期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Network Security Enhanced with Deep Neural Network-Based Intrusion Detection System
1
作者 Fatma S.Alrayes mohammed zakariah +2 位作者 Syed Umar Amin Zafar Iqbal Khan Jehad Saad Alqurni 《Computers, Materials & Continua》 SCIE EI 2024年第7期1457-1490,共34页
This study describes improving network security by implementing and assessing an intrusion detection system(IDS)based on deep neural networks(DNNs).The paper investigates contemporary technical ways for enhancing intr... This study describes improving network security by implementing and assessing an intrusion detection system(IDS)based on deep neural networks(DNNs).The paper investigates contemporary technical ways for enhancing intrusion detection performance,given the vital relevance of safeguarding computer networks against harmful activity.The DNN-based IDS is trained and validated by the model using the NSL-KDD dataset,a popular benchmark for IDS research.The model performs well in both the training and validation stages,with 91.30%training accuracy and 94.38%validation accuracy.Thus,the model shows good learning and generalization capabilities with minor losses of 0.22 in training and 0.1553 in validation.Furthermore,for both macro and micro averages across class 0(normal)and class 1(anomalous)data,the study evaluates the model using a variety of assessment measures,such as accuracy scores,precision,recall,and F1 scores.The macro-average recall is 0.9422,the macro-average precision is 0.9482,and the accuracy scores are 0.942.Furthermore,macro-averaged F1 scores of 0.9245 for class 1 and 0.9434 for class 0 demonstrate the model’s ability to precisely identify anomalies precisely.The research also highlights how real-time threat monitoring and enhanced resistance against new online attacks may be achieved byDNN-based intrusion detection systems,which can significantly improve network security.The study underscores the critical function ofDNN-based IDS in contemporary cybersecurity procedures by setting the foundation for further developments in this field.Upcoming research aims to enhance intrusion detection systems by examining cooperative learning techniques and integrating up-to-date threat knowledge. 展开更多
关键词 MACHINE-LEARNING Deep-Learning intrusion detection system security PRIVACY deep neural network NSL-KDD Dataset
下载PDF
CNN Channel Attention Intrusion Detection SystemUsing NSL-KDD Dataset
2
作者 Fatma S.Alrayes mohammed zakariah +2 位作者 Syed Umar Amin Zafar Iqbal Khan Jehad Saad Alqurni 《Computers, Materials & Continua》 SCIE EI 2024年第6期4319-4347,共29页
Intrusion detection systems(IDS)are essential in the field of cybersecurity because they protect networks from a wide range of online threats.The goal of this research is to meet the urgent need for small-footprint,hi... Intrusion detection systems(IDS)are essential in the field of cybersecurity because they protect networks from a wide range of online threats.The goal of this research is to meet the urgent need for small-footprint,highly-adaptable Network Intrusion Detection Systems(NIDS)that can identify anomalies.The NSL-KDD dataset is used in the study;it is a sizable collection comprising 43 variables with the label’s“attack”and“level.”It proposes a novel approach to intrusion detection based on the combination of channel attention and convolutional neural networks(CNN).Furthermore,this dataset makes it easier to conduct a thorough assessment of the suggested intrusion detection strategy.Furthermore,maintaining operating efficiency while improving detection accuracy is the primary goal of this work.Moreover,typical NIDS examines both risky and typical behavior using a variety of techniques.On the NSL-KDD dataset,our CNN-based approach achieves an astounding 99.728%accuracy rate when paired with channel attention.Compared to previous approaches such as ensemble learning,CNN,RBM(Boltzmann machine),ANN,hybrid auto-encoders with CNN,MCNN,and ANN,and adaptive algorithms,our solution significantly improves intrusion detection performance.Moreover,the results highlight the effectiveness of our suggested method in improving intrusion detection precision,signifying a noteworthy advancement in this field.Subsequent efforts will focus on strengthening and expanding our approach in order to counteract growing cyberthreats and adjust to changing network circumstances. 展开更多
关键词 Intrusion detection system(IDS) NSL-KDD dataset deep-learning MACHINE-LEARNING CNN channel Attention network security
下载PDF
YOLO and Blockchain Technology Applied to Intelligent Transportation License Plate Character Recognition for Security 被引量:2
3
作者 Fares Alharbi Reem Alshahrani +2 位作者 mohammed zakariah Amjad Aldweesh Abdulrahman Abdullah Alghamdi 《Computers, Materials & Continua》 SCIE EI 2023年第12期3697-3722,共26页
