Model-driven engineering (MDE) copes with the complexity of software development by using the principles of separation of concerns and automatic transformation. In MDE, stakeholders from diverse domains collaborate co...
详细信息
In this paper the problem of testing decision making systems for MEC platforms was formulated. Methods and means of organizing the introduction of network delays as part of the emulation system of MEC platforms LWMECP...
详细信息
Presently, the global proliferation of Internet of Things (IoT) devices and applications has accelerated owing to their advantages in enhancing the business and industrial environment, as well as the daily lives of in...
详细信息
ISBN:
(纸本)9798350333794
Presently, the global proliferation of Internet of Things (IoT) devices and applications has accelerated owing to their advantages in enhancing the business and industrial environment, as well as the daily lives of individuals. Nevertheless, IoT devices are vulnerable to malevolent network traffic, which can lead to undesirable outcomes and disrupt the operation of IoT devices. Consequently, it is imperative to devise a screening method for network traffic to identify and categorize malicious activity and reduce its harmful effects. In this regard, the present study proposes a framework and thoroughly compares single and ensemble machine learning models that are using predictive analytics to detect and classify network activity in an IoT network. Specifically, our framework and models distinguish between normal and anomalous network activity. Furthermore, network traffic is classified into eight categories, normal, denial of service (DoS) attack, Scan attack, Data Type Probing, Malicious Operation, Malicious Control, Spying attack and Wrong Setup based attack. The special focus of this paper is in identifying privacy related attacks in comparison with main cybersecurity related ones. Several supervised machine learning models have been herein implemented to characterize their performance in detecting and classifying network activities for IoT Networks based on the ensemble learning framework as well as on the single learning machines framework. Moreover, classifiers based on the statistical learning theory framework are herein involved too, including hybrid Bayesian theory models, decision trees (DT) and the ordinal Learning Modelling approach. The statistical pattern recognition based models as well as all supervised learning machines models have been evaluated on a broad benchmark dataset for IoT attacks. Besides, an improved data engineering feature processing model has been applied to the dataset under consideration to improve the accuracy of all models under co
Change detection (CD) in remote sensing based on deep convolutional neural networks (CNNs) and transformers has played a crucial role in surface monitoring and resource development. However, the inadequate extraction ...
详细信息
Localisation of machines in harsh Industrial Internet of Things(IIoT)environment is necessary for various ***,a novel localisation algorithm is proposed for noisy range measurements in IIoT *** position of an unknown ...
详细信息
Localisation of machines in harsh Industrial Internet of Things(IIoT)environment is necessary for various ***,a novel localisation algorithm is proposed for noisy range measurements in IIoT *** position of an unknown machine device in the network is estimated using the relative distances between blind machines(BMs)and anchor machines(AMs).Moreover,a more practical and challenging scenario with the erroneous position of AM is considered,which brings additional uncertainty to the final position ***,the AMs selection algorithm for the localisation of BMs in the IIoT network is *** those AMs will participate in the localisation process,which increases the accuracy of the final location ***,the closed‐form expression of the proposed greedy successive anchorization process is derived,which prevents possible local convergence,reduces computation,and achieves Cramér‐Rao lower bound accuracy for white Gaussian measurement *** results are compared with the state‐of‐the‐art and verified through numerous simulations.
Blockchain technology is widely used to develop software systems in different industries such as finance, healthcare, supply chain management, data management, Internet of Things (IoT). To adopt blockchain, some criti...
详细信息
Human face detection from video sequences is a difficult problem in computer vision. Face detection is the process of determining the location of a face or faces in each frame of a video. Face detection in real-time v...
详细信息
Question Classification plays a vital role in identifying the accurate answer to any question, and is considered as a core component of Question Answering Systems. In Nepali Natural Language Processing, the area of Qu...
详细信息
Hidden Markov Models have proved to be a very significant tool for various time-series related problems, especially where context is important. One such problem is Part-of-speech tagging. The work uses a customized HM...
详细信息
Process discovery algorithms incorporating domain knowledge can have varying levels of user involvement. It ranges from fully automated algorithms to interactive approaches where the user makes critical decisions abou...
详细信息
暂无评论