Recent advances in IoT technologies have led to the rise of home automation (HA) systems, greatly improving users' daily life quality. With the growing use of smart devices in homes, event sensors play a key role ...
详细信息
Reachability query plays a vital role in many graph analysis *** researches proposed many methods to efficiently answer reachability queries between vertex *** many real graphs are labeled graph,it highly demands Labe...
详细信息
Reachability query plays a vital role in many graph analysis *** researches proposed many methods to efficiently answer reachability queries between vertex *** many real graphs are labeled graph,it highly demands Label-Constrained Reachability(LCR)query inwhich constraint includes a set of labels besides vertex *** researches proposed several methods for answering some LCR queries which require appearance of some labels specified in constraints in the *** that constraint may be a label set,query constraint may be ordered labels,namely OLCR(Ordered-Label-Constrained Reachability)queries which retrieve paths matching a sequence of ***,no solutions are available for ***,we propose DHL,a novel bloom filter based indexing technique for answering OLCR *** can be used to check reachability between vertex *** the answers are not no,then constrained DFS is ***,we employ DHL followed by performing constrained DFS to answer OLCR *** show that DHL has a bounded false positive rate,and it's powerful in saving indexing time and *** experiments on 10 real-life graphs and 12 synthetic graphs demonstrate that DHL achieves about 4.8-22.5 times smaller index space and 4.6-114 times less index construction time than two state-of-art techniques for LCR queries,while achieving comparable query response *** results also show that our algorithm can answer OLCR queries effectively.
This research proposes an Intelligent Decision Support System for Ground-Based Air Defense (GBAD) environments, which consist of Defended Assets (DA) on the ground that require protection from enemy aerial threats. A ...
详细信息
To enable precision medicine and remote patient monitoring,internet of healthcare things(IoHT)has gained significant interest as a promising *** the widespread use of IoHT,nonetheless,privacy infringements such as IoH...
详细信息
To enable precision medicine and remote patient monitoring,internet of healthcare things(IoHT)has gained significant interest as a promising *** the widespread use of IoHT,nonetheless,privacy infringements such as IoHT data leakage have raised serious public *** the other side,blockchain and distributed ledger technologies have demonstrated great potential for enhancing trustworthiness and privacy protection for IoHT *** this survey,a holistic review of existing blockchain-based IoHT systems is conducted to indicate the feasibility of combining blockchain and IoHT in privacy *** addition,various types of privacy challenges in IoHT are identified by examining general data protection regulation(GDPR).More importantly,an associated study of cutting-edge privacy-preserving techniques for the identified IoHT privacy challenges is ***,several challenges in four promising research areas for blockchain-based IoHT systems are pointed out,with the intent of motivating researchers working in these fields to develop possible solutions.
Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain *** has been common since 2017,and in fact,it once became the ...
详细信息
Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain *** has been common since 2017,and in fact,it once became the greatest threat to network *** better prove the attack ability the harm caused by cryptojacking,this paper proposes a new covert browser-based mining attack model named Delay-CJ,this model was deployed in a simulation environment for *** on the general framework of cryptojacking,Delay-CJ adds hybrid evasion detection techniques and applies the delayed execution strategy specifically for video websites in the prototype *** results show that the existing detection methods used for testing may become invalid as result of this *** view of this situation,to achieve a more general and robust detection scheme,we built a cryptojacking detection system named CJDetector,which is based on cryptojacking process ***,it identifies malicious mining by monitoring CPU usage and analyzing the function call *** system not only effectively detects the attack in our example but also has universal *** recognition accuracy of CJDetector reaches 99.33%.Finally,we tested the web pages in Alexa 50K websites to investigate cryptojacking activity in the real *** found that although cryptojacking is indeed on the decline,it remains a part of network security threats that cannot be ignored.
We studied the decision-making process of autonomous agents within the Electric Vehicle (EV) charging domain, where EV charging suppliers, acting as autonomous agents, interact to maximize their utilities in a shared ...
详细信息
In today's era, deep learning neural networks with multiple hidden layers have been widely used in many fields. The deep learning method has more powerful features that enhance the method's performance by a le...
详细信息
Artificial Intelligence (AI) technology is advancing rapidly, driving innovation across various industries while also presenting significant security challenges. These challenges include protecting model ownership, en...
详细信息
The concept of connected things that involves emotional aspects has been raised as a new research issue known as 'emotional IoT'. One of the challenges is to recognize the emotion in real-time without interfer...
详细信息
Recent studies suggest that plant disease identification via computational approaches is vital for agricultural production. However, there is still a large gap that needs to be bridged while the training data is imbal...
详细信息
暂无评论