Brain computer interface (BCI) is used to identify electrical activity in human brain using the electroencephalog-raphy (EEG). EEG records the electrical activity by placing the electrodes on the scalp. By using the r...
详细信息
The requirements elicitation phase in the software development life cycle (SDLC) is both critical and challenging, especially in the context of big data and rapid technological advancement. Traditional approaches like...
详细信息
ISBN:
(数字)9798350355925
ISBN:
(纸本)9798350355932
The requirements elicitation phase in the software development life cycle (SDLC) is both critical and challenging, especially in the context of big data and rapid technological advancement. Traditional approaches like workshops and proto-typing, while useful, often struggle to keep pace with the massive data volumes and rapidly changing user demands characteristic of modern technology. This paper introduces a data-driven approach that utilizes deep learning (DL) and natural language processing (NLP) to enhance the requirements elicitation process by extracting requirements and classifying them into functional and non-functional categories. Our research involves a deep neural network (DNN) trained on a large dataset of transcriptions from client/user stories. This DNN can identify whether a specific text represents a functional requirement, a non-functional requirement, or neither. Our approach shows a marked improvement over previous methods, with a 33% increase in accuracy and an 18% increase in the F1 score. These results indicate the capability for deep learning techniques to play a vital role in elicitation.
Detecting oil spills in open seas is important for the early containment of the pollution diffusion and avoidance of further ecological catastrophes. Herein, we explore and assess the application of several machine le...
详细信息
Modern host-based intrusion detection systems (HIDS) rely on querying provenance graphs—graph representations of activity history on a system—to detect and respond to security threats present on a system. However, a...
详细信息
ISBN:
(数字)9798350362480
ISBN:
(纸本)9798350362497
Modern host-based intrusion detection systems (HIDS) rely on querying provenance graphs—graph representations of activity history on a system—to detect and respond to security threats present on a system. However, as the complexity and number of applications running on a system increase, the size of provenance graphs also increase, and thus the latency to query them. State-of-the-art designs deliver query latencies that are impractical for modern threat detection. In this paper, we introduce a hyper-dimensional computing (HDC) approach to querying provenance graphs for HIDS. By encoding provenance graphs and attack patterns/signatures into hyper-dimensional vectors, we can implement a query engine using simple vector operations. Our approach is hardware accelerator compatible, providing further speedups under resource-constrained environments. Our evaluation on a real-world dataset shows that our approach achieves > 90% detection accuracy and up to 4, 242× speedups over the state-of-the-art. This shows that HDC-based approaches can effectively deal with scaling issues in modern HIDS.
Freshwater harmful algal blooms (HABs) pose significant ecological and public health risks worldwide. Detecting HABs soon after they form is critical to managing the damage they cause. While in-situ measurements are m...
详细信息
ISBN:
(数字)9798331540081
ISBN:
(纸本)9798331540098
Freshwater harmful algal blooms (HABs) pose significant ecological and public health risks worldwide. Detecting HABs soon after they form is critical to managing the damage they cause. While in-situ measurements are more accurate at detecting and measuring their toxicity levels, satellite imagery is more adept.at capturing the spatial and temporal dynamics of these blooms over large geographic regions. Satellites can also more persistently monitor for HABs. In the past, empirical methods and machine learning methods have used multispectral satellite imagery to estimate HAB biomass. To build upon the current body of research, this paper investigates an approach to expedite HAB detection by utilizing a convolutional neural network (CNN) deployed onboard a CubeSat in low Earth orbit to detect HABs in near-real-time. The CNN is trained with multispectral imagery from the Sentinel-2 satellite constellation aggregated with in-situ cyanobacteria cell counts from the Seabass CAML dataset. The results successfully demonstrated the capability of a CNN to detect cyanobacterial blooms using multispectral imagery. After classifying HAB predictions into 5 severity classes, the best performing model achieved a RMSE of 1.33 between HAB severity levels. Training the CNN on 30m GSD imagery with RGB and red edge (B05) bands achieved a RMSE of 1.83 between HAB severity levels, which was inadequate for detecting HABs in small inland water bodies. Improved performance was observed with 10m ground sample distance (GSD) band combinations. The best performing networks utilized all of Sentinel-2's 10m and 20m spectral bands.
Carriage return (CR) and line feed (LF), also known as CRLF injection is a type of vulnerability that allows a hacker to enter special characters into a web application, altering its operation or confusing the adminis...
