Early attack detection is essential to ensure the security of complex networks,especially those in critical *** is particularly crucial in networks with multi-stage attacks,where multiple nodes are connected to extern...
详细信息
Early attack detection is essential to ensure the security of complex networks,especially those in critical *** is particularly crucial in networks with multi-stage attacks,where multiple nodes are connected to external sources,through which attacks could enter and quickly spread to other network *** attack graphs(BAGs)are powerful models for security risk assessment and mitigation in complex networks,which provide the probabilistic model of attackers’behavior and attack progression in the *** attack detection techniques developed for BAGs rely on the assumption that network compromises will be detected through routine monitoring,which is unrealistic given the ever-growing complexity of *** paper derives the optimal minimum mean square error(MMSE)attack detection and monitoring policy for the most general form of *** exploiting the structure of BAGs and their partial and imperfect monitoring capacity,the proposed detection policy achieves the MMSE optimality possible only for linear-Gaussian state space models using Kalman *** adaptive resource monitoring policy is also introduced for monitoring nodes if the expected predictive error exceeds a user-defined *** and efficient matrix-form computations of the proposed policies are provided,and their high performance is demonstrated in terms of the accuracy of attack detection and the most efficient use of available resources using synthetic Bayesian attack graphs with different topologies.
This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)*** steganography,a technique of embedding hidden information in digital photographs,should ideally ac...
详细信息
This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)*** steganography,a technique of embedding hidden information in digital photographs,should ideally achieve the dual purposes of maximum data hiding and maintenance of the integrity of the cover media so that it is least *** contemporary methods of steganography are at best a compromise between these *** this paper,we present our approach,entitled Ant Colony Optimization(ACO)-Least Significant Bit(LSB),which attempts to optimize the capacity in steganographic *** approach makes use of a grayscale cover image to hide the confidential data with an additional bit pair per byte,both for integrity verification and the file checksumof the secret *** approach encodes confidential information into four pairs of bits and embeds it within uncompressed grayscale *** ACO algorithm uses adaptive exploration to select some pixels,maximizing the capacity of data embedding whileminimizing the degradation of visual *** evaporation is introduced through iterations to avoid stagnation in solution *** levels of pheromone are modified to reinforce successful pixel *** results obtained through the ACO-LSB method reveal that it clearly improves image steganography capabilities by providing an increase of up to 30%in the embedding capacity compared with traditional approaches;the average Peak Signal to Noise Ratio(PSNR)is 40.5 dB with a Structural Index Similarity(SSIM)of *** approach also demonstrates very high resistance to detection,cutting down the rate by 20%.Implemented in MATLAB R2023a,the model was tested against one thousand publicly available grayscale images,thus providing robust evidence of its effectiveness.
In the construction industry,to prevent accidents,non-destructive tests are necessary and *** impedance tomography is a new technology in non-invasive imaging in which the image of the inner part of conductive bodies ...
详细信息
In the construction industry,to prevent accidents,non-destructive tests are necessary and *** impedance tomography is a new technology in non-invasive imaging in which the image of the inner part of conductive bodies is reconstructed by the arrays of external electrodes that are connected on the periphery of the *** equipment is cheap,fast,and edge *** this imaging method,the image of electrical conductivity distribution(or its opposite;electrical impedance)of the internal parts of the target object is *** image reconstruction process is performed by injecting a precise electric current to the peripheral boundaries of the object,measuring the peripheral voltages induced from it and processing the collected *** an electrical impedance tomography system,the voltages measured in the peripheral boundaries have a non-linear equation with the electrical conductivity *** paper presents a cheap electrical Impedance Tomography(EIT)instrument for detecting impurities in the concrete.A voltage-controlled current source,a micro-controller,a set of multiplexers,a set of electrodes,and a personal computer constitute the structure of the *** conducted tests on concrete with impurities show that the designed EIT system can reveal impurities with a good accuracy in a reasonable time.
The fast growth in Internet-of-Vehicles(IoV)applications is rendering energy efficiency management of vehicular networks a highly important *** of the existing models are failing to handle the demand for energy conser...
详细信息
The fast growth in Internet-of-Vehicles(IoV)applications is rendering energy efficiency management of vehicular networks a highly important *** of the existing models are failing to handle the demand for energy conservation in large-scale heterogeneous *** on Large Energy-Aware Fog(LEAF)computing,this paper proposes a new model to overcome energy-inefficient vehicular networks by simulating large-scale network *** main inspiration for this work is the ever-growing demand for energy efficiency in IoV-most particularly with the volume of generated data and connected *** proposed LEAF model enables researchers to perform simulations of thousands of streaming applications over distributed and heterogeneous *** the possible reasons is that it provides a realistic simulation environment in which compute nodes can dynamically join and leave,while different kinds of networking protocols-wired and wireless-can also be *** novelty of this work is threefold:for the first time,the LEAF model integrates online decision-making algorithms for energy-aware task placement and routing strategies that leverage power usage traces with efficiency optimization in *** existing fog computing simulators,data flows and power consumption are modeled as parameterizable mathematical equations in LEAF to ensure scalability and ease of analysis across a wide range of devices and *** results of evaluation show that LEAF can cover up to 98.75%of the distance,with devices ranging between 1 and 1000,showing significant energy-saving potential through A wide-area network(WAN)usage *** findings indicate great promise for fog computing in the future-in particular,models like LEAF for planning energy-efficient IoV infrastructures.
