期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Log-Based Anomaly Detection of System Logs Using Graph Neural Network
1
作者 Eman Alsalmi Abeer Alhuzali areej alhothali 《Computers, Materials & Continua》 2026年第2期1265-1284,共20页
Log anomaly detection is essential for maintaining the reliability and security of large-scale networked systems.Most traditional techniques rely on log parsing in the reprocessing stage and utilize handcrafted featur... Log anomaly detection is essential for maintaining the reliability and security of large-scale networked systems.Most traditional techniques rely on log parsing in the reprocessing stage and utilize handcrafted features that limit their adaptability across various systems.In this study,we propose a hybrid model,BertGCN,that integrates BERT-based contextual embedding with Graph Convolutional Networks(GCNs)to identify anomalies in raw system logs,thereby eliminating the need for log parsing.TheBERT module captures semantic representations of log messages,while the GCN models the structural relationships among log entries through a text-based graph.This combination enables BertGCN to capture both the contextual and semantic characteristics of log data.BertGCN showed excellent performance on the HDFS and BGL datasets,demonstrating its effectiveness and resilience in detecting anomalies.Compared to multiple baselines,our proposed BertGCN showed improved precision,recall,and F1 scores. 展开更多
关键词 Log anomaly detection BERT graph convolutional network systemlogs explainable anomaly detection
在线阅读 下载PDF
A Secure Key Agreement Scheme for Unmanned Aerial Vehicles-Based Crowd Monitoring System
2
作者 Bander Alzahrani Ahmed Barnawi +3 位作者 Azeem Irshad areej alhothali Reem Alotaibi Muhammad Shafiq 《Computers, Materials & Continua》 SCIE EI 2022年第3期6141-6158,共18页
Unmanned aerial vehicles(UAVs)have recently attractedwidespread attention in civil and commercial applications.For example,UAVs(or drone)technology is increasingly used in crowd monitoring solutions due to its wider a... Unmanned aerial vehicles(UAVs)have recently attractedwidespread attention in civil and commercial applications.For example,UAVs(or drone)technology is increasingly used in crowd monitoring solutions due to its wider air footprint and the ability to capture data in real time.However,due to the open atmosphere,drones can easily be lost or captured by attackers when reporting information to the crowd management center.In addition,the attackers may initiate malicious detection to disrupt the crowd-sensing communication network.Therefore,security and privacy are one of the most significant challenges faced by drones or the Internet of Drones(IoD)that supports the Internet of Things(IoT).In the literature,we can find some authenticated key agreement(AKA)schemes to protect access control between entities involved in the IoD environment.However,the AKA scheme involves many vulnerabilities in terms of security and privacy.In this paper,we propose an enhancedAKAsolution for crowdmonitoring applications that require secure communication between drones and controlling entities.Our scheme supports key security features,including anti-forgery attacks,and confirms user privacy.The security characteristics of our scheme are analyzed byNS2 simulation and verified by a random oracle model.Our simulation results and proofs show that the proposed scheme sufficiently guarantees the security of crowd-aware communication. 展开更多
关键词 IOT unmanned aerial vehicles AUTHENTICATION crowd monitoring
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部