Cybersecurity is crucial to protect network resources and reduce the risk of cyberattacks like denial of service (DOS) and file modification. Security tools like intrusion detection and prevention systems (IDS and IPS...
Cybersecurity is crucial to protect network resources and reduce the risk of cyberattacks like denial of service (DOS) and file modification. Security tools like intrusion detection and prevention systems (IDS and IPS), which work independently on network endpoints, struggle to distinguish between normal and anomalous network traffic in real-time, making cyberattack detection and prevention challenging. As a result, security information and event management (SIEM), which offers centralized network management, is utilized to gather and analyze logs from various endpoints on networks in order to identify threats in real time. This paper introduces a method integrating Wazuh and IDS tool capabilities to improve DOS detection and mitigation, and Wazuh file integrity monitoring (FIM) capabilities for real-time file modification detection. Wazuh monitors and evaluates network resource status centrally, while Snort and Suricata tools are used to monitor the network traffic on the monitored endpoint. After that, logs are sent to the Wazuh server for analysis and alerting. In addition, Wazuh is used to detect modifications to critical files, enabling early detection of malicious changes. The effectiveness of the suggested method is tested using a variety of DOS tools that are produced in real-time and by modifying important files. The experimental findings demonstrate that our method is effective in detecting and mitigating cyberattacks.
Power system fault analysis is a process that establishes the bus voltages and line currents when various fault types occur. Three-phase balanced faults and unbalanced faults are two categories of power system faults....
详细信息
ISBN:
(数字)9798350382693
ISBN:
(纸本)9798350382709
Power system fault analysis is a process that establishes the bus voltages and line currents when various fault types occur. Three-phase balanced faults and unbalanced faults are two categories of power system faults. Single line-to-ground, line-to-line, and double line-to-ground faults are three different types of unbalanced faults that can occur on transmission lines for power systems. Fault analysis is used to choose and set the proper protective devices and switchgear. Determining the bus voltages and line currents is critical while investigating power system issues. Numerous mathematical calculation techniques are shown in the process, which is challenging to do by hand. The calculation can be performed quickly on a computer using a Simulink created using MATLAB. However, an error occurs when inverting an extensive bus system's Y-bus to Z-bus in the conventional short circuit study; this paper offers a solution that is solved using “MATLAB SIMULINK” to reduce error.
The K-Nearest Neighbor (K-NN) algorithm is one of the most widely used algorithms for machine learning applications. Using K-NN algorithm on massively large data requires high computation power. This high computation ...
详细信息
Modelling languages are intensively used in paradigms like model-driven engineering to automate all tasks of the development process. These languages may have variants, in which case the need arises to deal with langu...
详细信息
Modelling languages are intensively used in paradigms like model-driven engineering to automate all tasks of the development process. These languages may have variants, in which case the need arises to deal with language families rather than with individual languages. However, specifying the syntax and semantics of each language variant separately in an enumerative way is costly, hinders reuse across variants, and may yield inconsistent semantics between variants. Hence, we propose a novel, modular and compositional approach to describing product lines of modelling languages. It enables the incremental definition of language families by means of modules comprising meta-model fragments, graph transformation rules, and rule extensions. Language variants are configured by selecting the desired modules, which entails the composition of a language meta-model and a set of rules defining its semantics. This paper describes: a theory for checking well-formedness, instantiability, and consistent semantics of all languages within the family;an implementation as an Eclipse plugin;and an evaluation reporting drastic specification size and analysis time reduction in comparison to an enumerative approach.
Neural network test cases are meant to exercise different reasoning paths in an architecture and used to validate the prediction outcomes. In this paper, we introduce "computational profiles" as vectors of n...
详细信息
Histogram Equalization is one of the most common algorithms used in image processing applications. Traditional software based histogram equalization using CPU is no longer sufficient for high-computation based real-ti...
详细信息
Recently, blockchain technology has been used to build private and secure internet of things (IoT) data markets and trading systems. Reputation of the trading parties is an important attribute that affect their profit...
详细信息
ISBN:
(纸本)9781665461986
Recently, blockchain technology has been used to build private and secure internet of things (IoT) data markets and trading systems. Reputation of the trading parties is an important attribute that affect their profitability and trading prosperity. However, current reputation systems are prone to malicious manipulation. Such an issue can be avoided by registering all reputation scores in the blockchain which guarantees trans-parency, encryption, privacy, and security. To this end, this paper proposes a blockchain-based reputation system where market players can maximize their utility while engaged in the IoT data ecosystem. We also propose an adaptive learning mechanism that allows the data providers and consumers to enhance their reputation and review credibility scores. We provide extensive experiments to ensure our system satisfies the feasibility, usability, and availability properties. These properties are essential for functional deployment in real IoT data markets.
In recent years, an increase in the electricity load at the General Electricity Company of Libya (GECOL) has led to power shortages during the peak summer season. And sometimes there was an acute shortage in the distr...
In recent years, an increase in the electricity load at the General Electricity Company of Libya (GECOL) has led to power shortages during the peak summer season. And sometimes there was an acute shortage in the distribution of electricity throughout the country. Due to the interruption of large generation units or transmission lines of the electric power grid. this paper aims to address the issue of electrical load demand forecasting by using the NARX tool on the MATLAB platform to train artificial neural networks (ANN). The forecasting of Benghazi’s electricity consumption is the main topic of this paper. In this work, deep learning is used for the first time to forecast overall energy demand and consumption in Benghazi. The real data acquired by the National Control Center GECOL supports the results that were achieved.
In this paper, we propose a new framework, CUDA DirectX 11 Interop, for the Saving Images Pipeline that can exceed current performance standards. Unity generates synthetic data to supplement the large amounts of train...
In this paper, we propose a new framework, CUDA DirectX 11 Interop, for the Saving Images Pipeline that can exceed current performance standards. Unity generates synthetic data to supplement the large amounts of training data required by neural networks. The Saving Images Pipeline saves synthetic data to disk, but is not optimized due to overhead costs. Current (Linear and Coroutines) and alternative (DirectX 11 and CUDA OpenGL Interop) solutions were evaluated in terms of execution times, image resolutions, and JPEG qualities. The DirectX 11 solution exhibited the best performance as it met the 40 ms baseline. Using CUDA Interoperability with the DirectX 11 solution creates a new framework, CUDA DirectX 11 Interop, that exceeds the performance of all solutions examined.
Mathematical modeling in the study of dynamic processes in biomedicine is currently widely used. The use of mathematical statistics and formal logic methods in the analysis of complex biomedical processes is especiall...
详细信息
暂无评论