-
181
Hybrid Big Bang-Big crunch with cuckoo search for feature selection in credit card fraud detection
Published 2025-07-01Get full text
Article -
182
Cyberattack Detection Systems in Industrial Internet of Things (IIoT) Networks in Big Data Environments
Published 2025-03-01Get full text
Article -
183
A Novel Approach to Many-to-Many User Authentication in Different Information Systems
Published 2013-08-01Get full text
Article -
184
SGAK: A Robust ECC-Based Authenticated Key Exchange Protocol for Smart Grid Networks
Published 2024-01-01Get full text
Article -
185
MAD-RAPPEL: Mobility Aware Data Replacement And Prefetching Policy Enrooted LBS
Published 2022-06-01Get full text
Article -
186
Leveraging explainable artificial intelligence for early detection and mitigation of cyber threat in large-scale network environments
Published 2025-07-01“…The Mayfly Optimization Algorithm (MOA) is then utilized for feature selection, effectively mitigating computational complexity. …”
Get full text
Article -
187
Deep Learning Network Selection and Optimized Information Fusion for Enhanced COVID-19 Detection: A Literature Review
Published 2025-07-01“…The rapid spread of COVID-19 increased the need for speedy diagnostic tools, which led scientists to conduct extensive research on deep learning (DL) applications that use chest imaging, such as chest X-ray (CXR) and computed tomography (CT). This review examines the development and performance of DL architectures, notably convolutional neural networks (CNNs) and emerging vision transformers (ViTs), in identifying COVID-19-related lung abnormalities. …”
Get full text
Article -
188
Distributed Denial of Service Attack Detection in Software-Defined Networks Using Decision Tree Algorithms
Published 2025-03-01Get full text
Article -
189
Optimizing Fingerprint Identification: CNNs With Raw Images Versus Handcrafted Features for Real-Time Systems
Published 2025-01-01“…This study investigates the balance between accuracy and computational efficiency(thereby speed) by comparing two approaches: training a Convolutional Neural Network (CNN) with raw fingerprint images and training a CNN using handcrafted fingerprint features. …”
Get full text
Article -
190
-
191
A stacked ensemble approach to detect cyber attacks based on feature selection techniques
Published 2024-01-01Get full text
Article -
192
Knowledge Improved Hybrid DNN–KAN Framework for Intrusion Detection in Wireless Sensor Networks
Published 2025-01-01Get full text
Article -
193
-
194
-
195
-
196
Robust deepfake detection using Long Short-Term Memory networks for video authentication
Published 2025-03-01Get full text
Article -
197
Information Security and Artificial Intelligence–Assisted Diagnosis in an Internet of Medical Thing System (IoMTS)
Published 2024-01-01“…The internet of medical thing system (IoMTS) comprises the fifth-generation (5G) networking technology that collects and shares digital data from signal- or image-capturing devices through computer and wireless communication networks. …”
Get full text
Article -
198
A Malware Detection Method Based on Genetic Algorithm Optimized CNN-SENet Network
Published 2024-01-01“…To this end, this paper proposes a malware detection method based on genetic algorithm optimization of the CNN-SENet network, which firstly introduces the SENet attention mechanism into the convolutional neural network to enhance the spatial feature extraction capability of the model; then, the application programming interface (API) sequences corresponding to different software behaviors are processed by segmentation and de-duplication, which in turn leads to the sequence feature extraction through the CNN-SENet model; finally, genetic algorithm is used to optimize the hyperparameters of CNN-SENet network to reduce the computational overhead of CNN and to achieve the recognition and classification of different malware at the output layer. …”
Get full text
Article -
199
ABA-IDS: Attention-Based Autoencoder for Intrusion Detection in Assistive Mobility Robotic Network
Published 2025-01-01Get full text
Article -
200
Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network
Published 2023-08-01“…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
Get full text
Article