Privacy and trust are significant issues in intelligent transportation systems(ITS).Data security is critical in ITS systems since sensitive user data is communicated to another user over the internet through wireless... Privacy and trust are significant issues in intelligent transportation systems(ITS).Data security is critical in ITS systems since sensitive user data is communicated to another user over the internet through wireless devices and routes such as radio channels,optical fiber,and blockchain technology.The Internet of Things(IoT)is a network of connected,interconnected gadgets.Privacy issues occasionally arise due to the amount of data generated.However,they have been primarily addressed by blockchain and smart contract technology.While there are still security issues with smart contracts,primarily due to the complexity of writing the code,there are still many challenges to consider when designing blockchain designs for the IoT environment.This study uses traditional blockchain technology with the“You Only Look Once”(YOLO)object detection method to accurately locate and identify license plates.While YOLO and blockchain technologies used for intelligent vehicle license plate recognition are promising,they have received limited research attention.Real-time object identification and recognition would be possible by combining a cutting-edge object detection technique with a regional convolutional neural network(RCNN)built with the tensor flow core open source libraries.This method works reasonably well for identifying any license plate.The Automatic License Plate Recognition(ALPR)approach delivered outstanding results in various datasets.First,with a recognition rate of 96.2%,our system(UFPR-ALPR)surpassed the previously used technology,consisting of 4500 frames and around 150 films.Second,a deep learning algorithm was trained to recognize images of license plate numbers using the UFPR-ALPR dataset.Third,the license plate’s characters were complicated for standard methods to identify because of the shifting lighting correctly.The proposed model,however,produced beneficial outcomes. 展开更多
关键词 Intelligent transportation system blockchain technology license plate recognition PRIVACY YOLO deep learning technique ALPR
下载PDF
Mental Illness Disorder Diagnosis Using Emotion Variation Detection from Continuous English Speech 被引量:1
4
作者 S.Lalitha Deepa Gupta +1 位作者 mohammed zakariah Yousef Ajami Alotaibi 《Computers, Materials & Continua》 SCIE EI 2021年第12期3217-3238,共22页
Automatic recognition of human emotions in a continuous dialog model remains challenging where a speaker’s utterance includes several sentences that may not always carry a single emotion.Limited work with standalone ... Automatic recognition of human emotions in a continuous dialog model remains challenging where a speaker’s utterance includes several sentences that may not always carry a single emotion.Limited work with standalone speech emotion recognition(SER)systems proposed for continuous speech only has been reported.In the recent decade,various effective SER systems have been proposed for discrete speech,i.e.,short speech phrases.It would be more helpful if these systems could also recognize emotions from continuous speech.However,if these systems are applied directly to test emotions from continuous speech,emotion recognition performance would not be similar to that achieved for discrete speech due to the mismatch between training data(from training speech)and testing data(from continuous speech).The problem may possibly be resolved if an existing SER system for discrete speech is enhanced.Thus,in this work the author’s existing effective SER system for multilingual and mixed-lingual discrete speech is enhanced by enriching the cepstral speech feature set with bi-spectral speech features and a unique functional set of Mel frequency cepstral coefficient features derived from a sine filter bank.Data augmentation is applied to combat skewness of the SER system toward certain emotions.Classification using random forest is performed.This enhanced SER system is used to predict emotions from continuous speech with a uniform segmentation method.Due to data scarcity,several audio samples of discrete speech from the SAVEE database that has recordings in a universal language,i.e.,English,are concatenated resulting in multi-emotional speech samples.Anger,fear,sad,and neutral emotions,which are vital during the initial investigation of mentally disordered individuals,are selected to build six categories of multi-emotional samples.Experimental results demonstrate the suitability of the proposed method for recognizing emotions from continuous speech as well as from discrete speech. 展开更多
关键词 Continuous speech cepstral bi-spectral multi-emotional DISCRETE EMOTION filter bank mental illness
下载PDF
