期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
Privacy Preserving Federated Anomaly Detection in IoT Edge Computing Using Bayesian Game Reinforcement Learning
1
作者 Fatima Asiri Wajdan Al Malwi +4 位作者 Fahad Masood Mohammed S.Alshehri Tamara Zhukabayeva Syed Aziz Shah Jawad Ahmad 《Computers, Materials & Continua》 2025年第8期3943-3960,共18页
Edge computing(EC)combined with the Internet of Things(IoT)provides a scalable and efficient solution for smart homes.Therapid proliferation of IoT devices poses real-time data processing and security challenges.EC ha... Edge computing(EC)combined with the Internet of Things(IoT)provides a scalable and efficient solution for smart homes.Therapid proliferation of IoT devices poses real-time data processing and security challenges.EC has become a transformative paradigm for addressing these challenges,particularly in intrusion detection and anomaly mitigation.The widespread connectivity of IoT edge networks has exposed them to various security threats,necessitating robust strategies to detect malicious activities.This research presents a privacy-preserving federated anomaly detection framework combined with Bayesian game theory(BGT)and double deep Q-learning(DDQL).The proposed framework integrates BGT to model attacker and defender interactions for dynamic threat level adaptation and resource availability.It also models a strategic layout between attackers and defenders that takes into account uncertainty.DDQL is incorporated to optimize decision-making and aids in learning optimal defense policies at the edge,thereby ensuring policy and decision optimization.Federated learning(FL)enables decentralized and unshared anomaly detection for sensitive data between devices.Data collection has been performed from various sensors in a real-time EC-IoT network to identify irregularities that occurred due to different attacks.The results reveal that the proposed model achieves high detection accuracy of up to 98%while maintaining low resource consumption.This study demonstrates the synergy between game theory and FL to strengthen anomaly detection in EC-IoT networks. 展开更多
关键词 IOT edge computing smart homes anomaly detection Bayesian game theory reinforcement learning
在线阅读 下载PDF
Machine Learning Stroke Prediction in Smart Healthcare:Integrating Fuzzy K-Nearest Neighbor and Artificial Neural Networks with Feature Selection Techniques
2
作者 Abdul Ahad Ira Puspitasari +4 位作者 Jiangbin Zheng Shamsher Ullah Farhan Ullah Sheikh Tahir Bakhsh Ivan Miguel Pires 《Computers, Materials & Continua》 2025年第3期5115-5134,共20页
This research explores the use of Fuzzy K-Nearest Neighbor(F-KNN)and Artificial Neural Networks(ANN)for predicting heart stroke incidents,focusing on the impact of feature selection methods,specifically Chi-Square and... This research explores the use of Fuzzy K-Nearest Neighbor(F-KNN)and Artificial Neural Networks(ANN)for predicting heart stroke incidents,focusing on the impact of feature selection methods,specifically Chi-Square and Best First Search(BFS).The study demonstrates that BFS significantly enhances the performance of both classifiers.With BFS preprocessing,the ANN model achieved an impressive accuracy of 97.5%,precision and recall of 97.5%,and an Receiver Operating Characteristics(ROC)area of 97.9%,outperforming the Chi-Square-based ANN,which recorded an accuracy of 91.4%.Similarly,the F-KNN model with BFS achieved an accuracy of 96.3%,precision and recall of 96.3%,and a Receiver Operating Characteristics(ROC)area of 96.2%,surpassing the performance of the Chi-Square F-KNN model,which showed an accuracy of 95%.These results highlight that BFS improves the ability to select the most relevant features,contributing to more reliable and accurate stroke predictions.The findings underscore the importance of using advanced feature selection methods like BFS to enhance the performance of machine learning models in healthcare applications,leading to better stroke risk management and improved patient outcomes. 展开更多
关键词 Fuzzy K-nearest neighbor artificial neural network accuracy precision RECALL F-MEASURE CHI-SQUARE best search first heart stroke
在线阅读 下载PDF
A Hybrid Wasserstein GAN and Autoencoder Model for Robust Intrusion Detection in IoT
3
作者 Mohammed S.Alshehri Oumaima Saidani +4 位作者 Wajdan Al Malwi Fatima Asiri Shahid Latif Aizaz Ahmad Khattak Jawad Ahmad 《Computer Modeling in Engineering & Sciences》 2025年第6期3899-3920,共22页
