, knowledge discovery, bioinformatics and machine learning. A density-based clustering algorithm, called density peaks (DP), ...
详细信息
Breast Cancer is a global health concern, emphasizing the crucial importance of its early detection in improving patient treatment. This is especially true for the most frequently diagnosed type of breast cancer, Inva...
详细信息
Nowadays, the DHCP starvation attack is a crucial attack that denied the services for the legitimate network user where the attacker mainly occupies all the IP addresses in the DHCP server pool. Most of the existing s...
Nowadays, the DHCP starvation attack is a crucial attack that denied the services for the legitimate network user where the attacker mainly occupies all the IP addresses in the DHCP server pool. Most of the existing studies proposed ICMP (Internet Control Message Protocol) and the ARP (Address Resolution Protocol) based techniques to detect the DHCP starvation attack. However, the ICMP-based detection is ineffective if the client has an active host-based firewall that blocks the ICMP ECHO REQUEST, while the ARP-based detection does not work for DHCP networks separated by a DHCP relay agent and works only within the same or local network. Therefore, the objective of this research is to propose an effective technique to detect DHCP starvation attack detection through port scanning to address the limitations of ICMP and ARP-based detection methods. To attain this objective, this study first highlights the limitations of existing detection methods demonstrating insightful facts. Secondly, the study proposed a port scan-based DHCP starvation attack detection method for local and remote (relay) DHCP networks. Finally, the effectiveness and validation of the proposed techniques were demonstrated using the Multivendor Network Emulation Software (EVE-NG). The study showed that the proposed port scanning-based technique could accurately detect the DHCP starvation attack while overcoming the limitations of the ICMP and ARP techniques.
Secure hash functions are widely used in cryptographic algorithms to secure against diverse attacks. A one-way secure hash function is used in the various research fields to secure, for instance, blockchain. Notably, ...
详细信息
From the perspective of mobile robot vision, to facilitate secure and seamless interactions between the robot and its environment, it is paramount to attain precise and metic-ulous distance estimation between the robo...
详细信息
ISBN:
(数字)9798331507022
ISBN:
(纸本)9798331507039
From the perspective of mobile robot vision, to facilitate secure and seamless interactions between the robot and its environment, it is paramount to attain precise and metic-ulous distance estimation between the robot and the detected entities. Moreover, in the absence of GPUs, mobile robots are compelled to rely solely on CPU resources to manage vision-related tasks and other operational imperatives. To address the challenges above, we focused on reducing CPU usage in the vision system and analyzing distance estimation accuracy in two scenarios: leveraging RGB-D and RGB cameras. We executed real-time object detection targeting humans utilizing YOLOv8 Nano, subsequently undertaking a comparative analysis between the distance estimates derived through monocular dept. estimation using a MobileNetV2 model, trained on the KITTI dataset, and the distance measurements obtained from RGB-D cameras. Additionally, we optimized the deep learning models to reduce CPU usage, employing a hardware-specific technique, OpenVINO conversion, and both a hardware-specific and a hardware-agnostic strategy, Post-Training Quantization (PTQ). Consequently, we reduced CPU utilization by approximately 4.62% in the RGB-D scenario and 5.32% in the RGB scenario.
Glaucoma is one of the foremost causes that result in irreversible blindness. World Health Organisation (WHO) has estimated that around 4.5 million people are blind due to glaucoma. This vast number is because more th...
详细信息
Smart cities have marked an incessant push to modernize technologies for easing citizens. Smarter manholes and planning the associated logistics have become a crucial component for assisting city authorities while coi...
详细信息
As the world navigates the COVID-19 pandemic, the surge in waste generation, the varied composition of waste, and its subsequent management has presented several challenges to many communities. Waste management techni...
详细信息
Bitcoin is a decentralized digital currency that was intro- duced in 2009 and since then, has become increasingly popular as one of the most known and highly valued currencies. Contributing factors to its rise include...
详细信息
Green Vehicular Ad-hoc Networks (VANETs) are gaining significance in smart mobility because of growing concerns about the environment. The research introduces a novel method for managing traffic in such networks by co...
详细信息
暂无评论