The rapid development and progress of artificial intelligence algorithms in the last decade has opened up many new possibilities and fields for its application. The field of human-computer interaction is not only not ...
详细信息
As global energy demand grows, renewable sources offer a key alternative to fossil fuels. However, integrating these sources into power grids presents challenges, especially with supply unpredictability. This paper de...
详细信息
Content-adaptive steganography has three rules that need to be fulfilled to maximize the performance of the cost function, thereby increasing resistance to steganalysis attacks. This study proposes a combination metho...
详细信息
A computer-aided language translation using a Machine translation (MT) is an application performed by computers (machines) that translates one natural language to another. There are many online language translation to...
详细信息
Edge computing is a network topology made up of three layers: Cloud Server Layer (CSL), Edge Server Layer (ESL), and Edge Device Layer (EDL). Therefore, it is vulnerable since the processing capacity of loT devices or...
详细信息
In histopathology image analysis, accurate segmentation of nuclei holds immense significance, particularly in the early detection and treatment of diseases like breast cancer. Nuclei segmentation is a fundamental but ...
详细信息
Traditional rule-based IntrusionDetection Systems(IDS)are commonly employed owing to their simple design and ability to detect known ***,as dynamic network traffic and a new degree of threats exist in IoT environments...
详细信息
Traditional rule-based IntrusionDetection Systems(IDS)are commonly employed owing to their simple design and ability to detect known ***,as dynamic network traffic and a new degree of threats exist in IoT environments,these systems do not perform well and have elevated false positive rates—consequently decreasing detection *** this study,we try to overcome these restrictions by employing fuzzy logic and machine learning to develop an Enhanced Rule-Based Model(ERBM)to classify the packets better and identify *** ERBM developed for this approach improves data preprocessing and feature selections by utilizing fuzzy logic,where three membership functions are created to classify all the network traffic features as low,medium,or high to remain situationally aware of the *** fuzzy logic sets produce adaptive detection rules by reducing data ***,for further classification,machine learning classifiers such as Decision Tree(DT),Random Forest(RF),and Neural Networks(NN)learn complex ways of attacks and make the detection process more precise.A thorough performance evaluation using different metrics,including accuracy,precision,recall,F1 Score,detection rate,and false-positive rate,verifies the supremacy of ERBM over classical *** extensive experiments,the ERBM enables a remarkable detection rate of 99%with considerably fewer false positives than the conventional *** the ability for uncertain reasoning with fuzzy logic and an adaptable component via machine learning solutions,the ERBM systemprovides a unique,scalable,data-driven approach to IoT intrusion *** research presents a major enhancement initiative in the context of rule-based IDS,introducing improvements in accuracy to evolving IoT threats.
Domain Generation Algorithms (DGA) Botnets represent a significant threat to network security due to their ability to mask Command and Control (C&C) communications with botmaster. Traditional detection methods lik...
详细信息
In the past few decades, the capabilities of hardware platforms designed for the development of specialized devices (such as mobile phones or embedded computers) have advanced tremendously. One significant consequence...
详细信息
In this paper we present a novel bilingual (Czech, English) dataset called ShadowSense developed for the purposes of word sense induction (WSI) evaluation. Unlike existing WSI datasets, ShadowSense is annotated by mul...
详细信息
暂无评论