Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication *** this paper,a text zero...
详细信息
Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication *** this paper,a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking(SFASCDW)is proposed for content authentication and tampering detection of English text.A first-level order of alphanumeric mechanism,based on hidden Markov model,is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed *** researcher uses the first-level order and alphanumeric mechanism of Markov model as a soft computing technique to analyze English ***,he extracts the features of the interrelationship among the contexts of the text,utilizes the extracted features as watermark information,and validates it later with the studied English text to detect any *** has been implemented using PHP with VS code *** robustness,effectiveness,and applicability of SFASCDW are proved with experiments involving four datasets of various lengths in random locations using the three common attacks,namely insertion,reorder,and *** SFASCDW was found to be effective and could be applicable in detecting any possible tampering.
The paper presents a scaled laboratory experimental model of ferroresonant circuit designed for detailed investigation of the ferroresonance phenomena. To enable accurate ferroresonance examination, the system is expa...
详细信息
In this paper, design and modeling of an all-optical 2×1 multiplexer based on 2D photonic crystals and artificial neural networks (ANNs) are presented. The proposed structure aims to maximize the difference betwe...
详细信息
Internet of Things(IoT)devices work mainly in wireless mediums;requiring different Intrusion Detection System(IDS)kind of solutions to leverage 802.11 header information for intrusion ***-specific traffic features wit...
详细信息
Internet of Things(IoT)devices work mainly in wireless mediums;requiring different Intrusion Detection System(IDS)kind of solutions to leverage 802.11 header information for intrusion ***-specific traffic features with high information gain are primarily found in data link layers rather than application layers in wired *** survey investigates some of the complexities and challenges in deploying wireless IDS in terms of data collection methods,IDS techniques,IDS placement strategies,and traffic data analysis *** paper’s main finding highlights the lack of available network traces for training modern machine-learning models against IoT specific ***,the Knowledge Discovery in Databases(KDD)Cup dataset is reviewed to highlight the design challenges of wireless intrusion detection based on current data attributes and proposed several guidelines to future-proof following traffic capture methods in the wireless network(WN).The paper starts with a review of various intrusion detection techniques,data collection methods and placement *** main goal of this paper is to study the design challenges of deploying intrusion detection system in a wireless *** detection system deployment in a wireless environment is not as straightforward as in the wired network environment due to the architectural *** this paper reviews the traditional wired intrusion detection deployment methods and discusses how these techniques could be adopted into the wireless environment and also highlights the design challenges in the wireless *** main wireless environments to look into would be Wireless Sensor Networks(WSN),Mobile Ad Hoc Networks(MANET)and IoT as this are the future trends and a lot of attacks have been targeted into these *** it is very crucial to design an IDS specifically to target on the wireless networks.
Genomic microarray databases encompass complex high dimensional gene expression samples. Imbalanced microarray datasets refer to uneven distribution of genomic samples among different contributed classes which can neg...
详细信息
Systematic management of all phases of the lifecycle of an industrial control system, recently referred to as operational technology or OT for short, ensures that the system is up to date, compliant with regulations a...
详细信息
During the development of control strategies for permanent magnet synchronous machines (PMSM) used in wind turbines, usage of wide range of simulation allows for more detailed, more safe and less expensive development...
详细信息
Non-Intrusive Load Monitoring (NILM) allows consumers to monitor appliances' power consumption without installing appliance-level sensors. NILM has become popular with the rapid deployment of smart energy meters. ...
详细信息
Because the amount of exchange hypersensitive data via the Internet is growing at an exponential rate, network and data security have recently been the most pressing worry. On the subject of data security, many approa...
详细信息
In this paper, we propose a multi-dimensional resource allocation scheme for Internet of Remote Things (IoRT) data collection in a high altitude platform (HAP)-assisted unmanned aerial vehicle (UAV) network. Consideri...
详细信息
暂无评论