The creation of a Real-Time Task Manager with a user-friendly interface and effective system monitoring is presented in this work utilising Python. The Psutil library was used to retrieve comprehensive system informat...
详细信息
Videos represent the most prevailing form of digital media for communication,information dissemination,and ***,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant *** ...
详细信息
Videos represent the most prevailing form of digital media for communication,information dissemination,and ***,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant *** response,various protection approaches have been developed to secure,authenticate,and ensure the integrity of digital *** study provides a comprehensive survey of the challenges associated with maintaining the confidentiality,integrity,and availability of video content,and examining how it can be *** then investigates current developments in the field of video security by exploring two critical research ***,it examine the techniques used by adversaries to compromise video data and evaluate their *** these attack methodologies is crucial for developing effective defense ***,it explores the various security approaches that can be employed to protect video data,enhancing its transparency,integrity,and *** compares the effectiveness of these approaches across different use cases,including surveillance,video on demand(VoD),and medical videos related to disease ***,it identifies potential research opportunities to enhance video data protection in response to the evolving threat *** this investigation,this study aims to contribute to the ongoing efforts in securing video data,providing insights that are vital for researchers,practitioners,and policymakers dedicated to enhancing the safety and reliability of video content in our digital world.
Credit card fraud is thereby a big challenge which results to enormous losses to both the individuals and the financial institutions. It is often the case that conventional measures of approach to fraud detection ofte...
详细信息
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by e...
详细信息
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by each of these devices can jeopardize the security of the entire ***,they can allow malicious software installed on end nodes to penetrate the *** paper presents a parallel ensemble model for threat hunting based on anomalies in the behavior of IIoT edge *** proposed model is flexible enough to use several state-of-the-art classifiers as the basic learner and efficiently classifies multi-class anomalies using the Multi-class AdaBoost and majority *** evaluations using a dataset consisting of multi-source normal records and multi-class anomalies demonstrate that our model outperforms existing approaches in terms of accuracy,F1 score,recall,and precision.
作者:
Shareef, D.K.Jyothsna, V.
School of Computing Department of Computer Science and Engineering Andhra Pradesh Tirupati India
School of Computing Department of Data Science Andhra Pradesh Tirupati India
This research study presents a comprehensive survey of deep learning methods applied in order to improve the security along with accuracy of the mobile sink position prediction in Vehicular Pattern Wireless Sensor Net...
详细信息
Coral reefs are some of Earth's most varied and critical ecosystems however, they face an increasing threat because of climate change rising sea surface temperatures (SST). Long-term exposure to high SST can resul...
详细信息
This paper presents a deep learning framework to automate recognition of medical prescriptions by using handwritten content, feature extraction from CNNs like VGG16, Alex Net, and MobileNetV2, and sequential data util...
详细信息
Autism Spectrum Disorder (ASD) is a complex neurodevelopmental condition that impacts social communication, behavior, and cognitive functions. Early detection of autism is crucial for timely intervention, which can si...
详细信息
In this paper, we mainly present a machine learning based approach to detect real-time phishing websites by taking into account URL and hyperlink based hybrid features to achieve high accuracy without relying on any t...
详细信息
Most blockchain systems currently adopt resource-consuming protocols to achieve consensus between miners;for example,the Proof-of-Work(PoW)and Practical Byzantine Fault Tolerant(PBFT)schemes,which have a high consumpt...
详细信息
Most blockchain systems currently adopt resource-consuming protocols to achieve consensus between miners;for example,the Proof-of-Work(PoW)and Practical Byzantine Fault Tolerant(PBFT)schemes,which have a high consumption of computing/communication resources and usually require reliable communications with bounded ***,these protocols may be unsuitable for Internet of Things(IoT)networks because the IoT devices are usually lightweight,battery-operated,and deployed in an unreliable wireless ***,this paper studies an efficient consensus protocol for blockchain in IoT networks via reinforcement ***,the consensus protocol in this work is designed on the basis of the Proof-of-Communication(PoC)scheme directly in a single-hop wireless network with unreliable communications.A distributed MultiAgent Reinforcement Learning(MARL)algorithm is proposed to improve the efficiency and fairness of consensus for miners in the blockchain *** this algorithm,each agent uses a matrix to depict the efficiency and fairness of the recent consensus and tunes its actions and rewards carefully in an actor-critic framework to seek effective *** results from the simulation show that the fairness of consensus in the proposed algorithm is guaranteed,and the efficiency nearly reaches a centralized optimal solution.
暂无评论