Cybersecurity is crucial in mitigating illegal access and hacking of online resources and network systems, and with the protection of network traffic vital by various detection and prevention techniques against cyber-...
详细信息
ISBN:
(数字)9798350391213
ISBN:
(纸本)9798350391220
Cybersecurity is crucial in mitigating illegal access and hacking of online resources and network systems, and with the protection of network traffic vital by various detection and prevention techniques against cyber-attacks. Internet communication that occurs on the Dark Web in particular, contains sensitive data that should remain inaccessible to unauthorized users. However, threat actors are empowered by anonymous browsing on the Dark Web. This paper investigates browser fingerprint attacks on the Dark Web, focusing on identifying attack patterns. A detection model based on traditional machine learning techniques is developed using a large sample of fingerprint data. Feature selection techniques are applied to create optimized training and test datasets for classification. The model is validated using cross-validation methods to minimize overfitting and underfitting. Empirical results demonstrate that the proposed model effectively identifies malicious browsers on the Dark Web.
One of the ways humans communicate is by using facial expressions. In psychology, the detection of emotions or facial expressions requires analysis and assessment of decisions in predicting a person's emotions or ...
详细信息
The paper discusses an enhancement to a recently presented supervised learning algorithm to solve the Maximum Independent Set *** particular,it is shown that the algorithm can be improved by simplifying the task learn...
详细信息
The paper discusses an enhancement to a recently presented supervised learning algorithm to solve the Maximum Independent Set *** particular,it is shown that the algorithm can be improved by simplifying the task learnt by the neural network adopted,with measurable effects on the quality of the solutions provided on unseen *** results are presented to validate the idea..
In this paper, we design an inertial Bregman extragradient-like algorithm with linesearch process for solving two pseudomonotone variational inequalities (VIPs) and the common fixed point problem (CFPP) of a Bregman r...
详细信息
This article introduces a kind of stochastic SEIR models containing virus mutation and logistic growth of susceptible populations, whose deterministic versions have a positively invariant set and globally asymptotical...
详细信息
This paper considers the stabilization of the coupled wave systems with spatially-varying *** authors design a state feedback controller by backstepping *** contrast to the previous work in the literature,the kernel e...
详细信息
This paper considers the stabilization of the coupled wave systems with spatially-varying *** authors design a state feedback controller by backstepping *** contrast to the previous work in the literature,the kernel equations become more complicated and the main difficulty lies in proving the existence and uniqueness of the solution to the kernel ***,using the backstepping approach,the authors verify the kernel equations,which is a system of coupled hyperbolic equations with spatially-varying ***,the existence and uniqueness of the kernel matrices is ***,the authors use a Lyapunov function to get the exponential stabilization of the closed-loop system.A numerical example is presented to illustrate the effectiveness of the proposed controller.
This paper is devoted to the study of an alternative Finite Element Method to the one originally proposed by Ciarlet & Raviart, and then complemented by Ciarlet & Glowinski, for studying the numerical approxim...
详细信息
Agriculture is essential to the global economy and food security. Insect and bird attacks have now been found in recent research that could cause crop loss. Crops are prone to bird attacks throughout the early stages ...
详细信息
With the anticipated development of 6G technology, the scope of Body Area Network (BAN) applications is undergoing significant expansion, enhancing capabilities for a wider range of sophisticated scenarios, including ...
详细信息
If there is at least one neighbour in K for each vertex in V that is not in K, then a set K⊆V(G) is a dominating set (DS) in G(V,E). The minimal cardinality of a DS of G is the domination number(DN) of G, represented...
详细信息
暂无评论