The continuous iteration of consumer electronics has significantly promoted the development of medical devices, which has enabled the collection of large amounts of heterogeneous medical data. These data are offloaded...
详细信息
Many network middleboxes have been deployed to perform deep packet inspection (DPI) over packet payloads. However, such middleboxes cannot accomplish their tasks when the traffic is encrypted. BlindBox (SIGCOMM 2015) ...
详细信息
This research investigates the optimization of hyperparameters in Convolutional Neural Networks (CNNs) to enhance the performance of Network Intrusion Detection Systems (NIDS). Four distinct optimization techniques, i...
详细信息
Next Point-of-Interest (POI) recommendation has become a crucial task in Location-Based Social Networks (LBSNs), which provide personalized recommendations by predicting the user’s next check-in locations. Commonly u...
详细信息
Healthcare networks face significant cybersecurity threats due to their extensive interconnectivity, with Address Resolution Protocol (ARP) spoofing posing a major risk to the confidentiality and integrity of medical ...
详细信息
ISBN:
(数字)9798331523657
ISBN:
(纸本)9798331523664
Healthcare networks face significant cybersecurity threats due to their extensive interconnectivity, with Address Resolution Protocol (ARP) spoofing posing a major risk to the confidentiality and integrity of medical data. ARP spoofing is a Man-in-the-Middle (MITM) attack where an attacker sends falsified ARP messages to associate their MAC address with the IP address of a legitimate device, enabling unauthorized interception or manipulation of network traffic. In this paper, we propose an LSTM-based detection model designed to effectively identify ARP spoofing attacks in healthcare environments. Unlike traditional methods that rely on static markers at fixed time intervals, the LSTM model leverages temporal dependencies in network traffic, enhancing detection accuracy and adaptability to evolving attack patterns. Experimental results based on the CICIoMT dataset 2024 demonstrate that the proposed model achieves a detection accuracy of 98.5%, significantly outperforming conventional approaches. These findings highlight the effectiveness of LSTM networks in mitigating ARP spoofing threats, offering a scalable solution for securing healthcare networks.
Emerging evidence indicates that splicing factors mediate the close link between transcription and splicing. However, the mechanisms underlying this coupling remain unclear. U1 small nuclear ribonucleoprotein particle...
详细信息
Recently, a new concept called multiplicative differential was introduced by Ellingsen et al. [7]. As an extension of the differential uniformity, it is theoretically appealing to determine the properties of c-differe...
Recently, a new concept called multiplicative differential was introduced by Ellingsen et al. [7]. As an extension of the differential uniformity, it is theoretically appealing to determine the properties of c-differential uniformity and the corresponding c-differential spectrum. In this paper, based on certain quadratic character sums and two special elliptic curves over $$\mathbb {F}_p$$ , the $$(-1)$$ -differential spectra of the following two classes of power functions over $$\mathbb {F}_{p^n}$$ is completely determined: (1) $$f_1(x)=x^{\frac{p^n+3}{2}}$$ , where $$p>3$$ and $$p\equiv 3\pmod 4$$ ; (2) $$f_2(x)=x^{p^n-3}$$ , where $$p>3$$ . The obtained result shows that the $$(-1)$$ -differential spectra of $$f_1(x)$$ and $$f_2(x)$$ can be expressed explicitly in terms of n. Moreover, an upper bound of the c-differential uniformity of $$f_2(x)$$ is given.
Mobile Edge computing (MEC) offers low-latency and high-bandwidth support for Internet-of-Vehicles (IoV) applications. However, due to high vehicle mobility and finite communication coverage of base stations, it is ha...
详细信息
3D anomaly detection (AD) is prominent but difficult due to lacking a unified theoretical foundation for preprocessing design. We establish the Fence Theorem, formalizing preprocessing as a dual-objective semantic iso...
详细信息
Accurate prediction of molecular toxicity is vital for drug development. Most mainstream methods rely on fingerprints or graph-based feature extraction, the emergence of large language models (LLMs) offers new prospec...
详细信息
暂无评论