The emergence of Generative Adversarial Network(GAN)techniques has garnered significant attention from the research community for the development of Intrusion Detection Systems(IDS).However,conventional GAN-based IDS ... The emergence of Generative Adversarial Network(GAN)techniques has garnered significant attention from the research community for the development of Intrusion Detection Systems(IDS).However,conventional GAN-based IDS models face several challenges,including training instability,high computational costs,and system failures.To address these limitations,we propose a Hybrid Wasserstein GAN and Autoencoder Model(WGAN-AE)for intrusion detection.The proposed framework leverages the stability of WGAN and the feature extraction capabilities of the Autoencoder Model.The model was trained and evaluated using two recent benchmark datasets,5GNIDD and IDSIoT2024.When trained on the 5GNIDD dataset,the model achieved an average area under the precisionrecall curve is 99.8%using five-fold cross-validation and demonstrated a high detection accuracy of 97.35%when tested on independent test data.Additionally,the model is well-suited for deployment on resource-limited Internetof-Things(IoT)devices due to its ability to detect attacks within microseconds and its small memory footprint of 60.24 kB.Similarly,when trained on the IDSIoT2024 dataset,the model achieved an average PR-AUC of 94.09%and an attack detection accuracy of 97.35%on independent test data,with a memory requirement of 61.84 kB.Extensive simulation results demonstrate that the proposed hybrid model effectively addresses the shortcomings of traditional GAN-based IDS approaches in terms of detection accuracy,computational efficiency,and applicability to real-world IoT environments. 展开更多
关键词 Autoencoder CYBERSECURITY generative adversarial network Internet of Things intrusion detection system
在线阅读 下载PDF
Augmenting Internet of Medical Things Security:Deep Ensemble Integration and Methodological Fusion
4
作者 Hamad Naeem Amjad Alsirhani +2 位作者 Faeiz MAlserhani Farhan Ullah Ondrej Krejcar 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第12期2185-2223,共39页
When it comes to smart healthcare business systems,network-based intrusion detection systems are crucial for protecting the system and its networks from malicious network assaults.To protect IoMT devices and networks ... When it comes to smart healthcare business systems,network-based intrusion detection systems are crucial for protecting the system and its networks from malicious network assaults.To protect IoMT devices and networks in healthcare and medical settings,our proposed model serves as a powerful tool for monitoring IoMT networks.This study presents a robust methodology for intrusion detection in Internet of Medical Things(IoMT)environments,integrating data augmentation,feature selection,and ensemble learning to effectively handle IoMT data complexity.Following rigorous preprocessing,including feature extraction,correlation removal,and Recursive Feature Elimi-nation(RFE),selected features are standardized and reshaped for deep learning models.Augmentation using the BAT algorithm enhances dataset variability.Three deep learning models,Transformer-based neural networks,self-attention Deep Convolutional Neural Networks(DCNNs),and Long Short-Term Memory(LSTM)networks,are trained to capture diverse data aspects.Their predictions form a meta-feature set for a subsequent meta-learner,which combines model strengths.Conventional classifiers validate meta-learner features for broad algorithm suitability.This comprehensive method demonstrates high accuracy and robustness in IoMT intrusion detection.Evaluations were conducted using two datasets:the publicly available WUSTL-EHMS-2020 dataset,which contains two distinct categories,and the CICIoMT2024 dataset,encompassing sixteen categories.Experimental results showcase the method’s exceptional performance,achieving optimal scores of 100%on the WUSTL-EHMS-2020 dataset and 99%on the CICIoMT2024. 展开更多
关键词 Cyberattack ensemble learning feature selection intrusion detection smart cities machine learning BAT augmentation
在线阅读 下载PDF
Recent advances in mobile edge computing and content caching 被引量:11
5
作者 Sunitha Safavat Naveen Naik Sapavath Danda B.Rawat 《Digital Communications and Networks》 SCIE 2020年第2期189-194,共6页
The demand for digital media services is increasing as the number of wireless subscriptions is growing exponentially.In order to meet this growing need,mobile wireless networks have been advanced at a tremendous pace ... The demand for digital media services is increasing as the number of wireless subscriptions is growing exponentially.In order to meet this growing need,mobile wireless networks have been advanced at a tremendous pace over recent days.However,the centralized architecture of existing mobile networks,with limited capacity and range of bandwidth of the radio access network and low bandwidth back-haul network,can not handle the exponentially increasing mobile traffic.Recently,we have seen the growth of new mechanisms of data caching and delivery methods through intermediate caching servers.In this paper,we present a survey on recent advances in mobile edge computing and content caching,including caching insertion and expulsion policies,the behavior of the caching system,and caching optimization based on wireless networks.Some of the important open challenges in mobile edge computing with content caching are identified and discussed.We have also compared edge,fog and cloud computing in terms of delay.Readers of this paper will get a thorough understanding of recent advances in mobile edge computing and content caching in mobile wireless networks. 展开更多
