With the rise of the Internet of Vehicles(IoV)and the number of connected vehicles increasing on the roads,Cooperative Intelligent Transportation systems(C-ITSs)have become an important area of *** the number of Vehic...
详细信息
With the rise of the Internet of Vehicles(IoV)and the number of connected vehicles increasing on the roads,Cooperative Intelligent Transportation systems(C-ITSs)have become an important area of *** the number of Vehicle to Vehicle(V2V)and Vehicle to Interface(V2I)communication links increases,the amount of data received and processed in the network also *** addition,networking interfaces need to be made more secure for which existing cryptography-based security schemes may not be ***,there is a need to augment them with intelligent network intrusion detection *** machine learning-based intrusion detection and anomaly detection techniques for vehicular networks have been proposed in recent ***,given the expected large network size,there is a necessity for extensive data processing for use in such anomaly detection *** learning solutions are lucrative options as they remove the necessity for feature ***,with the amount of vehicular network traffic increasing at an unprecedented rate in the C-ITS scenario,the need for deep learning-based techniques is all the more *** work presents three deep learning-based misbehavior classification schemes for intrusion detection in IoV networks using Long Short Term Memory(LSTM)and Convolutional Neural Networks(CNNs).The proposed Deep Learning Classification Engines(DCLE)comprise of single or multi-step classification done by deep learning models that are deployed on the vehicular edge *** data received by the Road Side Units(RSUs)is pre-processed and forwarded to the edge server for classifications following the three classification schemes proposed in this *** proposed classifiers identify 18 different vehicular behavior types,the F1-scores ranging from 95.58%to 96.75%,much higher than the existing *** running the classifiers on testbeds emulating edge servers,the prediction performance and prediction time comparison of
Python's popularity as an interpreted language, particularly among scientists and engineers, is due to its ease of use and flexibility, despite certain performance limitations. Enhancing Python for parallel progra...
详细信息
Social media,like Twitter,is a data repository,and people exchange views on global issues like the COVID-19 *** media has been shown to influence the low acceptance of *** work aims to identify public sentiments conce...
详细信息
Social media,like Twitter,is a data repository,and people exchange views on global issues like the COVID-19 *** media has been shown to influence the low acceptance of *** work aims to identify public sentiments concerning the COVID-19 vaccines and better understand the individual’s sensitivities and feelings that lead to *** work proposes a method to analyze the opinion of an individual’s tweet about the COVID-19 *** paper introduces a sigmoidal particle swarm optimization(SPSO)***,the performance of SPSO is measured on a set of 12 benchmark problems,and later it is deployed for selecting optimal text features and categorizing *** proposed method uses TextBlob and VADER for sentiment analysis,CountVectorizer,and term frequency-inverse document frequency(TF-IDF)vectorizer for feature extraction,followed by SPSO-based feature *** Covid-19 vaccination tweets dataset was created and used for training,validating,and *** proposed approach outperformed considered algorithms in terms of ***,we augmented the newly created dataset to make it balanced to increase performance.A classical support vector machine(SVM)gives better accuracy for the augmented dataset without a feature selection *** shows that augmentation improves the overall accuracy of tweet *** the augmentation performance of PSO and SPSO is improved by almost 7%and 5%,respectively,it is observed that simple SVMwith 10-fold cross-validation significantly improved compared to the primary dataset.
The ubiquity of the Internet plays a pivotal role in connecting individuals and facilitating easy access to various essential services. As of 2022, the International Telecommunication Union (ITU) reports that approxim...
详细信息
ISBN:
(纸本)9791188428120
The ubiquity of the Internet plays a pivotal role in connecting individuals and facilitating easy access to various essential services. As of 2022, the International Telecommunication Union (ITU) reports that approximately 5.3 billion people are connected to the internet, underscoring its widespread coverage and indispensability in our daily lives. This expansive coverage enables a myriad of services, including communication, e-banking, e-commerce, online social security access, medical reporting, education, entertainment, weather information, traffic monitoring, online surveys, and more. However, this open platform also exposes vulnerabilities to malicious users who actively seek to exploit weaknesses in the virtual domain, aiming to gain credentials, financial benefits, or reveal critical information through the use of malware. This constant threat poses a serious challenge in safeguarding sensitive information in cyberspace. To address this challenge, we propose the use of ensemble and deep neural network (DNN) based machine learning (ML) techniques to detect malicious intent packets before they can infiltrate or compromise systems and applications. Attackers employ various tactics to evade existing security systems, such as antivirus or intrusion detection systems, necessitating a robust defense mechanism. Our approach involves implementing an ensemble, a collection of diverse classifiers capable of capturing different attack patterns and better generalizing from highly relevant features, thus enhancing protection against a variety of attacks compared to a single classifier. Given the highly unbalanced dataset, the ensemble classifier effectively addresses this condition, and oversampling is also employed to minimize bias toward the majority class. To prevent overfitting, we utilize Random Forest (RF) and the dropout technique in the DNN. Furthermore, we introduce a DNN to assess its ability to recognize complex attack patterns and variations compared to the ens
Agriculture is the key source for many people's livelihoods and an important contributor to a country's economy. There is a huge demand to streamline the process in the field of agriculture by integrating Comp...
详细信息
Research on the visual system and its development is not only crucial for understanding how we see and interpret the environment from basic visual processing to complex perception but also aids in the development of t...
详细信息
The Internet of Things(IoT)is considered the next-gen connection network and is ubiquitous since it is based on the *** Detection System(IDS)determines the intrusion performance of terminal equipment and IoT communica...
详细信息
The Internet of Things(IoT)is considered the next-gen connection network and is ubiquitous since it is based on the *** Detection System(IDS)determines the intrusion performance of terminal equipment and IoT communication procedures from IoT environments after taking equivalent defence measures based on the identified *** this back-ground,the current study develops an Enhanced Metaheuristics with Machine Learning enabled Cyberattack Detection and Classification(EMML-CADC)model in an IoT *** aim of the presented EMML-CADC model is to detect cyberattacks in IoT environments with enhanced *** attain this,the EMML-CADC model primarily employs a data preprocessing stage to normalize the data into a uniform *** addition,Enhanced Cat Swarm Optimization based Feature Selection(ECSO-FS)approach is followed to choose the optimal feature ***,Mayfly Optimization(MFO)with Twin Support Vector Machine(TSVM),called the MFO-TSVM model,is utilized for the detection and classification of ***,the MFO model has been exploited to fine-tune the TSVM variables for enhanced *** performance of the proposed EMML-CADC model was validated using a benchmark dataset,and the results were inspected under several *** comparative study concluded that the EMML-CADC model is superior to other models under different measures.
Dance poses represent a complex human body-part movement, and express emotions and gesture. Dance pose classification is a challenging problem in computer vision. Convolutional Neural Networks (CNNs) have witnessed si...
详细信息
This paper introduces D-CIDE (Distributed Classroom Integrated Development Environment), a tool that is designed to improve student-teacher interactions in programming classes. D-CIDE’s main objective is to provide m...
详细信息
Supply chains are being used at scale within new industries, mainly in the financial sector and the cyber security risks emerging in this area have been on the rise. Given recent attack scenarios the mitigation strate...
详细信息
暂无评论