期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
DL-Powered Anomaly Identification System for Enhanced IoT Data Security
1
作者 Manjur Kolhar sultan mesfer aldossary 《Computers, Materials & Continua》 SCIE EI 2023年第12期2857-2879,共23页
In many commercial and public sectors,the Internet of Things(IoT)is deeply embedded.Cyber security threats aimed at compromising the security,reliability,or accessibility of data are a serious concern for the IoT.Due ... In many commercial and public sectors,the Internet of Things(IoT)is deeply embedded.Cyber security threats aimed at compromising the security,reliability,or accessibility of data are a serious concern for the IoT.Due to the collection of data from several IoT devices,the IoT presents unique challenges for detecting anomalous behavior.It is the responsibility of an Intrusion Detection System(IDS)to ensure the security of a network by reporting any suspicious activity.By identifying failed and successful attacks,IDS provides a more comprehensive security capability.A reliable and efficient anomaly detection system is essential for IoT-driven decision-making.Using deep learning-based anomaly detection,this study proposes an IoT anomaly detection system capable of identifying relevant characteristics in a controlled environment.These factors are used by the classifier to improve its ability to identify fraudulent IoT data.For efficient outlier detection,the author proposed a Convolutional Neural Network(CNN)with Long Short Term Memory(LSTM)based Attention Mechanism(ACNN-LSTM).As part of the ACNN-LSTM model,CNN units are deployed with an attention mechanism to avoid memory loss and gradient dispersion.Using the N-BaIoT and IoT-23 datasets,the model is verified.According to the N-BaIoT dataset,the overall accuracy is 99%,and precision,recall,and F1-score are also 0.99.In addition,the IoT-23 dataset shows a commendable accuracy of 99%.In terms of accuracy and recall,it scored 0.99,while the F1-score was 0.98.The LSTM model with attention achieved an accuracy of 95%,while the CNN model achieved an accuracy of 88%.According to the loss graph,attention-based models had lower loss values,indicating that they were more effective at detecting anomalies.In both the N-BaIoT and IoT-23 datasets,the receiver operating characteristic and area under the curve(ROC-AUC)graphs demonstrated exceptional accuracy of 99%to 100%for the Attention-based CNN and LSTM models.This indicates that these models are capable of making precise predictions. 展开更多
关键词 CNN IOT IDS LSTM security threats
下载PDF
Secured Framework for Assessment of Chronic Kidney Disease in Diabetic Patients
2
作者 sultan mesfer aldossary 《Intelligent Automation & Soft Computing》 SCIE 2023年第6期3387-3404,共18页
With the emergence of cloud technologies,the services of healthcare systems have grown.Simultaneously,machine learning systems have become important tools for developing matured and decision-making computer applicatio... With the emergence of cloud technologies,the services of healthcare systems have grown.Simultaneously,machine learning systems have become important tools for developing matured and decision-making computer applications.Both cloud computing and machine learning technologies have contributed significantly to the success of healthcare services.However,in some areas,these technologies are needed to provide and decide the next course of action for patients suffering from diabetic kidney disease(DKD)while ensuring privacy preservation of the medical data.To address the cloud data privacy problem,we proposed a DKD prediction module in a framework using cloud computing services and a data control scheme.This framework can provide improved and early treatment before end-stage renal failure.For prediction purposes,we implemented the following machine learning algorithms:support vector machine(SVM),random forest(RF),decision tree(DT),naïve Bayes(NB),deep learning(DL),and k nearest neighbor(KNN).These classification techniques combined with the cloud computing services significantly improved the decision making in the progress of DKD patients.We applied these classifiers to the UCI Machine Learning Repository for chronic kidney disease using various clinical features,which are categorized as single,combination of selected features,and all features.During single clinical feature experiments,machine learning classifiers SVM,RF,and KNN outperformed the remaining classification techniques,whereas in combined clinical feature experiments,the maximum accuracy was achieved for the combination of DL and RF.All the feature experiments presented increased accuracy and increased F-measure metrics from SVM,DL,and RF. 展开更多
关键词 Cloud computing diabetic kidney disease machine learning prediction system privacy preservation integrity of data secured data transmission homomorphic authentication
下载PDF
DeepGan-Privacy Preserving of HealthCare System Using DL
3
作者 sultan mesfer aldossary 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期2199-2212,共14页
The challenge of encrypting sensitive information of a medical image in a healthcare system is still one that requires a high level of computing complexity,despite the ongoing development of cryptography.After looking... The challenge of encrypting sensitive information of a medical image in a healthcare system is still one that requires a high level of computing complexity,despite the ongoing development of cryptography.After looking through the previous research,it has become clear that the security issues still need to be looked into further because there is room for expansion in the research field.Recently,neural networks have emerged as a cost-effective and effective optimization strategy in terms of providing security for images.This revelation came about as a result of current developments.Nevertheless,such an implementation is a technique that is expensive to compute and does not handle the huge variety of different assaults that may be made on pictures.The primary objective of the system that has been described is to provide evidence of a complex framework in which deep neural networks have been applied to improve the efficiency of basic encryption techniques.Our research has led to the development and proposal of an enhanced version of methods that have previously been used to encrypt pictures.Instead,the generative adversarial network(GAN),commonly known as GAN,will serve as the learning network that generates the private key.The transformation domain,which reflects the one-of-a-kind fashion of the private key that is to be formed,is also meant to lead the learning network in the process of actually accomplishing the private key creation procedure.This scheme may be utilized to train an excellent Deep Neural Networks(DNN)model while instantaneously maintaining the confidentiality of training medical images.It was tested by the proposed approach DeepGAN on open-source medical datasets,and three sets of data:The Ultrasonic Brachial Plexus,the Montgomery County Chest X-ray,and the BraTS18.The findings indicate that it is successful in maintaining both performance and privacy,and the findings of the assessment and the findings of the security investigation suggest that the development of suitable generation technologies is capable of generating private keys with a high level of security. 展开更多
关键词 Healthcare CRYPTOGRAPHY deep learning adversarial network PRIVACY
下载PDF
Recapitulation Web 3.0:Architecture,Features and Technologies,Opportunities and Challenges
4
作者 Amtul Waheed Bhawna Dhupia sultan mesfer aldossary 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1609-1620,共12页
Tim Berners-Lee developed the internet at CERN in early 1990 with fundamental technologies such as HTML,URL,and HTTP which became the foundation of the web.The contemporary web we use today has been much advanced over... Tim Berners-Lee developed the internet at CERN in early 1990 with fundamental technologies such as HTML,URL,and HTTP which became the foundation of the web.The contemporary web we use today has been much advanced over a period of time ever since the innovation of the World Wide Web was introduced.The static web was the first version of the web,which was the read-only web.Succeeding development in web technology is web 3.0 which is a distributed and decentralized web with emerging technologies.This article emphasizes the comparison of important details with the evolution of the web.The paper also demonstrates the transactional architecture of DApps in networks and decentralized state machines.Decentralization,connectivity,the semantic web,augmented reality and artificial intelligence are the signifi-cant features of web 3.0 technology.These features are tremendously used in decision-making on critical issues,which are discussed elaborately in the arti-cle.The paper provides various technologies to implement web 3.0 efficiently.The evolution of web 3.0 brings forth opportunities and challenges.The opportunities are the ownership of the data and a personalized web browsing experience.The main concerns are security and scalability requirements for blockchain transactions.The article also laid out the challenges that can be considered for further research. 展开更多
关键词 Web 3.0 DApps Ethereum smart contracts blockchain
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部