关键词 Mobile edge computing Content caching MEC
在线阅读 下载PDF
Unprecedented Smart Algorithm for Uninterrupted SDN Services During DDoS Attack 被引量:3
6
作者 Muhammad Reazul Haque Saw Chin Tan +11 位作者 Zulfadzli Yusoff Kashif Nisar Rizaludin Kaspin Iram Haider Sana Nisar J.P.C.Rodrigues Bhawani Shankar Chowdhry Muhammad AslamUqaili Satya Prasad Majumder Danda B.Rawat Richard Etengu Rajkumar Buyya 《Computers, Materials & Continua》 SCIE EI 2022年第1期875-894,共20页
In the design and planning of next-generation Internet of Things(IoT),telecommunication,and satellite communication systems,controller placement is crucial in software-defined networking(SDN).The programmability of th... In the design and planning of next-generation Internet of Things(IoT),telecommunication,and satellite communication systems,controller placement is crucial in software-defined networking(SDN).The programmability of the SDN controller is sophisticated for the centralized control system of the entire network.Nevertheless,it creates a significant loophole for the manifestation of a distributed denial of service(DDoS)attack straightforwardly.Furthermore,recently a Distributed Reflected Denial of Service(DRDoS)attack,an unusual DDoS attack,has been detected.However,minimal deliberation has given to this forthcoming single point of SDN infrastructure failure problem.Moreover,recently the high frequencies of DDoS attacks have increased dramatically.In this paper,a smart algorithm for planning SDN smart backup controllers under DDoS attack scenarios has proposed.Our proposed smart algorithm can recommend single or multiple smart backup controllers in the event of DDoS occurrence.The obtained simulated results demonstrate that the validation of the proposed algorithm and the performance analysis achieved 99.99%accuracy in placing the smart backup controller under DDoS attacks within 0.125 to 46508.7 s in SDN. 展开更多
关键词 SDN smart algorithm RTZLK-DAASCP DDoS attack DRDOS
在线阅读 下载PDF
<i>Inmap-t</i>: Leveraging TTCN-3 to Test the Security Impact of Intra Network Elements
7
作者 Antonino Vitale Marc Dacier 《Journal of Computer and Communications》 2021年第6期174-190,共17页
This paper rejuvenates the notion of conformance testing in order to assess the security of networks. It leverages the Testing and Test Control Notation Version 3 (TTCN-3) by applying it to a redefined notion of <i... This paper rejuvenates the notion of conformance testing in order to assess the security of networks. It leverages the Testing and Test Control Notation Version 3 (TTCN-3) by applying it to a redefined notion of <i>System under Test</i> (<i>SUT</i>). Instead of testing, as it is classically done, a software/firmware/ hardware element, an intangible object, namely the network, is tested in order to infer some of its security properties. After a brief introduction of TTCN-3 and Titan, its compilation and execution environment, a couple of use cases are provided to illustrate the feasibility of the approach. The pros and cons of using TTCN-3 to implement a scalable and flexible network testing environment are discussed. 展开更多
关键词 TTCN-3 Network Security Conformance Testing Deep Packet Inspection FIREWALL
在线阅读 下载PDF
The Economics of Sharing Unclassified Cyber Threat Intelligence by Government Agencies and Departments
8
作者 Josiah Dykstra Lawrence A. Gordon +1 位作者 Martin P. Loeb Lei Zhou 《Journal of Information Security》 2022年第3期85-100,共16页