VPNs are vital for safeguarding communication routes in the continually changing cybersecurity ***,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorizeV...
详细信息
VPNs are vital for safeguarding communication routes in the continually changing cybersecurity ***,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorizeVPNnetwork *** present a novelVPNnetwork traffic flowclassificationmethod utilizing Artificial Neural Networks(ANN).This paper aims to provide a reliable system that can identify a virtual private network(VPN)traffic fromintrusion attempts,data exfiltration,and denial-of-service *** compile a broad dataset of labeled VPN traffic flows from various apps and usage ***,we create an ANN architecture that can handle encrypted communication and distinguish benign from dangerous *** effectively process and categorize encrypted packets,the neural network model has input,hidden,and output *** use advanced feature extraction approaches to improve the ANN’s classification accuracy by leveraging network traffic’s statistical and behavioral *** also use cutting-edge optimizationmethods to optimize network characteristics and *** suggested ANN-based categorization method is extensively tested and *** show the model effectively classifies VPN traffic *** also show that our ANN-based technique outperforms other approaches in precision,recall,and F1-score with 98.79%*** study improves VPN security and protects against new *** VPNtraffic flows effectively helps enterprises protect sensitive data,maintain network integrity,and respond quickly to security *** study advances network security and lays the groundwork for ANN-based cybersecurity solutions.
The droop-free control adopted in microgrids has been designed to cope with global power-sharing goals,i.e.,sharing disturbance mitigation among all controllable assets to even their ***,limited by neighboring communi...
详细信息
The droop-free control adopted in microgrids has been designed to cope with global power-sharing goals,i.e.,sharing disturbance mitigation among all controllable assets to even their ***,limited by neighboring communication,the time-consuming peer-to-peer coordination of the droopfree control slows down the nodal convergence to global consensus,reducing the power-sharing efficiency as the number of nodes *** this end,this paper first proposes a local power-sharing droop-free control scheme to contain disturbances within nearby nodes,in order to reduce the number of nodes involved in the coordination and accelerate the convergence speed.A hybrid local-global power-sharing scheme is then put forward to leverage the merits of both schemes,which also enables the autonomous switching between local and global power-sharing modes according to the system *** guidance for key control parameter designs is derived via the optimal control methods,by optimizing the power-sharing distributions at the steady-state consensus as well as along the dynamic trajectory to *** system stability of the hybrid scheme is proved by the eigenvalue analysis and Lyapunov direct ***,simulation results validate that the proposed hybrid local-global power-sharing scheme performs stably against disturbances and achieves the expected control performance in local and global power-sharing modes as well as mode ***,compared with the classical global power-sharing scheme,the proposed scheme presents promising benefits in convergence speed and scalability.
Distance and size estimation of objects of interests is an inevitable task for many navigation and obstacle avoidance algorithms mainly used in autonomus and robotic systems. Stereo vision systems, inspired by human v...
详细信息
Research has demonstrated the positive influence of Undergraduate Research Experience (URE) programs in Science, Technology, engineering, and Mathematics (STEM) on students' educational journey and their developme...
详细信息
In analyzing phenomena around us, clustering is among the most commonly used techniques in machine learning for comparing, and categorizing them into different groups based on intrinsic features. One of the main chall...
详细信息
The increasing penetration of renewable energy resources with highly fluctuating outputs has placed increasing concern on the accuracy and timeliness of electric power system state estimation(SE).Meanwhile,we note tha...
详细信息
The increasing penetration of renewable energy resources with highly fluctuating outputs has placed increasing concern on the accuracy and timeliness of electric power system state estimation(SE).Meanwhile,we note that only a fraction of system states fluctuate at the millisecond level and require to be *** such,refreshing only those states with significant variation would enhance the computational efficiency of SE and make fast-continuous update of states ***,this is difficult to achieve with conventional SE methods,which generally refresh states of the entire system every 4–5 *** this context,we propose a local hybrid linear SE framework using stream processing,in which synchronized measurements received from phasor measurement units(PMUs),and trigger/timingmode measurements received from remote terminal units(RTUs)are used to update the associated local ***,the measurement update process efficiency and timeliness are enhanced by proposing a trigger measurement-based fast dynamic partitioning algorithm for determining the areas of the system with states requiring *** particular,non-iterative hybrid linear formulations with both RTUs and PMUs are employed to solve the local SE *** timeliness,accuracy,and computational efficiency of the proposed method are demonstrated by extensive simulations based on IEEE 118-,300-,and 2383-bus systems.
暂无评论