The integration of Encapsulating security Payload (ESP) right into a wireless community safety device calls for careful know-how and improvement. ESP is a crucial security protocol which offers an authentication heade...
详细信息
The application of device learning to actual-time data analysis has the potential to revolutionize the way businesses make decisions. With the capacity to procedure big volumes of data fast and correctly, system learn...
详细信息
3D human pose estimation (HPE) has improved significantly through Graph Convolutional Networks (GCNs), which effectively model body part ***, GCNs have limitations, including uniform feature transformations across nod...
详细信息
This paper investigates the effect of DNS-primarily based authentication on wireless network safety. DNS-primarily based authentication is used to authenticate consumer credentials on Wi-Fi networks, generally primari...
详细信息
Many people suffer from Chronic Kidney Disease (CKD). Nowadays, CKD is one of the top ten causes of death. CKD should via invasive examination to understand participants health status. If a non-invasive identification...
详细信息
Twitter is currently used as one of the applications that is often used to convey opinions or unrest by the public such as the current issue that is currently rife, namely regarding the increase in fuel oil prices (BB...
详细信息
The DDoS attack is one of the most threatening factors affecting the internet services. Now days, most of the common attacks are targeting the gaming industry, online shopping web sites followed by the software and me...
详细信息
ISBN:
(数字)9798331527549
ISBN:
(纸本)9798331527556
The DDoS attack is one of the most threatening factors affecting the internet services. Now days, most of the common attacks are targeting the gaming industry, online shopping web sites followed by the software and media sectors. Many of the service providers are available to detect and prevent the DDoS attacks. But their software's are not updated enough to detect the recent time attacks. Cyber security challenges include rising ransomware attacks, AI -powered threats, supply chain risks, and frequent data breaches. In the current IoT trend, available DDoS defenses aren't sufficient. This work is aimed to propose a novel BW- DDoS attack detection approach based on maximum data flow identification in networks. The proposed method is faster and taking less number of iterations to determine the maximum data flow and also trace out the source of the attacks with minimum time compared with existing approaches.
According to the trend of worldwide car sales have grown up, this cause may increase accidents on the road due to human error. The self-driverless car has been developed to solve this problem. One task of the self-dri...
According to the trend of worldwide car sales have grown up, this cause may increase accidents on the road due to human error. The self-driverless car has been developed to solve this problem. One task of the self-driverless car is traffic sign detection and recognition (TSDR), which will help drivers notify the traffic sign installed on the road in advance. Taiwan roads have specific traffic signs, and no Taiwan traffic sign public dataset is available. In this paper, our proposed object detection method was experimentally performed using YOLOv5s6 and YOLOv8s models on three different datasets, as Tsinghua-Tencent 100K (TT100k), the self-created Taiwan traffic sign (TWTS), and the hybrid dataset, which combine the traffic scenes between TT100k and TWTS dataset. The output results from each dataset and each model, which is trained on the same parameter, will be compared to validate the proposed method. The experiment results’ comparison of the hybrid dataset between YOLOv5s6 and YOLOv8s models display the results of the mAP@.5 is about 65% and 76.2%, respectively, which means the performance of the YOLOv8s is higher than the YOLOv5s6 when using hybrid dataset.
Real-time social interactions and multi-streaming are two critical features of live streaming services. In this paper, we formulate a new fundamental service query, Social-aware Diverse and Preferred Organization Quer...
详细信息
IT/OT convergence in the form of a Cyber-Physical System (CPS) presents an opportunity to apply recent information Technology (IT) advancements to Operational Technology (OT). The IT/OT convergence introduces cyber se...
详细信息
ISBN:
(数字)9798350395419
ISBN:
(纸本)9798350395426
IT/OT convergence in the form of a Cyber-Physical System (CPS) presents an opportunity to apply recent information Technology (IT) advancements to Operational Technology (OT). The IT/OT convergence introduces cyber security threats for OT. The OT communication protocols, for example, have limited or no security capabilities for securing data exchange beyond basic authentication. The RNG (Random Number Generator) function is crucial in PLC for producing the encryption keys or the initial seed for security algorithms. The software-based PRNG (Pseudo RNG) is the most common approach for RNG in OT, instead of hardware-based RNG. This study provides a systematic literature review of the most recent evidence in digital transformation to secure data exchange in smart factories, within OT, or across OT and IT settings. It does this by looking at the PRNG on PLC and identifying the most recent trends and best practices. The findings include up-to-date data on author countries' distribution, published journals, research trends, industries, and industry types. The findings also address whether data flow is encrypted or shared in plaintext to ensure secure data transfer between IT and legacy OT environments. This paper concludes that while there is known RNG implementation in the actual embedded system in ICS, there is no evidence in the literature for using RNG in ICS networks for PLC implementation to secure data transfer with encryption.
暂无评论