Deepfake technology, known for its ability to produce convincingly face-swapped videos, presents significant risks to privacy, security, and public trust. Misuse of this technology for spreading misinformation, defama...
详细信息
Malignancy in the breast is a significant public health concern, where timely identification is essential for effective treatment. Machine Learning (ML) and Deep Learning (DL) algorithms are potential tools for prompt...
详细信息
Insider threat detection (ITD) presents a significant challenge in cybersecurity, particularly within large and complex organizations. Traditionally, ITD has been overshadowed by the focus of external threats, resulti...
详细信息
ISBN:
(纸本)9798350362480
Insider threat detection (ITD) presents a significant challenge in cybersecurity, particularly within large and complex organizations. Traditionally, ITD has been overshadowed by the focus of external threats, resulting in less attention and development in this critical area. Conventional ITD approaches often rely heavily on event-driven approaches. On top of that, researchers developed various rule-based methods to conquer the tasks. Based on that, we often ignore the intrinsic temporal relationships that are naturally built in between events that occur in different moments. For instance, we may easily understand events with causality such as one anomalous event followed by another specific event to complete a malicious action;however, may not be aware of events that occur around 9 am every morning during working hours. In our opinion, we attempt to re-consider the temporal behavior to extract the information hidden in cyberspace activities. Specifically, some effective sentence embeddings can assist us in providing informative internal representations to summarize temporal behaviors in the temporal activity sequences to make the right judgment on insider threat detection. In this paper, we propose a novel methodology for insider threat detection that emphasizes temporal relationship modeling on top of already-matured event sequence analysis to effectively catch insider threats. The proposed approach leverages contrastive sentence embeddings to learn users' intentions in sequences, followed by the deployment of a user-level and event-level Contrastive Learning (euCL) model to incorporate temporal behaviors with user behavior embeddings. To validate the proposed methodology, we conduct extensive analyses and experiments using the publicly available CERT dataset. The results demonstrate the effectiveness and robustness of the proposed method in detecting insider threats and identifying malicious scenarios, highlighting its potential for enhancing cybersecurity measur
Internet has revolutionized the world in a way no one could have ever imagined. It paved the way for various different technologies, that have transformed the world exceptionally. Internet enabled cloud technology whi...
详细信息
The face of a person is his identity. Most of his emotions, issues can be derived from his face. Face is the window to the soul which was said by famous French doctor Duchenne de Boulogne. He used several techniques t...
详细信息
ISBN:
(纸本)9798350320923
The face of a person is his identity. Most of his emotions, issues can be derived from his face. Face is the window to the soul which was said by famous French doctor Duchenne de Boulogne. He used several techniques to support his theory like giving shocks of electric impulses to understand how a person reacts to muscular contractions. He also tried to induce some of the expressions of bizarre looking. The ultimate aim is to analyze how much muscles contribute to emotion. He successfully derived lots of human emotions which is hidden. After 200 years this field is still active as it requires more experiments to extract invisible truths of human truths. Lots of Emotion Recognition which is automatic have been seen in the field of Marketing and Advertising. It is also seen in the field of Medical, Law and order...etc. The main fundamental question arrives whether it is good to enter into our personal space. This a question which has lots of dimension. Those who are against this practice is claiming that this is a violation of human rights by which we can use the stored data to harm the society in future. Even though it is a major concern if we can rectify the above the scope in this area is phenomenal. Lots of researchers are still working on this area because of mainly one reason that is its wide application in the area of Medical science. It can be used by a doctor for diagnosing a person with certain psychological disorders, children with Autism, person with Parkinson's disease. It can be widely used to diagnose children with Autism so that particular child can be motivated at early stage leads to his success in future and thus provide a good citizen to the society. In our research we are using several datasets such as FER2013, CK+...etc. These datasets have been given to a model which includes Deep Convolutional Neural Network. Here input image is given to a model using camera. The particular image has to done preprocessing to extract fine features in the model. A
Decentralized Finance (DeFi) represents an alternative paradigm in financial infrastructure, operating a top the Ethereum Blockchain. DeFi leverages Automated Market Makers (AMMs) to facilitate the exchange of coins/t...
详细信息
For gait analysis, an IMU sensor was mounted on the knee and gait related data was collected. Various gait parameters such as gait time, stance swing ratio, heel strike, and toe off can be extracted from the dataset. ...
详细信息
With the growing adoption of electric vehicles (EVs) as an eco-friendly and sustainable means of transportation, availability of adequate EV charging infrastructure has become very important. While fixed charging stat...
详细信息
With the advancements in graph neural network (GNN), there has been increasing interest in applying GNN to electrocardiogram (ECG) analysis. In this study, we generated an adjacency matrix using correlation matrix of ...
详细信息
When integrated, blockchain technology and cloud computing (EC) may improve security and protect data. However, when data is sent to EC, the Internet of Things (IoT) device layer cannot guarantee data security. As a r...
详细信息
暂无评论