期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Securing Cloud-Encrypted Data:Detecting Ransomware-as-a-Service(RaaS)Attacks through Deep Learning Ensemble
1
作者 Amardeep Singh Hamad ali Abosaq +5 位作者 Saad Arif Zohaib Mushtaq Muhammad Irfan Ghulam Abbas Arshad ali alanoud al mazroa 《Computers, Materials & Continua》 SCIE EI 2024年第4期857-873,共17页
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ... Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and everpresent threat is Ransomware-as-a-Service(RaaS)assaults,which enable even individuals with minimal technical knowledge to conduct ransomware operations.This study provides a new approach for RaaS attack detection which uses an ensemble of deep learning models.For this purpose,the network intrusion detection dataset“UNSWNB15”from the Intelligent Security Group of the University of New South Wales,Australia is analyzed.In the initial phase,the rectified linear unit-,scaled exponential linear unit-,and exponential linear unit-based three separate Multi-Layer Perceptron(MLP)models are developed.Later,using the combined predictive power of these three MLPs,the RansoDetect Fusion ensemble model is introduced in the suggested methodology.The proposed ensemble technique outperforms previous studieswith impressive performance metrics results,including 98.79%accuracy and recall,98.85%precision,and 98.80%F1-score.The empirical results of this study validate the ensemble model’s ability to improve cybersecurity defenses by showing that it outperforms individual MLPmodels.In expanding the field of cybersecurity strategy,this research highlights the significance of combined deep learning models in strengthening intrusion detection systems against sophisticated cyber threats. 展开更多
关键词 Cloud encryption RAAS ENSEMBLE threat detection deep learning CYBERSECURITY
下载PDF
Image Hiding with High Robustness Based on Dynamic Region Attention in the Wavelet Domain
2
作者 Zengxiang Li Yongchong Wu +3 位作者 alanoud al mazroa Donghua Jiang Jianhua Wu Xishun Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期847-869,共23页
Hidden capacity,concealment,security,and robustness are essential indicators of hiding algorithms.Currently,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robus... Hidden capacity,concealment,security,and robustness are essential indicators of hiding algorithms.Currently,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robustness of the algorithms.In practical applications,the container can suffer from damage caused by noise,cropping,and other attacks during transmission,resulting in challenging or even impossible complete recovery of the secret image.An image hiding algorithm based on dynamic region attention in the multi-scale wavelet domain is proposed to address this issue and enhance the robustness of hiding algorithms.In this proposed algorithm,a secret image of size 256×256 is first decomposed using an eight-level Haar wavelet transform.The wavelet transform generates one coefficient in the approximation component and twenty-four detail bands,which are then embedded into the carrier image via a hiding network.During the recovery process,the container image is divided into four non-overlapping parts,each employed to reconstruct a low-resolution secret image.These lowresolution secret images are combined using densemodules to obtain a high-quality secret image.The experimental results showed that even under destructive attacks on the container image,the proposed algorithm is successful in recovering a high-quality secret image,indicating that the algorithm exhibits a high degree of robustness against various attacks.The proposed algorithm effectively addresses the robustness issue by incorporating both spatial and channel attention mechanisms in the multi-scale wavelet domain,making it suitable for practical applications.In conclusion,the image hiding algorithm introduced in this study offers significant improvements in robustness compared to existing algorithms.Its ability to recover high-quality secret images even in the presence of destructive attacksmakes it an attractive option for various applications.Further research and experimentation can explore the algorithm’s performance under different scenarios and expand its potential applications. 展开更多
关键词 Image hiding ROBUSTNESS wavelet transform dynamic region attention
下载PDF
Secure and resilient improved image steganography using hybrid fuzzy neural network with fuzzy logic
3
作者 Sachin Dhawan Hemanta Kumar Bhuyan +4 位作者 Subhendu Kumar Pani Vinayakumar Ravi Rashmi Gupta Arun Rana alanoud al mazroa 《Journal of Safety Science and Resilience》 EI CSCD 2024年第1期91-101,共11页
The exponential growth in communication networks,data technology,advanced libraries,and mainly World Wide Web services has played a pivotal role in facilitating the retrieval of various types of information as needed.... The exponential growth in communication networks,data technology,advanced libraries,and mainly World Wide Web services has played a pivotal role in facilitating the retrieval of various types of information as needed.However,this progress has also led to security concerns related to the transmission of confidential data.Nevertheless,safeguarding these data during communication through insecure channels is crucial for obvious reasons.The emergence of steganography offers a robust approach to concealing confidential information,such as images,audio tracks,text files,and video files,in suitable media carriers.A novel technique is envisioned based on back-propagation learning.According to the proposed method,a hybrid fuzzy neural network(HFNN)is applied to the output obtained from the least significant bit substitution of secret data using pixel value dif-ferences and exploiting the modification direction.Through simulation and test results,it has been observed that the proposed methodology achieves secure steganography and superior visual quality.During the experiments,we observed that for the secret image of the cameraman,the PSNR&MSE values of the proposed technique are 61.963895 and 0.041361,respectively. 展开更多
关键词 Image enhancement Image processing STEGANOGRAPHY Deep learning Fuzzy neural combination
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部