Robust Magnification Independent Colon Biopsy Grading System over Multiple Data Sources 被引量:1
5
作者 Tina Babu Deepa Gupta +3 位作者 Tripty Singh Shahin Hameed mohammed zakariah Yousef Ajami Alotaibi 《Computers, Materials & Continua》 SCIE EI 2021年第10期99-128,共30页
Automated grading of colon biopsy images across all magnifications is challenging because of tailored segmentation and dependent features on each magnification.This work presents a novel approach of robust magnificati... Automated grading of colon biopsy images across all magnifications is challenging because of tailored segmentation and dependent features on each magnification.This work presents a novel approach of robust magnification-independent colon cancer grading framework to distinguish colon biopsy images into four classes:normal,well,moderate,and poor.The contribution of this research is to develop a magnification invariant hybrid feature set comprising cartoon feature,Gabor wavelet,wavelet moments,HSV histogram,color auto-correlogram,color moments,and morphological features that can be used to characterize different grades.Besides,the classifier is modeled as a multiclass structure with six binary class Bayesian optimized random forest(BO-RF)classifiers.This study uses four datasets(two collected from Indian hospitals—Ishita Pathology Center(IPC)of 4X,10X,and 40X and Aster Medcity(AMC)of 10X,20X,and 40X—two benchmark datasets—gland segmentation(GlaS)of 20X and IMEDIATREAT of 10X)comprising multiple microscope magnifications.Experimental results demonstrate that the proposed method outperforms the other methods used for colon cancer grading in terms of accuracy(97.25%-IPC,94.40%-AMC,97.58%-GlaS,99.16%-Imediatreat),sensitivity(0.9725-IPC,0.9440-AMC,0.9807-GlaS,0.9923-Imediatreat),specificity(0.9908-IPC,0.9813-AMC,0.9907-GlaS,0.9971-Imediatreat)and F-score(0.9725-IPC,0.9441-AMC,0.9780-GlaS,0.9923-Imediatreat).The generalizability of the model to any magnified input image is validated by training in one dataset and testing in another dataset,highlighting strong concordance in multiclass classification and evidencing its effective use in the first level of automatic biopsy grading and second opinion. 展开更多
关键词 Colon cancer GRADING texture features color features morphological features feature extraction Bayesian optimized random forest classifier
下载PDF
Intrusion Detection System with Customized Machine Learning Techniques for NSL-KDD Dataset 被引量:1
6
作者 mohammed zakariah Salman A.AlQahtani +1 位作者 Abdulaziz M.Alawwad Abdullilah A.Alotaibi 《Computers, Materials & Continua》 SCIE EI 2023年第12期4025-4054,共30页
Modern networks are at risk from a variety of threats as a result of the enormous growth in internet-based traffic.By consuming time and resources,intrusive traffic hampers the efficient operation of network infrastru... Modern networks are at risk from a variety of threats as a result of the enormous growth in internet-based traffic.By consuming time and resources,intrusive traffic hampers the efficient operation of network infrastructure.An effective strategy for preventing,detecting,and mitigating intrusion incidents will increase productivity.A crucial element of secure network traffic is Intrusion Detection System(IDS).An IDS system may be host-based or network-based to monitor intrusive network activity.Finding unusual internet traffic has become a severe security risk for intelligent devices.These systems are negatively impacted by several attacks,which are slowing computation.In addition,networked communication anomalies and breaches must be detected using Machine Learning(ML).This paper uses the NSL-KDD data set to propose a novel IDS based on Artificial Neural Networks(ANNs).As a result,the ML model generalizes sufficiently to perform well on untried data.The NSL-KDD dataset shall be utilized for both training and testing.In this paper,we present a custom ANN model architecture using the Keras open-source software package.The specific arrangement of nodes and layers,along with the activation functions,enhances the model’s ability to capture intricate patterns in network data.The performance of the ANN is carefully tested and evaluated,resulting in the identification of a maximum detection accuracy of 97.5%.We thoroughly compared our suggested model to industry-recognized benchmark methods,such as decision classifier combinations and ML classifiers like k-Nearest Neighbors(KNN),Deep Learning(DL),Support Vector Machine(SVM),Long Short-Term Memory(LSTM),Deep Neural Network(DNN),and ANN.It is encouraging to see that our model consistently outperformed each of these tried-and-true techniques in all evaluations.This result underlines the effectiveness of the suggested methodology by demonstrating the ANN’s capacity to accurately assess the effectiveness of the developed strategy in identifying and categorizing instances of network intrusion. 展开更多
