期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Advanced Optimized Anomaly Detection System for IoT Cyberattacks Using Artificial Intelligence 被引量:1
1
作者 Ali Hamid Farea omar h.alhazmi Kerem Kucuk 《Computers, Materials & Continua》 SCIE EI 2024年第2期1525-1545,共21页
While emerging technologies such as the Internet of Things(IoT)have many benefits,they also pose considerable security challenges that require innovative solutions,including those based on artificial intelligence(AI),... While emerging technologies such as the Internet of Things(IoT)have many benefits,they also pose considerable security challenges that require innovative solutions,including those based on artificial intelligence(AI),given that these techniques are increasingly being used by malicious actors to compromise IoT systems.Although an ample body of research focusing on conventional AI methods exists,there is a paucity of studies related to advanced statistical and optimization approaches aimed at enhancing security measures.To contribute to this nascent research stream,a novel AI-driven security system denoted as“AI2AI”is presented in this work.AI2AI employs AI techniques to enhance the performance and optimize security mechanisms within the IoT framework.We also introduce the Genetic Algorithm Anomaly Detection and Prevention Deep Neural Networks(GAADPSDNN)sys-tem that can be implemented to effectively identify,detect,and prevent cyberattacks targeting IoT devices.Notably,this system demonstrates adaptability to both federated and centralized learning environments,accommodating a wide array of IoT devices.Our evaluation of the GAADPSDNN system using the recently complied WUSTL-IIoT and Edge-IIoT datasets underscores its efficacy.Achieving an impressive overall accuracy of 98.18%on the Edge-IIoT dataset,the GAADPSDNN outperforms the standard deep neural network(DNN)classifier with 94.11%accuracy.Furthermore,with the proposed enhancements,the accuracy of the unoptimized random forest classifier(80.89%)is improved to 93.51%,while the overall accuracy(98.18%)surpasses the results(93.91%,94.67%,94.94%,and 94.96%)achieved when alternative systems based on diverse optimization techniques and the same dataset are employed.The proposed optimization techniques increase the effectiveness of the anomaly detection system by efficiently achieving high accuracy and reducing the computational load on IoT devices through the adaptive selection of active features. 展开更多
关键词 Internet of Things SECURITY anomaly detection and prevention system artificial intelligence optimization techniques
下载PDF
Green5G: Enhancing Capacity and Coverage in Device-to-Device Communication 被引量:2
2
作者 Abdul Rehman Javed Rabia Abid +4 位作者 Bakhtawar Aslam Hafiza Ammara Khalid Mohammad Zubair Khan omar h.alhazmi Muhammad Rizwan 《Computers, Materials & Continua》 SCIE EI 2021年第5期1933-1950,共18页
With the popularity of green computing and the huge usage of networks,there is an acute need for expansion of the 5G network.5G is used where energy efficiency is the highest priority,and it can play a pinnacle role i... With the popularity of green computing and the huge usage of networks,there is an acute need for expansion of the 5G network.5G is used where energy efficiency is the highest priority,and it can play a pinnacle role in helping every industry to hit sustainability.While in the 5G network,conventional performance guides,such as network capacity and coverage are still major issues and need improvements.Device to Device communication(D2D)communication technology plays an important role to improve the capacity and coverage of 5G technology using different techniques.The issue of energy utilization in the IoT based system is a significant exploration center.Energy optimizationin D2D communication is an important point.We need to resolve this issue for increasing system performance.Green IoT speaks to the issue of lessening energy utilization of IoT gadgets which accomplishes a supportable climate for IoT systems.In this paper,we improve the capacity and coverage of 5G technology using Multiple Inputs Multiple Outputs(MU-MIMO).MUMIMO increases the capacity of 5G in D2D communication.We also present all the problems faced by 5G technology and proposed architecture to enhance system performance. 展开更多
关键词 Green computing 5G energy efficiency resource optimization device to device communication multiple input multiple output
下载PDF
Lightweight Algorithm for MQTT Protocol to Enhance Power Consumption in Healthcare Environment 被引量:1
3
作者 Anwar D.Alhejaili omar h.alhazmi 《Journal on Internet of Things》 2022年第1期21-33,共13页
Internet of things(IoT)is used in various fields such as smart cities,smart home,manufacturing industries,and healthcare.Its application in healthcare has many advantages and disadvantages.One of its most common proto... Internet of things(IoT)is used in various fields such as smart cities,smart home,manufacturing industries,and healthcare.Its application in healthcare has many advantages and disadvantages.One of its most common protocols is Message Queue Telemetry Transport(MQTT).MQTT protocol works as a publisher/subscriber which is suitable for IoT devices with limited power.One of the drawbacks of MQTT is that it is easy to manipulate.The default security provided by MQTT during user authentication,through username and password,does not provide any type of data encryption,to ensure confidentiality or integrity.This paper focuses on the security of IoT healthcare over the MQTT protocol,through the implementation of lightweight generating and key exchange algorithms.The research contribution of this paper is twofold.The first one is to implement a lightweight generating and key exchange algorithm for MQTT protocol,with the key length of 64 bits through OMNET++simulation.The second one is to obtain lower power consumption from some existing algorithms.Moreover,the power consumption through using the proposed algorithm is 0.78%,1.16%,and 1.93% of power for 256 bits,512 bits,and 1024 respectively.On the other hand,the power consumption without using the encryption is 0.25%,0.51%,and 1.03% for the same three payloads length. 展开更多
关键词 Lightweight algorithm IoT healthcare MQTT power consumption
下载PDF
Selecting Best Software Vulnerability Scanner Using Intuitionistic Fuzzy Set TOPSIS
4
作者 Navneet Bhatt Jasmine Kaur +1 位作者 Adarsh Anand omar h.alhazmi 《Computers, Materials & Continua》 SCIE EI 2022年第8期3613-3629,共17页
