In the modern digital age, data security stands as a very important priority. The increasing need for lightweight devices and their resource-constrained environments calls for certain cryptographic solutions that can ...
详细信息
One of the primary problems in military surveillance systems is the safety of the visual data gathered by the sensor nodes installed in the different areas of the Visual sensor network and the remotely operated device...
详细信息
Virtual characters are controlled by artificial intelligence in video games and movies. Controlling these characters when they are surrounded by people is known as crowd simulation. In this work, we propose to employ ...
详细信息
Diabetes has become one of the significant reasons for public sickness and death in worldwide. By 2019, diabetes had affected more than 463 million people worldwide. According to the International Diabetes Federation ...
详细信息
Agricultural futures markets play a pivotal role in global trade, enabling producers, consumers, and investors to manage risks and capitalize on market opportunities. Accurate prediction of future exports is crucial f...
详细信息
Urban mobility is increasingly challenged by traffic congestion, leading to inefficiencies, environmental harm, and economic losses. This research presents an intelligent traffic control system that leverages cloud co...
详细信息
Online social networks are becoming more and more popular, according to recent trends. The user's primary concern is the secure preservation of their data and privacy. A well-known method for preventing individual...
详细信息
The Metaverse depicts a parallel digitalized world where virtuality and reality are *** has economic and social systems like those in the real world and provides intelligent services and *** this paper,we introduce th...
详细信息
The Metaverse depicts a parallel digitalized world where virtuality and reality are *** has economic and social systems like those in the real world and provides intelligent services and *** this paper,we introduce the Metaverse from a new technology perspective,including its essence,corresponding technical framework,and potential technical ***,we analyze the essence of the Metaverse from its etymology and point out breakthroughs promising to be made in time,space,and contents of the Metaverse by citing Maslow's Hierarchy of ***,we conclude four pillars of the Metaverse,named ubiquitous connections,space convergence,virtuality and reality interaction,and human-centered communication,and establish a corresponding technical ***,we envision open issues and challenges of the Metaverse in the technical *** work proposes a new technology perspective of the Metaverse and will provide further guidance for its technology development in the future.
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received c...
详细信息
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received considerable attention in transmitting data and ensuring data confidentiality among cloud servers and users. Various traditional image retrieval techniques regarding security have developed in recent years but they do not apply to large-scale environments. This paper introduces a new approach called Triple network-based adaptive grey wolf (TN-AGW) to address these challenges. The TN-AGW framework combines the adaptability of the Grey Wolf Optimization (GWO) algorithm with the resilience of Triple Network (TN) to enhance image retrieval in cloud servers while maintaining robust security measures. By using adaptive mechanisms, TN-AGW dynamically adjusts its parameters to improve the efficiency of image retrieval processes, reducing latency and utilization of resources. However, the image retrieval process is efficiently performed by a triple network and the parameters employed in the network are optimized by Adaptive Grey Wolf (AGW) optimization. Imputation of missing values, Min–Max normalization, and Z-score standardization processes are used to preprocess the images. The image extraction process is undertaken by a modified convolutional neural network (MCNN) approach. Moreover, input images are taken from datasets such as the Landsat 8 dataset and the Moderate Resolution Imaging Spectroradiometer (MODIS) dataset is employed for image retrieval. Further, the performance such as accuracy, precision, recall, specificity, F1-score, and false alarm rate (FAR) is evaluated, the value of accuracy reaches 98.1%, the precision of 97.2%, recall of 96.1%, and specificity of 917.2% respectively. Also, the convergence speed is enhanced in this TN-AGW approach. Therefore, the proposed TN-AGW approach achieves greater efficiency in image retrieving than other existing
The detection of cyber threats has recently been a crucial research domain as the internet and data drive people’s *** cyber-attacks lead to the compromise of data *** proposed system offers complete data protection ...
详细信息
The detection of cyber threats has recently been a crucial research domain as the internet and data drive people’s *** cyber-attacks lead to the compromise of data *** proposed system offers complete data protection from Advanced Persistent Threat(APT)attacks with attack detection and defence *** modified lateral movement detection algorithm detects the APT attacks,while the defence is achieved by the Dynamic Deception system that makes use of the belief update *** termination,every cyber-attack undergoes multiple stages,with the most prominent stage being Lateral Movement(LM).The LM uses a Remote Desktop protocol(RDP)technique to authenticate the unauthorised host leaving footprints on the network and host *** anomaly-based approach leveraging the RDP event logs on Windows is used for detecting the evidence of *** extracting various feature sets from the logs,the RDP sessions are classified using machine-learning techniques with high recall and *** is found that the AdaBoost classifier offers better accuracy,precision,F1 score and recall recording 99.9%,99.9%,0.99 and 0.98%.Further,a dynamic deception process is used as a defence mechanism to mitigateAPTattacks.A hybrid encryption communication,dynamic(Internet Protocol)IP address generation,timing selection and policy allocation are established based on mathematical models.A belief update algorithm controls the defender’s *** performance of the proposed system is compared with the state-of-the-art models.
暂无评论