Results (315)
Search Parameters:
Keyword: MACEnhancing the Network Anomaly Detection using CNN-Bidirectional LSTM Hybrid Model and Sampling Strategies for Imbalanced Network Traffic Data
The cybercriminal utilized the skills and freely available tools to breach the networks of internet-connected devices by exploiting confidentiality, integrity, and availability. Network anomaly detection is crucial for ensuring the security of information resources. Detecting abnormal network behavior poses challenges because of the extensive data, imbalanced attack class nature, and the abundance of features in…
Read MoreImproved Candidate-Career Matching Using Comparative Semantic Resume Analysis
A resume is a prevalent and generally employed method for individuals to showcase their proficiency and qualifications. It is typically composed using diverse customized, personalized methods in multiple inconsistent formats (such as pdf, txt, doc, etc.). Screening candidates based on the alignment of their resume with a set of job requirements is typically a labori-…
Read MoreOptimizing the Performance of Network Anomaly Detection Using Bidirectional Long Short-Term Memory (Bi-LSTM) and Over-sampling for Imbalance Network Traffic Data
Cybercriminal exploits integrity, confidentiality, and availability of information resources. Cyberattacks are typically invisible to the naked eye, even though they target a wide range of our digital assets, such as internet-connected smart devices, computers, and networking devices. Implementing network anomaly detection proves to be an effective method for identifying these malicious activities. The traditional anomaly…
Read MoreEnhancing Cloud Security: A Comprehensive Framework for Real-Time Detection, Analysis and Cyber Threat Intelligence Sharing
Cloud computing has emerged as a pivotal component of contemporary IT systems, affording organizations the agility and scalability required to meet the ever-changing demands of business. However, this technological evolution has introduced a new era of cybersecurity challenges, as attackers employ increasingly sophisticated strategies to breach cloud networks. Such breaches can have far-reaching consequences, including…
Read MoreComparative Study of J48 Decision Tree and CART Algorithm for Liver Cancer Symptom Analysis Using Data from Carnegie Mellon University
Liver cancer is a major contributor to cancer-related mortality both in the United States and worldwide. A range of liver diseases, such as chronic liver disease, liver cirrhosis, hepatitis, and liver cancer, play a role in this statistic. Hepatitis, in particular, is the main culprit behind liver cancer. As a consequence, it is decisive to…
Read MoreTree-Based Ensemble Models, Algorithms and Performance Measures for Classification
An ensemble method is a Machine Learning (ML) algorithm that aggregates the predictions of multiple estimators or models. The purpose of an ensemble module is to provide better predictive performance than any single contributing model. This can be achieved by producing a predictive model with reduced variance using bagging, and bias using boosting. The Tree-Based…
Read MoreDesign and Manufacturing of Soft Grippers for Robotics by Injection Molding Technology
Soft robots have softer, more flexible, and more compliant characteristics than traditional rigid robots. These qualities encourage more secure relationships between people and machines. Nevertheless, traditional robots continue to rule the commercial sector. Due to the high cost of gripper production, soft robots are very far from being commercially feasible. This research focuses on fabricating…
Read MoreForecasting Bitcoin Prices: An LSTM Deep-Learning Approach Using On-Chain Data
Over the past decade, Bitcoin’s unprecedented performance has underscored its po-sition as the premier asset class. Starting from an insignificant value and reaching an astounding high of around 65,000 U.S dollars in 2021 – all without a central con-trolling authority – Bitcoin’s trajectory is undoubtedly a historical feat. Its intangible nature, initially a subject of…
Read MoreHuman-Centered Design, Development, and Evaluation of an Interface for a Microgrid Controller
Many millions of people have adverse effects on their lives, both socially and economically, when a power outage occurs. Along with other electrical events, the lack of Situational Awareness (SA) is one of the root causes of power system outages. In order to promote adequate situational awareness, both power system and microgrid interfaces should communicate…
Read MoreDetecting CTC Attack in IoMT Communications using Deep Learning Approach
Cyber security is based on different principles such as confidentiality and integrity of transmitted data. One of the main methods to send confidential messages is to use a shared secret to encrypt and decrypt them. Even if the amortized computational complexity of the hashing functions is Ο(1), there are several situations when it is not…
Read MoreHybrid Intrusion Detection Using the AEN Graph Model
The Activity and Event Network (AEN) is a new dynamic knowledge graph that models different network entities and the relationships between them. The graph is generated by processing various network security logs, such as network packets, system logs, and intrusion detection alerts, which allows the graph to capture security-relevant activity and events in the network.…
Read MoreA Multiplatform Application for Automatic Recognition of Personality Traits in Learning Environments
The present work shows the development of a data collection platform that allows the researcher to collect new video and voice data sets in Spanish. It also allows the application of a standardized personality test and stores this information to analyze the effectiveness of the automatic personality recognizers concerning the results of a standardized personality…
Read MoreMeta-heuristic and Heuristic Algorithms for Forecasting Workload Placement and Energy Consumption in Cloud Data Centers
