Intelligent reflecting surface(IRS)has been widely regarded as a promising technology for configuring wireless propagation *** this paper,we utilize IRS to assist transmission of a secondary user(SU)in a cognitive rad...
详细信息
Intelligent reflecting surface(IRS)has been widely regarded as a promising technology for configuring wireless propagation *** this paper,we utilize IRS to assist transmission of a secondary user(SU)in a cognitive radio-inspired rate-splitting multiple access(CR-RSMA)system in which a primary user's(PU's)quality of service(QoS)requirements must be *** introducing intolerable interference to deteriorate the PU's outage performance,the SU conducts rate-splitting to transmit its signal to the base-station through the direct link and IRS reflecting *** the IRS-assisted CR-RSMA(IRS-CR-RSMA)scheme,we derive the optimal transmit power allocation,target rate allocation,and successive interference cancellation decoding order to enhance the outage performance of the *** closed-form expression for the SU's outage probability achieved by the IRS-CR-RSMA scheme is *** simulation results are presented to clarify the enhanced outage performance achieved by the proposed IRS-CR-RSMA scheme over the CR-RSMA scheme.
In recent years, there has been a proliferation of Internet of Things (IoT) devices, and so has been the attacks on them. In this paper we will propose a methodology to detect Distributed Denial of Service (DDoS) atta...
详细信息
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ...
详细信息
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving sophistication of cyber *** paper introduces a novel hybrid ensemble learning framework that leverages a combination of advanced machine learning algorithms—Logistic Regression(LR),Support Vector Machines(SVM),eXtreme Gradient Boosting(XGBoost),Categorical Boosting(CatBoost),and Deep Neural Networks(DNN).Utilizing the XSS-Attacks-2021 dataset,which comprises 460 instances across various real-world trafficrelated scenarios,this framework significantly enhances XSS attack *** approach,which includes rigorous feature engineering and model tuning,not only optimizes accuracy but also effectively minimizes false positives(FP)(0.13%)and false negatives(FN)(0.19%).This comprehensive methodology has been rigorously validated,achieving an unprecedented accuracy of 99.87%.The proposed system is scalable and efficient,capable of adapting to the increasing number of web applications and user demands without a decline in *** demonstrates exceptional real-time capabilities,with the ability to detect XSS attacks dynamically,maintaining high accuracy and low latency even under significant ***,despite the computational complexity introduced by the hybrid ensemble approach,strategic use of parallel processing and algorithm tuning ensures that the system remains scalable and performs robustly in real-time *** for easy integration with existing web security systems,our framework supports adaptable Application Programming Interfaces(APIs)and a modular design,facilitating seamless augmentation of current *** innovation represents a significant advancement in cybersecurity,offering a scalable and effective solution for securing modern web applications against evolving threats.
The need for a personalized user experience brought recommendation systems to the forefront of digital innovation. However, traditional approaches tend to often forget human emotions, which represent a critical driver...
详细信息
In the contemporary world, humanoid robots are likely to play a key role in various fields, including health care, domestic service, hospitality, business, and military and security activities. The robots are employed...
详细信息
We consider a Network Operator (NO) that owns Edge Computing (EC) resources, virtualizes them and lets third party Service Providers (SPs) run their services, using the allocated slice of resources. We focus on one sp...
详细信息
The automatic identification o f h eart d iseases is a challenging problem in the medical field, a nd i t constitutes the primary cause of death. Heart failure prediction, one of the symptoms of cardiovascular disease...
详细信息
Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial *** IIoT nodes operate confidential data(such as medical,tr...
详细信息
Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial *** IIoT nodes operate confidential data(such as medical,transportation,military,etc.)which are reachable targets for hostile intruders due to their openness and varied *** Detection systems(IDS)based on Machine Learning(ML)and Deep Learning(DL)techniques have got significant ***,existing ML and DL-based IDS still face a number of obstacles that must be *** instance,the existing DL approaches necessitate a substantial quantity of data for effective performance,which is not feasible to run on low-power and low-memory *** and fewer data potentially lead to low performance on existing *** paper proposes a self-attention convolutional neural network(SACNN)architecture for the detection of malicious activity in IIoT networks and an appropriate feature extraction method to extract the most significant *** proposed architecture has a self-attention layer to calculate the input attention and convolutional neural network(CNN)layers to process the assigned attention features for *** performance evaluation of the proposed SACNN architecture has been done with the Edge-IIoTset and X-IIoTID *** datasets encompassed the behaviours of contemporary IIoT communication protocols,the operations of state-of-the-art devices,various attack types,and diverse attack scenarios.
Network updates have become increasingly prevalent since the broad adoption of software-defined networks(SDNs)in data *** TCP designs,including cutting-edge TCP variants DCTCP,CUBIC,and BBR,however,are not resilient t...
详细信息
Network updates have become increasingly prevalent since the broad adoption of software-defined networks(SDNs)in data *** TCP designs,including cutting-edge TCP variants DCTCP,CUBIC,and BBR,however,are not resilient to network updates that provoke flow *** this paper,we first demonstrate that popular TCP implementations perform inadequately in the presence of frequent and inconsistent network updates,because inconsistent and frequent network updates result in out-of-order packets and packet drops induced via transitory congestion and lead to serious performance *** look into the causes and propose a network update-friendly TCP(NUFTCP),which is an extension of the DCTCP variant,as a *** are used to assess the proposed *** findings reveal that NUFTCP can more effectively manage the problems of out-of-order packets and packet drops triggered in network updates,and it outperforms DCTCP considerably.
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t...
详细信息
暂无评论