The detection of community structures in complex networks has garnered significant attention in recent years. Given its NP-hardness, numerous evolutionary optimization-based approaches have been proposed. However, the...
详细信息
This paper proposed a model based on bidirectional Long Short-Term Memory (Bi-LSTM) and Bayesian optimization to detect different drones in different Scenarios. Six different drones in three distinct scenarios—cloudy...
详细信息
A d-regular graph X is called d-rainbow domination regular or d-RDR, if its d-rainbow domination number γrd(X) attains the lower bound n/2 for d-regular graphs, where n is the number of vertices. In the paper, two co...
详细信息
Software Defined Networks (SDN) face many security challenges today. A great deal of research has been done within the field of Intrusion Detection Systems (IDS) in these networks. Yet, numerous approaches still rely ...
详细信息
Software Defined Networks (SDN) face many security challenges today. A great deal of research has been done within the field of Intrusion Detection Systems (IDS) in these networks. Yet, numerous approaches still rely on deep learning algorithms, but these algorithms suffer from complexity in implementation, the need for high processing power, and high memory consumption. In addition to security issues, firstly, the number of datasets that are based on SDN protocols are very small. Secondly, the ones that are available encompass a variety of attacks in the network and do not focus on a single attack. For this reason, to introduce an SDN-based IDS with a focus on Distributed Denial of Service (DDoS) attacks, it is necessary to generate a DDoS-oriented dataset whose features can train a high-quality IDS. In this work, in order to address two important challenges in SDNs, in the first step, we generate three DDoS attack datasets based on three common and different network topologies. Then, in the second step, using the Convolutional Tsetlin Machine (CTM) algorithm, we introduce a lightweight IDS for DDoS attack dubbed "CTMBIDS," with which we implement an anomaly-based IDS. The lightweight nature of the CTMBIDS stems from its low memory consumption and also its interpretability compared to the existing complex deep learning models. The low usage of system resources for the CTMBIDS makes it an ideal choice for an optimal software that consumes the SDN controller’s least amount of memory. Also, in order to ascertain the quality of the generated datasets, we compare the empirical results of our work with the DDoS attacks of the KDDCup99 benchmark dataset as well. Since the main focus of this work is on a lightweight IDS, the results of this work show that the CTMBIDS performs much more efficiently than traditional and deep learning based machine learning algorithms. Furthermore, the results also show that in most datasets, the proposed method has relatively equal or better
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
Predicting haze is crucial in controlling air pollution to reduce its impact, especially on human health. Accurate prediction of extreme values is vital to raising public awareness of this issue and better understandi...
详细信息
Edge computing (EC) environments are increasingly essential in ensuring low latency and high throughput for modern applications and in smart cities. Scheduling applications in EC environments should be designed to add...
详细信息
This paper investigates the factors influencing cloud computing adoption in small and medium-sized enterprises (SMEs) through a systematic literature review. The analysis identified twelve key factors influencing the ...
详细信息
We utilize the unified approach and He’s semi-inverse method to derive novel stochastic optical solutions for the (2 + 1)-dimensional nonlinear Schrödinger equation (2D-NLSE) in the context of Itôcalculus. ...
详细信息
This paper explores the adoption of cloud computing and big data technologies in small and medium enterprises (SMEs), focusing on synthesizing key factors influencing adoption. By conducting a comprehensive literature...
详细信息
This paper explores the adoption of cloud computing and big data technologies in small and medium enterprises (SMEs), focusing on synthesizing key factors influencing adoption. By conducting a comprehensive literature review and analyzing theoretical frameworks such as the Technology Acceptance Model (TAM) and the Technology-Organization-Environment (TOE) framework, this study proposes a novel conceptual model tailored to the unique socio-economic context of SMEs in the MENA region. The methodology includes an analysis of 30 research articles, highlighting enablers and barriers to adoption. Key contributions include a taxonomy of factors and actionable insights for policymakers and practitioners. This research addresses gaps in existing studies by providing a region-specific perspective on cloud computing and big data technologies adoption for SMEs. This strong tendency towards services provided by cloud computing is very clear, and to shape their future IT, it's worth highlighting the existence of such technology. A synthesis of the literature on cloud computing adoption was presented in this paper classifying reviews based on factors that play an important role in taking the adoption decision incorporating the theoretical frameworks. Moreover, the relationship between big data and cloud computing has been explored. In addition to proposing a synthesized findings model, this paper includes various factors derived from the literature and related theoretical frameworks. In this paper we select research articles from broadly recognized research databases, as well as undertaking a comprehensive review of these selected articles focusing on the adoption of cloud computing and big data. It also includes a bibliography containing the most relevant publications in these domains, from 2011 to 2024. By examining 30 articles, the objectives of the paper are to analyze data derived from articles as well as to study the academic frameworks used in both developing and developed
暂无评论