关键词 Artificial neural networks intrusion detection system CLASSIFICATION NSL-KDD dataset machine and deep-learning neural network
下载PDF
Detecting Driver Distraction Using Deep-Learning Approach
7
作者 Khalid A.AlShalfan mohammed zakariah 《Computers, Materials & Continua》 SCIE EI 2021年第7期689-704,共16页
Currently,distracted driving is among the most important causes of traffic accidents.Consequently,intelligent vehicle driving systems have become increasingly important.Recently,interest in driver-assistance systems t... Currently,distracted driving is among the most important causes of traffic accidents.Consequently,intelligent vehicle driving systems have become increasingly important.Recently,interest in driver-assistance systems that detect driver actions and help them drive safely has increased.In these studies,although some distinct data types,such as the physical conditions of the driver,audio and visual features,and vehicle information,are used,the primary data source is images of the driver that include the face,arms,and hands taken with a camera inside the car.In this study,an architecture based on a convolution neural network(CNN)is proposed to classify and detect driver distraction.An efficient CNN with high accuracy is implemented,and to implement intense convolutional networks for large-scale image recognition,a new architecture was proposed based on the available Visual Geometry Group(VGG-16)architecture.The proposed architecture was evaluated using the StateFarm dataset for driver-distraction detection.This dataset is publicly available on Kaggle and is frequently used for this type of research.The proposed architecture achieved 96.95%accuracy. 展开更多
关键词 Deep learning driver-distraction detection convolution neural networks VGG-16
下载PDF
A Secure Framework for WSN-IoT Using Deep Learning for Enhanced Intrusion Detection
8
作者 Chandraumakantham Om Kumar Sudhakaran Gajendran +2 位作者 Suguna Marappan mohammed zakariah Abdulaziz S.Almazyad 《Computers, Materials & Continua》 SCIE EI 2024年第10期471-501,共31页
The security of the wireless sensor network-Internet of Things(WSN-IoT)network is more challenging due to its randomness and self-organized nature.Intrusion detection is one of the key methodologies utilized to ensure... The security of the wireless sensor network-Internet of Things(WSN-IoT)network is more challenging due to its randomness and self-organized nature.Intrusion detection is one of the key methodologies utilized to ensure the security of the network.Conventional intrusion detection mechanisms have issues such as higher misclassification rates,increased model complexity,insignificant feature extraction,increased training time,increased run time complexity,computation overhead,failure to identify new attacks,increased energy consumption,and a variety of other factors that limit the performance of the intrusion system model.In this research a security framework for WSN-IoT,through a deep learning technique is introduced using Modified Fuzzy-Adaptive DenseNet(MF_AdaDenseNet)and is benchmarked with datasets like NSL-KDD,UNSWNB15,CIDDS-001,Edge IIoT,Bot IoT.In this,the optimal feature selection using Capturing Dingo Optimization(CDO)is devised to acquire relevant features by removing redundant features.The proposed MF_AdaDenseNet intrusion detection model offers significant benefits by utilizing optimal feature selection with the CDO algorithm.This results in enhanced Detection Capacity with minimal computation complexity,as well as a reduction in False Alarm Rate(FAR)due to the consideration of classification error in the fitness estimation.As a result,the combined CDO-based feature selection and MF_AdaDenseNet intrusion detection mechanism outperform other state-of-the-art techniques,achieving maximal Detection Capacity,precision,recall,and F-Measure of 99.46%,99.54%,99.91%,and 99.68%,respectively,along with minimal FAR and Mean Absolute Error(MAE)of 0.9%and 0.11. 展开更多
关键词 Deep learning intrusion detection fuzzy rules feature selection false alarm rate accuracy wireless sensor networks
下载PDF
A Novel Optimized Deep Convolutional Neural Network for Efficient Seizure Stage Classification
9
作者 Umapathi Krishnamoorthy Shanmugam Jagan +2 位作者 mohammed zakariah Abdulaziz S.Almazyad K.Gurunathan 《Computers, Materials & Continua》 SCIE EI 2024年第12期3903-3926,共24页