This paper extends the literature on the economics of sharing cybersecurity information by and among profit-seeking firms by modeling the case where a government agency or department publicly shares unclassified cyber... This paper extends the literature on the economics of sharing cybersecurity information by and among profit-seeking firms by modeling the case where a government agency or department publicly shares unclassified cyber threat information with all organizations. In prior cybersecurity information sharing models a common element was reciprocity—i.e., firms receiving shared information are also asked to share their private cybersecurity information with all other firms (via an information sharing arrangement). In contrast, sharing of unclassified cyber threat intelligence (CTI) by a government agency or department is not based on reciprocal sharing by the recipient organizations. After considering the government’s cost of preparing and disseminating CTI, as well as the benefits to the recipients of the CTI, we provide sufficient conditions for sharing of CTI to result in an increase in social welfare. Under a broad set of general conditions, sharing of CTI will increase social welfare gross of the costs to the government agency or department sharing the information. Thus, if the entity can keep the sharing costs low, sharing cybersecurity information will result in an increase in net social welfare. 展开更多
关键词 Cyber Threat Intelligence Economics of Information Sharing
在线阅读 下载PDF
Transfer Learning-Based Approach with an Ensemble Classifier for Detecting Keylogging Attack on the Internet of Things
9
作者 Yahya Alhaj Maz Mohammed Anbar +3 位作者 Selvakumar Manickam Mosleh MAbualhaj Sultan Ahmed Almalki Basim Ahmad Alabsi 《Computers, Materials & Continua》 2025年第12期5287-5307,共21页
The Internet of Things(IoT)is an innovation that combines imagined space with the actual world on a single platform.Because of the recent rapid rise of IoT devices,there has been a lack of standards,leading to a massi... The Internet of Things(IoT)is an innovation that combines imagined space with the actual world on a single platform.Because of the recent rapid rise of IoT devices,there has been a lack of standards,leading to a massive increase in unprotected devices connecting to networks.Consequently,cyberattacks on IoT are becoming more common,particularly keylogging attacks,which are often caused by security vulnerabilities on IoT networks.This research focuses on the role of transfer learning and ensemble classifiers in enhancing the detection of keylogging attacks within small,imbalanced IoT datasets.The authors propose a model that combines transfer learning with ensemble classification methods,leading to improved detection accuracy.By leveraging the BoT-IoT and keylogger_detection datasets,they facilitate the transfer of knowledge across various domains.The results reveal that the integration of transfer learning and ensemble classifiers significantly improves detection capabilities,even in scenarios with limited data availability.The proposed TRANS-ENS model showcases exceptional accuracy and a minimal false positive rate,outperforming current deep learning approaches.The primary objectives include:(i)introducing an ensemble feature selection technique to identify common features across models,(ii)creating a pre-trained deep learning model through transfer learning for the detection of keylogging attacks,and(iii)developing a transfer learning-ensemble model dedicated to keylogging detection.Experimental findings indicate that the TRANS-ENS model achieves a detection accuracy of 96.06%and a false alarm rate of 0.12%,surpassing existing models such as CNN,RNN,and LSTM. 展开更多
关键词 Convolutional neural network deep learning keylogging attack recurrent neural network transfer learning
在线阅读 下载PDF
A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges 被引量:2
10
作者 Tinshu Sasi Arash Habibi Lashkari +2 位作者 Rongxing Lu Pulei Xiong Shahrear Iqbal 《Journal of Information and Intelligence》 2024年第6期455-513,共59页
The Internet of Things(loT)has set the way for the continuing digitalization of society in various manners during the past decade.The IoT is a vast network of intelligent devices exchanging data online.The security co... The Internet of Things(loT)has set the way for the continuing digitalization of society in various manners during the past decade.The IoT is a vast network of intelligent devices exchanging data online.The security component of IoT is crucial given its rapid expansion as a new technology paradigm since it may entail safety-critical procedures and the online storage of sensitive data.Unfortunately,security is the primary challenge when adopting Internet of Things(loT)tech-nologies.As a result,manufacturers'and academics'top priority now is improving the security of IoT devices.A substantial body of literature on the subject encompasses several issues and po-tential remedies.However,most existing research fails to offer a comprehensive perspective on attacks inside the IoT.Hence,this survey aims to establish a structure to guide researchers by categorizing attacks in the taxonomy according to various factors such as attack domains,attack threat type,attack executions,software surfaces,IoT protocols,attacks based on device property,attacks based on adversary location and attacks based on information damage level.This is fol-lowed by a comprehensive analysis of the countermeasures offered in academic literature.In this discourse,the countermeasures proposed for the most significant security attacks in the IoT are investigated.Following this,a comprehensive classification system for the various domains of security research in the IoT and Industrial Internet of Things(IoT)is developed,accompanied by their respective remedies.In conclusion,the study has revealed several open research areas pertinent to the subject matter. 展开更多
