In this paper, we propose two self-adaptive extragradient-like algorithms for solving pseudomonotone variational inequalities. We consider two cases: the mapping is Lipschitz continuous (with unknown modulus) and is n...
详细信息
Breast cancer is one of the common cancer deaths in women worldwide. Early detection is the key to reduce the mortality rate. Clinical trials have shown that computer aided systems (CAD) have improved the accuracy of ...
详细信息
The challenge of bankruptcy prediction, critical for averting financial sector losses, is amplified by the prevalence of imbalanced datasets, which often skew prediction models. Addressing this, our study introduces t...
详细信息
Abnormal event detection in video surveillance is critical for security, traffic management, and industrial monitoring applications. This paper introduces an innovative methodology for anomaly detection in video data,...
详细信息
This work introduces an intrusion detection system (IDS) tailored for industrial internet of things (IIoT) environments based on an optimized convolutional neural network (CNN) model. The model is trained on a dataset...
详细信息
As the amount of data continues to grow rapidly,the variety of data produced by applications is becoming more affluent than *** computing is the best technology evolving today to provide multi-services for the mass an...
详细信息
As the amount of data continues to grow rapidly,the variety of data produced by applications is becoming more affluent than *** computing is the best technology evolving today to provide multi-services for the mass and variety of *** cloud computing features are capable of processing,managing,and storing all sorts of *** data is stored in many high-end nodes,either in the same data centers or across many data centers in cloud,performance issues are still *** cloud replication strategy is one of best solutions to address risk of performance degradation in the cloud *** real challenge here is developing the right data replication strategy with minimal data movement that guarantees efficient network usage,low fault tolerance,and minimal replication *** key problem discussed in this research is inefficient network usage discovered during selecting a suitable data center to store replica copies induced by inadequate data center selection ***,to mitigate the issue,we proposed Replication Strategy with a comprehensive Data Center Selection Method(RS-DCSM),which can determine the appropriate data center to place replicas by considering three key factors:Popularity,space availability,and *** proposed RS-DCSM was simulated using CloudSim and the results proved that data movement between data centers is significantly reduced by 14%reduction in overall replication frequency and 20%decrement in network usage,which outperformed the current replication strategy,known as Dynamic Popularity aware Replication Strategy(DPRS)algorithm.
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
Academic information service is the most critical factor that must be considered in a university. Service quality is an important indicator affecting all academics’ satisfaction and loyalty. Improvement of informatio...
详细信息
This paper proposes a novel framework to detect cyber-attacks using Machine Learning coupled with User Behavior *** framework models the user behavior as sequences of events representing the user activities at such a ...
详细信息
This paper proposes a novel framework to detect cyber-attacks using Machine Learning coupled with User Behavior *** framework models the user behavior as sequences of events representing the user activities at such a *** represented sequences are thenfitted into a recurrent neural network model to extract features that draw distinctive behavior for individual ***,the model can recognize frequencies of regular behavior to profile the user manner in the *** subsequent procedure is that the recurrent neural network would detect abnormal behavior by classifying unknown behavior to either regu-lar or irregular *** importance of the proposed framework is due to the increase of cyber-attacks especially when the attack is triggered from such sources inside the *** detecting inside attacks are much more challenging in that the security protocols can barely recognize attacks from trustful resources at the network,including ***,the user behavior can be extracted and ultimately learned to recognize insightful patterns in which the regular patterns reflect a normal network workfl*** contrast,the irregular patterns can trigger an alert for a potential *** framework has been fully described where the evaluation metrics have also been *** experimental results show that the approach performed better compared to other approaches and AUC 0.97 was achieved using RNN-LSTM *** paper has been concluded with pro-viding the potential directions for future improvements.
The Internet of Things (IoT) is a rapidly growing network of devices that can communicate with each other and with cloud-based services. These devices generate vast amounts of data that can be used to provide valuable...
详细信息
The Internet of Things (IoT) is a rapidly growing network of devices that can communicate with each other and with cloud-based services. These devices generate vast amounts of data that can be used to provide valuable insights into user behavior, environmental conditions, and other important factors. However, as this data is collected and processed by cloud-hosted services, there is a growing concern about privacy and security. Without adequate protection, sensitive information could be exposed to hackers or other malicious actors, putting both individuals and organizations at risk. To address this challenge, real-time privacy-preserving techniques can be used to protect IoT data without compromising its value. This paper introduces an efficient Real-time privacy-preserving scheme (RT-PPS) for cloud-hosted IoT data. RT-PPS employs multi-authority attribute-based encryption on a hybrid cloud environment to keep data secure and private, while still allowing it to be processed and analyzed by cloud-hosted services. RT-PPS has efficient response time and resource consumption, which gives it the ability to handle a huge number of concurrent users at the same time without notable delay. The proposed RT-PPS has been validated through extensive experimental evaluation on a variety of configurations. Moreover, the proposed scheme has been computationally compared with the state-of-the-artwork. RT-PPS has shown excellent performance, effectiveness, and efficiency. The RT-PPS encryption time for a 1 GB dataset while considering 1024 slices is approximately 1000 ms. Also, the RT-PPS decryption time for a 1 GB ciphertext while considering 1024 slices are approximately 235 ms. Finally, RT-PPS is proven secure against any polynomial-time attacks and their variations that have at most a negligible advantage in the introduced security model. Moreover compared to most of the state-of-the-artwork, RT-PPS reduced the ciphertext size and lowered the computations in the encryption, key g
暂无评论