Intrusion detection is a serious and complex *** due to a large number of attacks around the world,the concept of intrusion detection has become very *** research proposes a multilayer bioinspired feature selection mo...
详细信息
Intrusion detection is a serious and complex *** due to a large number of attacks around the world,the concept of intrusion detection has become very *** research proposes a multilayer bioinspired feature selection model for intrusion detection using an optimized genetic ***,the proposed multilayer model consists of two layers(layers 1 and 2).At layer 1,three algorithms are used for the feature *** algorithms used are Particle Swarm Optimization(PSO),Grey Wolf Optimization(GWO),and Firefly Optimization Algorithm(FFA).At the end of layer 1,a priority value will be assigned for each feature *** layer 2 of the proposed model,the Optimized Genetic Algorithm(GA)is used to select one feature set based on the priority *** are done on standard GA to perform optimization and to fit the proposed *** Optimized GA is used in the training phase to assign a priority value for each feature ***,the priority values are categorized into three categories:high,medium,and ***,the Optimized GA is used in the testing phase to select a feature set based on its *** feature set with a high priority will be given a high priority to be *** the end of phase 2,an update for feature set priority may occur based on the selected features priority and the calculated *** proposed model can learn and modify feature sets priority,which will be reflected in selecting *** evaluation purposes,two well-known datasets are used in these *** first dataset is UNSW-NB15,the other dataset is the *** evaluation criteria are used,such as precision,recall,and *** experiments in this research suggest that the proposed model has a powerful and promising mechanism for the intrusion detection system.
An intrusion Detection System (IDS) is a system that resides inside the network and monitors all incoming and outgoing traffic. It prevents unethical activities from happening over the network. With the use of IoT dev...
详细信息
The growing adoption of the Internet of Things (IoT) terminology in recent years in several domains, including healthcare, has yielded multiple benefits. One of the roles is to support professionals in delivering outs...
详细信息
ISBN:
(数字)9798350373974
ISBN:
(纸本)9798350373981
The growing adoption of the Internet of Things (IoT) terminology in recent years in several domains, including healthcare, has yielded multiple benefits. One of the roles is to support professionals in delivering outstanding and suitable healthcare for patients, while also empowering patients to independently track their health state. However, this wide growth is accompanied by many significant security concerns and cyber risks, including unauthorized access, data leakage, information modification, and data erasure. This article outlines the advantages of employing groundbreaking blockchain technology to provide robust and verified authentication methods for different systems. Additionally, it imparts a foundational comprehension of the technologies employed in the procedure of constructing and advancing blockchain-based platforms. In addition, we explore tools like Scythe and Avispa that are employed to assess the system’s resilience against different types of attacks.
Numerous remote area applications welcome standalone renewable energy power generation systems or isolated microgrids (MGs). Due to the nature of solar and wind energy, the frequency deviation control (FDC) in hybrid ...
详细信息
Cross-technology communication (CTC) enables direct communications among devices with heterogeneous wireless technologies (e.g., Bluetooth, WiFi, ZigBee, etc.), thereby reducing the cost and complexity of their interc...
详细信息
As robotic technology rapidly develops, robots are being employed in an increasing number of fields. However, due to the complexity of deployment environments or the prevalence of ambiguous-condition objects, the prac...
详细信息
School bus contributes positively to reducing the number of cars on the road, thereby reducing the environmental impact of cars. It also dramatically relieves working parents, who do not have to pick up and drop off t...
School bus contributes positively to reducing the number of cars on the road, thereby reducing the environmental impact of cars. It also dramatically relieves working parents, who do not have to pick up and drop off their children separately in their private vehicles. However, the irregularity of the bus arrival times often leads to an extended waiting time for students at the bus stops, potentially compromising the students' safety. The communication barrier between schools, parents and bus drivers is also a significant challenge, mainly when a delay occurs during the transit of the students. This paper presents TOST (to-school-together), a school bus monitoring and management system for schools and parents. The school administrators, parents, and bus drivers are connected in one comprehensive school bus system. The proposed system provides realtime updates on the bus status, allowing peace of mind and easing the burden of parents, school administrators, and bus drivers. The design of TOST is based on feedback from the system stakeholders collected via a survey. We draw a complete understanding of the existing issues by analyzing the feedback. Finally, we have implemented the system using state-of-the-art technologies to address the identified issues and fulfil the system requirements.
Robustness of the electronic cryptographic devices against fault injection attacks is a great concern to ensure *** to significant resource constraints,these devices are limited in their *** increasing complexity of c...
详细信息
Robustness of the electronic cryptographic devices against fault injection attacks is a great concern to ensure *** to significant resource constraints,these devices are limited in their *** increasing complexity of cryptographic devices necessitates the development of a fast simulation environment capable of performing security tests against fault injection *** is a good choice for Electronic System Level(ESL)modeling since it enables models to run at a faster *** enable fault injection and detection inside a SystemC cryptographic model,however,the model’s source code must be *** altering the source code,Aspect-Oriented Programming(AOP)may be used to evaluate the robustness of cryptographic *** might replace conventional cryptanalysis methods in the real *** the ESL,we discuss a unique technique for simulating security fault attacks on cryptographic *** current study presents a fault injection/detection environment for assessing the KECCAK SystemC model’s resistance against fault injection *** approach of injecting faults into KECCAK SystemC model is accomplished via the use of weaving faults in AspectC++based on AOP programming *** confirm our technique by applying it to two scenarios using a SystemC KECCAK hash algorithm case study:The first concerns discuss the effect of the AOP on fault detection capabilities,while the second concerns discuss the effect of the AOP on simulation time and executable file *** simulation results demonstrate that this technique is fully capable of evaluating the fault injection resistance of a KECCAK *** demonstrate that AOP has a negligible effect on simulation time and executable file size.
Victor Hugo’s timeless observation, ‘Nothing is more powerful than an idea whose time has come’, resonates today as Quantum Computing, once only a dream of a physicist, stands at the threshold of reality with the p...
详细信息
暂无评论