To improve the detection of phishing sites, this proposal introduces feature weights for intelligent phishing site detection based on hybrid bio-inspired algorithms. The proposed approach uses Gray Wolf Optimization (...
详细信息
To improve the detection of phishing sites, this proposal introduces feature weights for intelligent phishing site detection based on hybrid bio-inspired algorithms. The proposed approach uses Gray Wolf Optimization (GWO) and Firefly Algorithm (FF), which examines a wide range of website attributes, to more precisely identify phishing sites. Then employs Artificial Neural Network (ANN) to classify different website elements according to the importance of each component in differentiating between legitimate and phishing websites using bioinspired-based recommended site feature weights. According to experimental findings, the suggested hybrid bioinspired-based feature weighting greatly improved classification accuracy, true positive (TPR), and negative rates (TNR), as well as precision and F1 score. Phishing is an online crime that entails the gathering of private information like passwords, account numbers, and credit card numbers. Attackers use alluring URLs to entice phony website visitors. Recently, Artificial Intelligence-based phishing detection has seen some success, and in this study, ANN was used to detect phishing. This ANN classifier may make phishing websites simpler to spot. However, it has been shown that the effectiveness of detection can be increased by applying a genetic algorithm to improve feature selection.
This work proposes a new deterministic entropy source that is adequately pseudorandom for the design of substitution boxes (s-box) for image encryption applications. The source is a novel multistable chaotic system wi...
详细信息
The combination of convolutional and recurrent neural networks is a promising framework that allows the extraction of high-quality spatio-temporal features together with its temporal dependencies, which is key for tim...
详细信息
In modern organization theories, the social network established by cyber criminals is termed the crime cyber black industry chain. Under the current technical level, treating a crime cyber black industry chain as a wh...
详细信息
ISBN:
(数字)9798350384437
ISBN:
(纸本)9798350384444
In modern organization theories, the social network established by cyber criminals is termed the crime cyber black industry chain. Under the current technical level, treating a crime cyber black industry chain as a whole dataset has to face severe challenges in many aspects, so the research of the sampling method specifically for it has been one of the current hot topics. Based on the structural feature of a cybercrime industry chain, the overall framework and the detailed algorithm of a multi-stage sampling method are proposed. Tested with real cybercrime datasets, our proposed multi-stage sampling method outperforms existing mainstream single-stage sampling methods at macro, meso, and micro scales, indicating it can solve practical problems with high efficiency and low cost.
Typhoid fever poses a significant health concern among children, due to its potential for severe complications and high treatment costs. This paper proposes an intelligent approach to modelling the prognosis and manag...
详细信息
ISBN:
(数字)9798331511890
ISBN:
(纸本)9798331511906
Typhoid fever poses a significant health concern among children, due to its potential for severe complications and high treatment costs. This paper proposes an intelligent approach to modelling the prognosis and management of paediatric typhoid infections leveraging machine learning and data analytics to optimize healthcare resources and improve patient outcomes. The dataset was sourced from hospitals in Edo State, Nigeria. The dataset comprises laboratory tests of blood samples of children, from age zero (0) to five (5) years. Six (6) attributes that exhibit the highest information gain: widal test, malaria count, monocyte, platelets, HB, eosinophils, cost of treatment respectively, were selected and ranked thus: 0.6759, 0.4936, 0.3147, 0.2843, 0.2416, 0.2127, and 0.20. Five different classification algorithms (J48_Consolidated, LMT, RepTree, MultiBoost Decision Stump) were employed. and Random Forest) and their results were compared. Performance analysis on the five (5) classifiers shows that Multiboost Decision Stump exhibited the best accuracy of 94% and least MAE of 0.0604. The finding shows that the developed model when integrated into automated disease diagnostic workflows will provide an enhanced and flexible solution for quick prognosis of typhoid fever in children in the tropics with significant cost savings with respect to hospitalization. The finding presupposes that we can enhance the efficiency of typhoid fever management while ensuring the delivery of quality care to children in resource-limited settings.
Let g(p) denote the least primitive root modulo p, and h(p) the least primitive root modulo p2. We computed g(p) and h(p) for all primes p ≤ 1016. As a consequence we are able to prove that g(p) 5/8 for all primes p ...
The software supply chain (SSC) attack has become one of the crucial issues that are being increased rapidly with the advancement of the software development domain. In general, SSC attacks execute during the software...
详细信息
ISBN:
(纸本)9781665480468
The software supply chain (SSC) attack has become one of the crucial issues that are being increased rapidly with the advancement of the software development domain. In general, SSC attacks execute during the software development processes lead to vulnerabilities in software products targeting downstream customers and even involved stakeholders. Machine Learning approaches are proven in detecting and preventing software security vulnerabilities. Besides, emerging quantum machine learning can be promising in addressing SSC attacks. Considering the distinction between traditional and quantum machine learning, performance could be varies based on the proportions of the experimenting dataset. In this paper, we conduct a comparative analysis between quantum neural networks (QNN) and conventional neural networks (NN) with a software supply chain attack dataset known as ClaMP. Our goal is to distinguish the performance between QNN and NN and to conduct the experiment, we develop two different models for QNN and NN by utilizing Pennylane for quantum and TensorFlow and Keras for traditional respectively. We evaluated the performance of both models with different proportions of the ClaMP dataset to identify the f1 score, recall, precision, and accuracy. We also measure the execution time to check the efficiency of both models. The demonstration result indicates that execution time for QNN is slower than NN with a higher percentage of datasets. Due to recent advancements in QNN, a large level of experiments shall be carried out to understand both models accurately in our future research.
Pulmonary embolism is a life-threatening illness caused by blockages in the pulmonary arteries, usually due to blood clots. This condition requires accurate diagnosis on time in order to prevent critical complications...
详细信息
Agriculture planning plays a dominant role in the economic growth and food security of agriculture-based countries such as Sri Lanka. Even though agriculture plays a vital role, there are still several major complicat...
详细信息
暂无评论