The increase of servers in data centers has become a significant problem in recent years that leads to a rise in energy consumption. The problem of high energy consumed by data centers is always related to the active hardware especially the servers that use virtualization to create a cloud workspace for the users. For this…
Read MoreTechnical Aspects and Social Science Expertise to Support Safe and Secure Handling of Autonomous Railway Systems
In recent years the development of autonomous vehicles has increased tremendously and a variety of methodologies had been applied to make them more safe and secure. This work shows a multilevel approach combining Failure Mode, Effects and Criticality Analysis of an autonomous railway system with sociological and technical aspects to support safe operations and human-machine…
Read MoreTransfer and Ensemble Learning in Real-time Accurate Age and Age-group Estimation
Aging is considered to be a complex process in almost every species’ life, which can be studied at a variety of levels of abstraction as well as in different organs. Not surprisingly, biometric characteristics from facial images play a significant role in predicting human’s age. Specifically, automatic age estimation in real-time situation has begun to…
Read MoreProfiling Attack on WiFi-based IoT Devices using an Eavesdropping of an Encrypted Data Frames
The rapid advancement of the Internet of Things (IoT) is distinguished by heterogeneous technologies that provide cutting-edge services across a range of application domains. However, by eavesdropping on encrypted WiFi network traflc, attackers can infer private information such as the types and working status of IoT devices in a business or residential home. Moreover, since…
Read MoreMatching TCP Packets to Detect Stepping-Stone Intrusion using Packet Crossover
Hackers on the Internet often send attacking commands through compromised hosts, called stepping-stones, for the purpose to be hidden behind a long interactive communication session. In a stepping-stone attack, an intruder uses a chain of stepping-stones as relay machines and remotely login these machines using a remote login program such as SSH (secure shell). A…
Read MoreBER Performance Evaluation Using Deep Learning Algorithm for Joint Source Channel Coding in Wireless Networks
In the time past, virtually all the contemporary communication systems depend on distinct source and channel encoding schemes for data transmission. Irrespective of the recorded success of the distinct schemes, the new developed scheme known as joint source channel coding technique has proven to have technically outperformed the conventional schemes. The aim of the study…
Read MoreA Supervised Building Detection Based on Shadow using Segmentation and Texture in High-Resolution Images
Building detection in aerial or satellite imagery is one of the most challenging tasks due to the variety of shapes, sizes, colors, and textures of man-made objects. To this end, in this paper, we propose a novel approach to extracting buildings in high-resolution images based on prior knowledge of the shadow position. Firstly, the image…
Read MoreAnalysis Methods and Classification Algorithms with a Novel Sentiment Classification for Arabic Text using the Lexicon-Based Approach
Social networks have become a valuable platform for tracking and analyzing Internet users’ feelings. This analysis provides crucial information for decision-making in various areas, such as politics and marketing. In addition to this challenge and our interest in the field of big data and sentiment analysis in social networks, we have dedicated this work to…
Read MoreEnhanced Dynamic Cross Layer Mechanism for real time HEVC Streaming over Vehicular Ad-hoc Networks (VANETs)
Various applications have helped make vehicular Ad-hoc network communication a reality. Real-time applications, for example, need broadcasting in high video quality with minimal latency. The new High-Efficiency Video Coding (HEVC) has shown great promise for real-time video transmission through Vehicle Ad-hoc Networks due to its high compression level. These networks, on the other hand, have…
Read MoreImproving of Heat Spreading in a SiC Propulsion Inverter using Graphene Assembled Films
The focus of this work is first to establish the effect of the chip temperature and thermal feedback on the determination of the power loss in a three-phase propulsion inverter, then to demonstrate the possibility of achieving an improved heat spreading through the different layers inside a SiC power module by using graphene assembled films…
Read MoreInnovations in Recruitment—Social Media
The main objective and contribution of the paper is to describe the creation of a model to support recruitment using social media information and its deployment in practice. The model includes the design of an automated solution for downloading social media data and a proposal for the subsequent analysis and creation of a predictive model…
Read MoreEnsemble Learning of Deep URL Features based on Convolutional Neural Network for Phishing Attack Detection
The deep learning-based URL classification approach using massive observations has been verified especially in the field of phishing attack detection. Various improvements have been achieved through the modeling of character and word sequence of URL based on convolutional and recurrent neural networks, and it has been proven that an ensemble approach of each model has…
Read MoreCyberbullying Detection by Including Emotion Model using Stacking Ensemble Method
Cyberbullying is a serious problem and caused an immense impact to the victim. To prevent the cyberbullying, the solution is to develop an automatic detection system. In this research, we propose a combined model for cyberbullying detection and emotion detection by using stacking method. The experiment is to create a better model for cyberbullying detection…
Read More