Software developers endeavor to build their products with the least number of bugs.Despite this,many vulnerabilities are detected in software that threatens its integrity.Various automated software i.e.,vulnerability ... Software developers endeavor to build their products with the least number of bugs.Despite this,many vulnerabilities are detected in software that threatens its integrity.Various automated software i.e.,vulnerability scanners,are available in the market which helps detect and manage vulnerabilities in a computer,application,or a network.Hence,the choice of an appropriate vulnerability scanner is crucial to ensure efficient vulnerability management.The current work serves a dual purpose,first,to identify the key factors which affect the vulnerability discovery process in a network.The second,is to rank the popular vulnerability scanners based on the identified attributes.This will aid the firm in determining the best scanner for them considering multiple aspects.The multi-criterion decision making based ranking approach has been discussed using the Intuitionistic Fuzzy set(IFS)and Technique for Order of Preference by Similarity to Ideal Solution(TOPSIS)to rank the various scanners.Using IFS TOPSIS,the opinion of a whole group could be simultaneously considered in the vulnerability scanner selection.In this study,five popular vulnerability scanners,namely,Nessus,Fsecure Radar,Greenbone,Qualys,and Nexpose have been considered.The inputs of industry specialists i.e.,people who deal in software security and vulnerability management process have been taken for the ranking process.Using the proposed methodology,a hierarchical classification of the various vulnerability scanners could be achieved.The clear enumeration of the steps allows for easy adaptability of the model to varied situations.This study will help product developers become aware of the needs of the market and design better scanners.And from the user’s point of view,it will help the system administrators in deciding which scanner to deploy depending on the company’s needs and preferences.The current work is the first to use a Multi Criterion Group Decision Making technique in vulnerability scanner selection. 展开更多
关键词 Intuitionistic fuzzy set group decision making multi-criteria decision making(MCDM) ranking algorithm software security TOPSIS VULNERABILITY vulnerability scanners
下载PDF
Optimal Sprint Length Determination for Agile-Based Software Development
5
作者 Adarsh Anand Jasmine Kaur +1 位作者 Ompal Singh omar h.alhazmi 《Computers, Materials & Continua》 SCIE EI 2021年第9期3693-3712,共20页
A carefully planned software development process helps in maintaining the quality of the software.In today’s scenario the primitive software development models have been replaced by the Agile based models like SCRUM,... A carefully planned software development process helps in maintaining the quality of the software.In today’s scenario the primitive software development models have been replaced by the Agile based models like SCRUM,KANBAN,LEAN,etc.Although,every framework has its own boon,the reason for widespread acceptance of the agile-based approach is its evolutionary nature that permits change in the path of software development.The development process occurs in iterative and incremental cycles called sprints.In SCRUM,which is one of the most widely used agile-based software development modeling framework;the sprint length is fixed throughout the process wherein;it is usually taken to be 1–4 weeks.But in practical application,the sprint length should be altered intuitively as per the requirement.To overcome this limitation,in this paper,a methodical work has been presented that determines the optimal sprint length based on two varied and yet connected attributes;the cost incurred and the work intensity required.The approach defines the number of tasks performed in each sprint along with the corresponding cost incurred in performing those tasks.Multi-attribute utility theory(MAUT),a multi-criterion decision making approach,has been utilized to find the required trade-off between two attributes under consideration.The proposed modeling framework has been validated using real life data set.With the use of the model,the optimal sprint for each sprint could be evaluated which was much shorter than the original length.Thus,the results obtained validate the proposal of a dynamic sprint length that can be determined before the start of each sprint.The structure would help in cost as well as time savings for a firm. 展开更多
关键词 Agile principles agile-based software development dynamic sprint length multi-attribute utility theory scrum software development life cycle
下载PDF
Software Reliability Assessment Using Hybrid Neuro-Fuzzy Model
6
作者 Parul Gandhi Mohammad Zubair Khan +3 位作者 Ravi Kumar Sharma omar h.alhazmi Surbhi Bhatia Chinmay Chakraborty 《Computer Systems Science & Engineering》 SCIE EI 2022年第6期891-902,共12页
Software reliability is the primary concern of software developmentorganizations, and the exponentially increasing demand for reliable softwarerequires modeling techniques to be developed in the present era. Small unn... Software reliability is the primary concern of software developmentorganizations, and the exponentially increasing demand for reliable softwarerequires modeling techniques to be developed in the present era. Small unnoticeable drifts in the software can culminate into a disaster. Early removal of theseerrors helps the organization improve and enhance the software’s reliability andsave money, time, and effort. Many soft computing techniques are available toget solutions for critical problems but selecting the appropriate technique is abig challenge. This paper proposed an efficient algorithm that can be used forthe prediction of software reliability. The proposed algorithm is implementedusing a hybrid approach named Neuro-Fuzzy Inference System and has also beenapplied to test data. In this work, a comparison among different techniques of softcomputing has been performed. After testing and training the real time data withthe reliability prediction in terms of mean relative error and mean absolute relativeerror as 0.0060 and 0.0121, respectively, the claim has been verified. The resultsclaim that the proposed algorithm predicts attractive outcomes in terms of meanabsolute relative error plus mean relative error compared to the other existingmodels that justify the reliability prediction of the proposed model. Thus, thisnovel technique intends to make this model as simple as possible to improvethe software reliability. 展开更多
关键词 Software quality RELIABILITY neural networks fuzzy logic neuro-fuzzy inference system
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部