详细信息
Carriage return (CR) and line feed (LF), also known as CRLF injection is a type of vulnerability that allows a hacker to enter special characters into a web application, altering its operation or confusing the administrator. Log poisoning and HTTP response splitting are two prominent harmful uses of this technique. Additionally, CRLF injection can be used by an attacker to exploit other vulnerabilities, such as cross-site scripting (XSS). Email injection, also known as email header injection, is another way that can be used to modify the behavior of emails. The Open Web Application Security Project (OWASP) is an organization that studies vulnerabilities and ranks them based on their level of risk. According to OWASP, CRLF vulnerabilities are among the top 10 vulnerabilities and are a type of injection attack. However, CRLF vulnerabilities can also lead to the discovery of other high-risk vulnerabilities, and it fosters a better approach to mitigate CRLF vulnerabilities in the early stage and help secure applications against known vulnerabilities. Although there has been a significant amount of research on other types of injection attacks, such as Structure Query Language Injection (SQL Injection). There has been less research on CRLF vulnerabilities and how to detect them with automated testing. There is room for further research to be done on this subject matter in order to develop creative solutions to problems. It will also help to reduce false positive alerts by checking the header response of each request. Automated alerts from security systems can provide a quicker and more accurate understanding of potential vulnerabilities and can help to reduce false positive alerts. Despite the extensive research on various types of vulnerabilities in web applications, CRLF vulnerabilities have only recently been included in the research. Utilizing automated testing as a recurring task can assist companies in receiving consistent updates about their systems and enhance the
The Internet of Things (IoT) is being used by smart cities to harness the power of the IoT and build more efficient and sustainable urban settings as they quickly adapt to the challenges of urbanization. This study ex...
The Internet of Things (IoT) is being used by smart cities to harness the power of the IoT and build more efficient and sustainable urban settings as they quickly adapt to the challenges of urbanization. This study examines the idea of “smart cities” and the different fields where Internet of Things-based technologies are being used to improve urban living. The article discusses several IoT use cases and applications for smart cities, including smart energy management, smart transportation, smart healthcare, and smart public safety. Discussions also cover the advantages and difficulties of IoT-based smart city initiatives, such as the necessity for reliable infrastructure, data privacy and security concerns, and cooperative strategies. The essay also emphasizes how crucial a favorable policy and regulatory framework is to the deployment of IoT-based smart city projects. The article's conclusion discusses potential paths for further research as well as how the Internet of Things may change urban living in the years to come
This paper focuses on the security protocols enacted in banking transactions across the European Economic Area (EEA), as stipulated by the Second or Revised Payment Service Directive (commonly referred to as ‘PSD2’ ...
This paper focuses on the security protocols enacted in banking transactions across the European Economic Area (EEA), as stipulated by the Second or Revised Payment Service Directive (commonly referred to as ‘PSD2’ or simply ‘the Directive’). The study aims to comprehensively analyse the implementation and efficacy of these security measures within the specified jurisdiction. The Directive incorporates fundamental rights and obligations that all stakeholders are compelled to adhere to and delineates specific security measures and standards that both traditional banking institutions and third-party providers (TPP) are mandated to implement. In particular, one of the cardinal mandates for banking and financial institutions under PSD2 is the obligation to facilitate third-party access to customer data via open application programming interfaces (API). While this open banking paradigm and the consequent proliferation of data sharing unquestionably bring about various advantages, such as enhanced consumer choice and market competition, they concurrently expose the financial ecosystem to a slew of potential security vulnerabilities and privacy risks. Upon conducting a comprehensive review of the security requirements and measures stipulated under PSD2 and a comparative analysis with essential cybersecurity frameworks and standards (NIS2, Cybersecurity Act, GDPR, ISO 27001:22 and PCI DSS), we have ascertained a discernible lack of harmonisation and clarity concerning the technical security specifications for its effective implementation. This lacuna substantiates the challenges banks face in fully grasping the extensive spectrum of compliance obligations mandated by PSD2. The aim of this research is to offer a valuable contribution to both the comprehension and the pragmatic deployment of security standards in the context of banking transactions, as regulated by the PSD2. The paper serves as a valuable resource for traditional banking institut
Blockchain has proven to be an emerging technology in the digital world, changing the way everyone thinks about data security and bringing efficiency to several industries. It has already been applied to a wide range ...
详细信息
High throughput and energy efficient integrated cryptographic hash primitives are important for the continuous integrity checking and tampering detection in secure access management mechanisms of on-chip instrumentati...
High throughput and energy efficient integrated cryptographic hash primitives are important for the continuous integrity checking and tampering detection in secure access management mechanisms of on-chip instrumentation, such as the IJTAG. However, previous SHA-256 cores focus only on throughput. In this paper, we synthesize with a 32 nm CMOS Technology SHA-256 cores that can be integrated in ASICs, and we present insights on their achieved throughput and energy efficiency. Moreover, we present a novel clock-gated design for reducing dynamic power dissipation of SHA-256 cores; and a novel Multi-Vt design for reducing static power dissipation of SHA-256 cores. The proposed designs can achieve upto 25.9% improvement of the energy efficiency of existing SHA-256 designs, without impacting their performed throughput. To the best of our knowledge, this is the first work that applies low power design techniques on SHA-256 cores.
暂无评论