This article proposes a technique that establishes the procedure for evaluating the level of efficiency of the information security department (an employee performing information security functions). The technique use...
详细信息
It's It's been so crucial lately to emphasize data security applying as the world depends on data exchange extensively almost in all domains. Steganography is one of the main techniques used to ensure informat...
详细信息
Denial of Service (DoS) attacks have emerged as sophisticated threats that exploit the known vulnerabilities of wireless communication, potentially sabotaging their operations and causing extensive downtime. Among the...
详细信息
ISBN:
(数字)9798350379112
ISBN:
(纸本)9798350379129
Denial of Service (DoS) attacks have emerged as sophisticated threats that exploit the known vulnerabilities of wireless communication, potentially sabotaging their operations and causing extensive downtime. Among these, de-authentication, disassociation and beacon flooding are particularly concerning due to their efficiency in disrupting network services. This paper delves into different types of Denial of Service (DoS) attacks and proposes a state-of-the-art detection mechanism. Most of the current state-of-the-art ML and DL-based IDSs are evaluated on the training dataset, which needs more variation in real-time attack data and requires substantial computational resources. In the following work, we propose a lightweight software solution named WNetMon, developed using the AWID2 dataset and evaluated using a new dataset generated using our custom testbed. Moreover, it can perform real-time Denial of Service (DoS) flooding attack detection on edge devices in wireless networks. Our results show that, while being small and effective, WNetMon achieves an overall accuracy of 99% for attack detection, benchmarked in real-time network traffic generated in our testbed. Therefore, it demonstrates the potential for using extensible ML solutions for Denial of Service (DoS) attack detection on edge systems that cannot execute industrial network monitoring tools due to resource constraints.
Technologically, most existing systems cannot detect distress autonomously through pattern recognition, further compounding the challenge of providing timely help. This research paper identifies the significant gap in...
详细信息
ISBN:
(数字)9798331521349
ISBN:
(纸本)9798331521356
Technologically, most existing systems cannot detect distress autonomously through pattern recognition, further compounding the challenge of providing timely help. This research paper identifies the significant gap in the market for an automated, real-time alert system that provides a solution that does not require manual engagement. In response, an LLM-based Smartwatch-Based Panic Alert System (SBPAS) is proposed to integrate into smartwatches that continuously monitor heart rate, motion, and location biometric signals. By applying advanced machine learning models, the system detects abnormal patterns consistent with panic or distress and automatically triggers alerts to emergency contacts and local authorities. This eliminates the need for manual intervention, offering a faster, more reliable response in critical situations. The significance of this solution lies in its ability to reduce response times, improve the likelihood of timely assistance, eliminate the chance of not being notified about an emergency, and close the existing technological gap in safety infrastructure, particularly in regions where crimes against individuals are prevalent.
In this paper, we have designed and experimentally characterized a hybrid light emitting diode (LED) and laser diode (LD) based underwater optical wireless communication (UOWC) link, which can be suitable for providin...
详细信息
Today, we are living in the digital world. Much information is available on the internet about| every topic. But merely the availability of information is not enough. There is a need for automated tools that can extra...
详细信息
Nowadays, the trend for home workouts is getting more and more popular. The growth of wearable fitness trackers from basic accelerometers, pedometers, pulse detectors, and ECGs also supports the advancement of persona...
详细信息
The emergence of 5G technology has ushered in a new era of connectivity, making communications faster and cheaper. One of the main challenges of 5G networks is accuracy and efficiency, which are important for many app...
详细信息
ISBN:
(数字)9798350378092
ISBN:
(纸本)9798350378108
The emergence of 5G technology has ushered in a new era of connectivity, making communications faster and cheaper. One of the main challenges of 5G networks is accuracy and efficiency, which are important for many applications such as driver less cars, smart cities and virtual reality. This research paper explores the integration of machine learning techniques to improve the accuracy and reliability of 5G infrastructure. The plan uses rich data generated by 5G networks, combining various parameters such as signal strength, flight time and angle of arrival. Machine learning algorithms are used to process this data and create good models for the correct location. The system is designed to adapt to dynamic and complex urban environments where traditional methods often encounter limitations. The main contribution of this research includes the development of a new machine learning-based distribution algorithm suitable for 5G networks, a comprehensive evaluation of performance comparison with the existing system, and evaluation of recommendations for feasibility and implementation. The results showed significant improvements in accuracy and reliability, demonstrating the potential of machine learning to revolutionize the 5G workplace.
Recent advances in artificial intelligence technologies have led to a significant increase in deep learning workloads on mobile devices. Given the limited resources of smartphones, much of the research in mobile deep ...
详细信息
ISBN:
(纸本)9798350355260
Recent advances in artificial intelligence technologies have led to a significant increase in deep learning workloads on mobile devices. Given the limited resources of smartphones, much of the research in mobile deep learning has concentrated on offloading these workloads to edge or cloud servers. While computing resources are crucial, storage I/O remains a critical performance bottleneck for mobile devices, yet the file access characteristics of deep learning have not been thoroughly explored. This paper investigates the file access traces of deep learning workloads on mobile devices, comparing them to traditional workloads. The main findings include: 1) Write access constitutes 48-94% of total file accesses, aligning with conventional mobile apps but contrasting with most desktop applications; 2) Write access in mobile deep learning workloads exhibits repetitive long-loop patterns, offering insights for enhancing file cache performance; 3) Despite its prevalence, write access demonstrates low access skewness; 4) Frequency of file accesses proves more informative than recency in predicting re-access likelihood. The insights from this study are expected to guide the efficient management of future smartphone systems by addressing the unique file access dynamics of deep learning.
Image inpainting is a valuable technique for enhancing images that have been corrupted. The primary challenge in this research revolves around the extent of corruption in the input image that the deep learning model m...
详细信息
暂无评论