Brain signal analysis from electroencephalogram(EEG)recordings is the gold standard for diagnosing various neural disorders especially epileptic seizure.Seizure signals are highly chaotic compared to normal brain sign... Brain signal analysis from electroencephalogram(EEG)recordings is the gold standard for diagnosing various neural disorders especially epileptic seizure.Seizure signals are highly chaotic compared to normal brain signals and thus can be identified from EEG recordings.In the current seizure detection and classification landscape,most models primarily focus on binary classification—distinguishing between seizure and non-seizure states.While effective for basic detection,these models fail to address the nuanced stages of seizures and the intervals between them.Accurate identification of per-seizure or interictal stages and the timing between seizures is crucial for an effective seizure alert system.This granularity is essential for improving patient-specific interventions and developing proactive seizure management strategies.This study addresses this gap by proposing a novel AI-based approach for seizure stage classification using a Deep Convolutional Neural Network(DCNN).The developed model goes beyond traditional binary classification by categorizing EEG recordings into three distinct classes,thus providing a more detailed analysis of seizure stages.To enhance the model’s performance,we have optimized the DCNN using two advanced techniques:the Stochastic Gradient Algorithm(SGA)and the evolutionary Genetic Algorithm(GA).These optimization strategies are designed to fine-tune the model’s accuracy and robustness.Moreover,k-fold cross-validation ensures the model’s reliability and generalizability across different data sets.Trained and validated on the Bonn EEG data sets,the proposed optimized DCNN model achieved a test accuracy of 93.2%,demonstrating its ability to accurately classify EEG signals.In summary,the key advancement of the present research lies in addressing the limitations of existing models by providing a more detailed seizure classification system,thus potentially enhancing the effectiveness of real-time seizure prediction and management systems in clinical settings.With its inherent classification performance,the proposed approach represents a significant step forward in improving patient outcomes through advanced AI techniques. 展开更多
关键词 Bonn EEG dataset cross-validation genetic algorithm batch normalization seizure classification stochastic gradient
下载PDF
Privacy Preservation in IoT Devices by Detecting Obfuscated Malware Using Wide Residual Network
10
作者 Deema Alsekait mohammed zakariah +2 位作者 Syed Umar Amin Zafar Iqbal Khan Jehad Saad Alqurni 《Computers, Materials & Continua》 SCIE EI 2024年第11期2395-2436,共42页
The widespread adoption of Internet of Things(IoT)devices has resulted in notable progress in different fields,improving operational effectiveness while also raising concerns about privacy due to their vulnerability t... The widespread adoption of Internet of Things(IoT)devices has resulted in notable progress in different fields,improving operational effectiveness while also raising concerns about privacy due to their vulnerability to virus attacks.Further,the study suggests using an advanced approach that utilizes machine learning,specifically the Wide Residual Network(WRN),to identify hidden malware in IoT systems.The research intends to improve privacy protection by accurately identifying malicious software that undermines the security of IoT devices,using the MalMemAnalysis dataset.Moreover,thorough experimentation provides evidence for the effectiveness of the WRN-based strategy,resulting in exceptional performance measures such as accuracy,precision,F1-score,and recall.The study of the test data demonstrates highly impressive results,with a multiclass accuracy surpassing 99.97%and a binary class accuracy beyond 99.98%.The results emphasize the strength and dependability of using advanced deep learning methods such as WRN for identifying hidden malware risks in IoT environments.Furthermore,a comparison examination with the current body of literature emphasizes the originality and efficacy of the suggested methodology.This research builds upon previous studies that have investigated several machine learning methods for detecting malware on IoT devices.However,it distinguishes itself by showcasing exceptional performance metrics and validating its findings through thorough experimentation with real-world datasets.Utilizing WRN offers benefits in managing the intricacies of malware detection,emphasizing its capacity to enhance the security of IoT ecosystems.To summarize,this work proposes an effective way to address privacy concerns on IoT devices by utilizing advanced machine learning methods.The research provides useful insights into the changing landscape of IoT cybersecurity by emphasizing methodological rigor and conducting comparative performance analysis.Future research could focus on enhancing the recommended approach by adding more datasets and leveraging real-time monitoring capabilities to strengthen IoT devices’defenses against new cybersecurity threats. 展开更多
关键词 Obfuscated malware detection IoT devices Wide Residual Network(WRN) malware detection machine learning
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部