关键词 Internet of Things IoTattacks TAXONOMY VULNERABILITIES Detectionmethods CHALLENGES
原文传递
Unveiling vulnerable smart contracts:Toward profiling vulnerable smart contracts using genetic algorithm and generating benchmark dataset
11
作者 Sepideh HajiHosseinKhani Arash Habibi Lashkari Ali Mizani Oskui 《Blockchain(Research and Applications)》 EI 2024年第1期58-84,共27页
Smart contracts(SCs)are crucial in maintaining trust within blockchain networks.However,existing methods for analyzing SC vulnerabilities often lack accuracy and effectiveness,while approaches based on Deep Neural Net... Smart contracts(SCs)are crucial in maintaining trust within blockchain networks.However,existing methods for analyzing SC vulnerabilities often lack accuracy and effectiveness,while approaches based on Deep Neural Networks(DNNs)struggle with detecting complex vulnerabilities due to limited data availability.This paper proposes a novel approach for analyzing SC vulnerabilities.Our method leverages an advanced form of the Genetic Algorithm(GA)and includes the development of a comprehensive benchmark dataset consisting of 36,670 Solidity source code samples.The primary objective of our study is to profile vulnerable SCs effectively.To achieve this goal,we have devised an analyzer called SCsVulLyzer based on GAs,designed explicitly for profiling SCs.Additionally,we have carefully curated a new dataset encompassing a wide range of examples,ensuring the practical validation of our approach.Furthermore,we have established three distinct taxonomies that cover SCs,profiling techniques,and feature extraction.These taxonomies provide a systematic classification and analysis of information,improving the efficiency of our approach.Our methodology underwent rigorous testing through experimentation,and the results demonstrated the superior capabilities of our model in detecting vulnerabilities.Compared to traditional and DNN-based approaches,our approach achieved higher precision,recall,and F1-score,which are widely used metrics for evaluating model performance.Across all these metrics,our model showed exceptional results.The customization and adaptations we implemented within the GA significantly enhanced its effectiveness.Our approach detects SC vulnerabilities more efficiently and facilitates robust exploration.These promising results highlight the potential of GA-based profiling to improve the detection of SC vulnerabilities,contributing to enhanced security in blockchain networks. 展开更多
关键词 Smart contracts(SCs) VULNERABILITY Vulnerable smart contracts Vulnerability profiling Genetic algorithm
原文传递
Capsule networks embedded with prior known support information for image reconstruction
12
作者 Meng Wang Ping Yang Yahao Zhang 《High-Confidence Computing》 EI 2023年第4期1-6,共6页
Compressed sensing(CS)has been successfully applied to realize image reconstruction.Neural networks have been introduced to the CS of images to exploit the prior known support information,which can improve the reconst... Compressed sensing(CS)has been successfully applied to realize image reconstruction.Neural networks have been introduced to the CS of images to exploit the prior known support information,which can improve the reconstruction quality.Capsule Network(Caps Net)is the latest achievement in neural networks,and can well represent the instantiation parameters of a specific type of entity or part of an object.This study aims to propose a Caps Net with a novel dynamic routing to embed the information within the CS framework.The output of the network represents the probability that the index of the nonzero entry exists on the support of the signal of interest.To lead the dynamic routing to the most likely index,a group of prediction vectors is designed determined by the information.Furthermore,the results of experiments on imaging signals are taken for a comparation of the performances among different algorithms.It is concluded that the proposed capsule network(Caps Net)creates higher reconstruction quality at nearly the same time with traditional Caps Net. 展开更多
关键词 Image reconstruction Capsule networks Signal processing
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部