This research study proposes an innovative machine learning algorithm, Spammer Identification Novel K-Means Extension (SINKEX), to fortify IoT mobile networks against commands and potential disruptions in industrial p...
详细信息
Time series forecasting is crucial in numerous sectors, including healthcare, energy, and finance. Transformer models, initially designed for natural language processing applications, demonstrate potential in capturin...
详细信息
In today's rapidly advancing technological land-scape, the widespread adoption of mobile applications has become a defining feature of our digital age. This research study presents a on the development of a mobile...
详细信息
The detection of reconnaissance attacks is crucial for safeguarding Internet of Things (IoT) environments, which are inherently more vulnerable and resource-constrained compared to traditional computing systems. Tradi...
详细信息
Multi-hop Question Answering has recently received particular attention in research and practice, especially in the context of conversational systems and answering complex questions. Various architectures have been pr...
详细信息
In recent years, there has been a growing emphasis on information security, with major companies introducing cybersecurity teams to ensure the safety of data. However, there is a lack of convenient channels for genera...
详细信息
ISBN:
(纸本)9798400716874
In recent years, there has been a growing emphasis on information security, with major companies introducing cybersecurity teams to ensure the safety of data. However, there is a lack of convenient channels for general users to engage in cybersecurity protection, leaving them with no choice but to rely on various antivirus software installations to safeguard their privacy and financial assets. This phenomenon is particularly evident in the digital transformation of healthcare and medical information systems, where the substantial amount of digitized patient data has become a crucial asset within hospital systems. Unfortunately, it has also made healthcare systems potential targets for cyberattacks. The databases of major hospitals have become vulnerable to malicious virus invasions, posing significant threats to patient privacy and the operational integrity of healthcare institutions. Faced with such threats, there is an increasing need for comprehensive cybersecurity protection mechanisms. To address this issue, we have developed the Universal Binary Malware Analysis Framework (UBMAF), an easily accessible binary file analysis framework for the general public. UBMAF integrates multiple open-source static and dynamic analysis tools into an automated module, deployed as Software as a Service (SaaS) in the cloud for healthcare and medical systems. This eliminates the need for users to install applications, and the framework interface is optimized for intuitive usability. During the usage process, users can freely choose module combinations. After uploading files to UBMAF, the framework conducts corresponding tool analyses or file processing based on the selected modules. Ultimately, it provides users with downloadable results and analysis reports. This design enables large healthcare and medical systems to quickly and conveniently enhance their cybersecurity defenses while ensuring the security of digital medical data, effectively addressing the challenges brought abo
Workplace injuries are a critical concern, with millions occurring annually, leading to substantial human and economic costs. This study focuses on a qualitative analysis based on statistics from 2013 to 2017, with a ...
详细信息
ISBN:
(纸本)9798350360523
Workplace injuries are a critical concern, with millions occurring annually, leading to substantial human and economic costs. This study focuses on a qualitative analysis based on statistics from 2013 to 2017, with a specific emphasis on fatal and non-fatal workplace accidents within the European Union (EU) and Romania. The primary objective is to assess Romania's workplace safety status in the context of the EU and to propose strategic measures for improvement. To achieve this goal, four key indicators and statistical datasets are utilized, sourced from the National Institute of Statistics (NIS) of Romania, the Eurostat database of the European Commission, and the Romanian Labor Inspection. These indicators include the rate of incidence frequency index for occupational accidents, the average duration index, the frequency index for fatal accidents, and the severity index, enabling a comprehensive evaluation of accident frequency and severity. The rate of incidence, measuring injuries per 100,000 workers, is a pivotal indicator. Additionally, the study calculates the frequency index of non-fatal accidents (injuries per 1,000 employees) and the fatal accident frequency index (injuries per 1,000 workers). Statistical findings are rigorously validated through ANOVA analysis and T-tests. Following data evaluation, the study offers strategic recommendations informed by national and European strategies, including the National Occupational Safety and Health (OSH) Strategy for 2017-2020 and the "EU Strategic Framework on Health and Safety at Work"spanning 2014 to 2020. These recommendations aim to guide efforts for workplace accident control and prevention in Romania and the broader European *** summary, this study's core objective is to comprehensively analyze workplace accidents in Romania and the EU, employing various indicators and statistical data. Its primary aim is to assess the current status and propose evidence-based strategies for improvement, aligning with
Fog Computing enables the efficient offloading of computational tasks from IoT Devices to Fog nodes, enhancing processing efficiency and reducing latency. This paper introduces the Dynamic Matching with Deferred Accep...
详细信息
Real-time video transmission via unmanned aerial vehicles (UAVs) is significantly impacted by latency issues. Using Region of Interest (ROI) tile segmentation methods, video streaming techniques can dynamically adjust...
详细信息
Insider threat detection (ITD) presents a significant challenge in cybersecurity, particularly within large and complex organizations. Traditionally, ITD has been overshadowed by the focus of external threats, resulti...
详细信息
ISBN:
(纸本)9798350362480
Insider threat detection (ITD) presents a significant challenge in cybersecurity, particularly within large and complex organizations. Traditionally, ITD has been overshadowed by the focus of external threats, resulting in less attention and development in this critical area. Conventional ITD approaches often rely heavily on event-driven approaches. On top of that, researchers developed various rule-based methods to conquer the tasks. Based on that, we often ignore the intrinsic temporal relationships that are naturally built in between events that occur in different moments. For instance, we may easily understand events with causality such as one anomalous event followed by another specific event to complete a malicious action;however, may not be aware of events that occur around 9 am every morning during working hours. In our opinion, we attempt to re-consider the temporal behavior to extract the information hidden in cyberspace activities. Specifically, some effective sentence embeddings can assist us in providing informative internal representations to summarize temporal behaviors in the temporal activity sequences to make the right judgment on insider threat detection. In this paper, we propose a novel methodology for insider threat detection that emphasizes temporal relationship modeling on top of already-matured event sequence analysis to effectively catch insider threats. The proposed approach leverages contrastive sentence embeddings to learn users' intentions in sequences, followed by the deployment of a user-level and event-level Contrastive Learning (euCL) model to incorporate temporal behaviors with user behavior embeddings. To validate the proposed methodology, we conduct extensive analyses and experiments using the publicly available CERT dataset. The results demonstrate the effectiveness and robustness of the proposed method in detecting insider threats and identifying malicious scenarios, highlighting its potential for enhancing cybersecurity measur
暂无评论