Sophisticated cyber threats are seen on Online Social Networks (OSNs) social media accounts automated to imitate human behaviours has an impactful effect on distorting public thoughts and opinions. OSNs are weaponized...
详细信息
The cybersecurity landscape is increasingly challenged by the growing digital footprint and the sophistication of cyber threats, necessitating experts to stay updated and extract actionable insights from a deluge of C...
详细信息
In the digital age, the proliferation of cyber threats necessitates advanced cybersecurity solutions. This paper introduces 'Bluff,' an innovative cybersecurity platform designed to enhance intrusion preventio...
详细信息
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma...
详细信息
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)may be vulnerable to a broad range of attacks(e.g.,eavesdropping and side-channel attacks).Hence,there have been attempts to design biometric-based authentication solutions,which rely on physiological and behavioral *** characteristics need continuous monitoring and specific environmental settings,which can be challenging to implement in ***,we can also leverage Artificial Intelligence(AI)in the extraction and classification of physiological characteristics from IoT devices processing to facilitate ***,we review the literature on the use of AI in physiological characteristics recognition pub-lished after *** use the three-layer architecture of the IoT(i.e.,sensing layer,feature layer,and algorithm layer)to guide the discussion of existing approaches and their *** also identify a number of future research opportunities,which will hopefully guide the design of next generation solutions.
Group testing is a well-studied approach for identifying defective items among a large amount of items by conducting a relatively small number of tests on pools of items. In this paper, we propose a novel method for g...
详细信息
Advances in algorithmic studies have been made recently, especially in the area of finding the shortest path. Despite taking a greedy approach, the Dijkstra algorithm is well recognized for its efficacy and has establ...
详细信息
Recently, the Honey Badger Algorithm (HBA) was proposed as a metaheuristic algorithm. Honey badger hunting behaviour inspired the development of this algorithm. In the exploitation phase, HBA performs poorly and stagn...
详细信息
Tuberculosis (TB) has been known as the top two murdering disease worldwide after HIV/AIDS. Indonesia is the second country with the highest number of tuberculosis. One of the reasons for the high number of cases is t...
详细信息
When it comes to smart healthcare business systems,network-based intrusion detection systems are crucial for protecting the system and its networks from malicious network *** protect IoMT devices and networks in healt...
详细信息
When it comes to smart healthcare business systems,network-based intrusion detection systems are crucial for protecting the system and its networks from malicious network *** protect IoMT devices and networks in healthcare and medical settings,our proposed model serves as a powerful tool for monitoring IoMT *** study presents a robust methodology for intrusion detection in Internet of Medical Things(IoMT)environments,integrating data augmentation,feature selection,and ensemble learning to effectively handle IoMT data *** rigorous preprocessing,including feature extraction,correlation removal,and Recursive Feature Elimi-nation(RFE),selected features are standardized and reshaped for deep learning *** using the BAT algorithm enhances dataset *** deep learning models,Transformer-based neural networks,self-attention Deep Convolutional Neural Networks(DCNNs),and Long Short-Term Memory(LSTM)networks,are trained to capture diverse data *** predictions form a meta-feature set for a subsequent meta-learner,which combines model *** classifiers validate meta-learner features for broad algorithm *** comprehensive method demonstrates high accuracy and robustness in IoMT intrusion *** were conducted using two datasets:the publicly available WUSTL-EHMS-2020 dataset,which contains two distinct categories,and the CICIoMT2024 dataset,encompassing sixteen *** results showcase the method’s exceptional performance,achieving optimal scores of 100%on the WUSTL-EHMS-2020 dataset and 99%on the CICIoMT2024.
In recent decades, obtaining energy from wind, solar, and hydro energy has brought hope for a sustainable future. Machine learning (ML) significantly impacts the field of energy systems. ML techniques have emerged as ...
详细信息
暂无评论