期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Multi-Binary Classifiers Using Optimal Feature Selection for Memory-Saving Intrusion Detection Systems
1
作者 Ye-Seul Kil Yu-Ran Jeon +1 位作者 Sun-Jin Lee Il-Gu Lee 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1473-1493,共21页
With the rise of remote work and the digital industry,advanced cyberattacks have become more diverse and complex in terms of attack types and characteristics,rendering them difficult to detect with conventional intrus... With the rise of remote work and the digital industry,advanced cyberattacks have become more diverse and complex in terms of attack types and characteristics,rendering them difficult to detect with conventional intrusion detection methods.Signature-based intrusion detection methods can be used to detect attacks;however,they cannot detect new malware.Endpoint detection and response(EDR)tools are attracting attention as a means of detecting attacks on endpoints in real-time to overcome the limitations of signature-based intrusion detection techniques.However,EDR tools are restricted by the continuous generation of unnecessary logs,resulting in poor detection performance and memory efficiency.Machine learning-based intrusion detection techniques for responding to advanced cyberattacks are memory intensive,using numerous features;they lack optimal feature selection for each attack type.To overcome these limitations,this study proposes a memory-efficient intrusion detection approach incorporating multi-binary classifiers using optimal feature selection.The proposed model detects multiple types of malicious attacks using parallel binary classifiers with optimal features for each attack type.The experimental results showed a 2.95%accuracy improvement and an 88.05%memory reduction using only six features compared to a model with 18 features.Furthermore,compared to a conventional multi-classification model with simple feature selection based on permutation importance,the accuracy improved by 11.67%and the memory usage decreased by 44.87%.The proposed scheme demonstrates that effective intrusion detection is achievable with minimal features,making it suitable for memory-limited mobile and Internet of Things devices. 展开更多
关键词 Endpoint detection and response feature selection machine learning malware detection
下载PDF
Hemodynamic Response Detection Using Integrated EEG-fNIRS-VPA for BCI
2
作者 Arshia Arif M.Jawad Khan +4 位作者 Kashif Javed Hasan Sajid Saddaf Rubab Noman Naseer Talha Irfan Khan 《Computers, Materials & Continua》 SCIE EI 2022年第1期535-555,共21页
For BCI systems,it is important to have an accurate and less complex architecture to control a device with enhanced accuracy.In this paper,a novel methodology for more accurate detection of the hemodynamic response ha... For BCI systems,it is important to have an accurate and less complex architecture to control a device with enhanced accuracy.In this paper,a novel methodology for more accurate detection of the hemodynamic response has been developed using a multimodal brain-computer interface(BCI).An integrated classifier has been developed for achieving better classification accuracy using two modalities.An integrated EEG-fNIRS-based vector-phase analysis(VPA)has been conducted.An open-source dataset collected at the TechnischeUniversit鋞Berlin,including simultaneous electroencephalography(EEG)and functional near-infrared spectroscopy(fNIRS)signals of 26 healthy participants during n-back tests,has been used for this research.Instrumental and physiological noise removal has been done using preprocessing techniques followed by individually detecting activity in both modalities.With resting state threshold circle,VPA has been used to detect a hemodynamic response in fNIRS signals,whereas phase plots for EEG signals have been constructed using Hilbert Transform to detect the activity in each trial.Multiple threshold circles are drawn in the vector plane,where each circle is drawn after task completion in each trial of EEG signal.Finally,both processes are integrated into one vector-phase plot to get combined detection of hemodynamic response for activity.Results of this study illustrate that the combined EEG-fNIRS VPA yields considerably higher average classification accuracy,that is 91.35%,as compared to other classifiers such as support vector machine(SVM),convolutional neural networks(CNN),deep neural networks(DNN)and VPA(with dual-threshold circles)with classification accuracies 82%,89%,87%and 86%respectively.Outcomes of this research demonstrate that improved classification performance can be feasibly achieved using multimodal VPA for EEG-fNIRS hybrid data. 展开更多
关键词 EEG-fNIRS hybrid BCI vector-phase analysis hemodynamic response detection
下载PDF
The History, Trend, Types, and Mitigation of Distributed Denial of Service Attacks
3
作者 Richard Kabanda Bertrand Byera +1 位作者 Henrietta Emeka Khaja Taiyab Mohiuddin 《Journal of Information Security》 2023年第4期464-471,共8页
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor... Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat. 展开更多
关键词 DDoS (Distributed Denial of Service Attacks) and DoS (Denial of Service Attacks) DAC (DDoS Attack Coefficient) Flood SIEM (Security Information and Event Management) CISA (Cybersecurity and Infrastructure Security Agency) NIST (National Institute of Standards and Technology) XDR (Extended detection and response) ACK-SYN (Synchronize Acknowledge Packet) ICMP (Internet Control Message Protocol) Cyberwarfare
下载PDF
Aeroengine Fault Diagnosis Method Based on Optimized Supervised Kohonen Network
4
作者 郑波 李彦锋 黄洪钟 《Journal of Donghua University(English Edition)》 EI CAS 2015年第6期1029-1033,共5页
To diagnose the aeroengine faults accurately,the supervised Kohonen(S-Kohonen)network is proposed for fault diagnosis.Via adding the output layer behind competitive layer,the network was modified from the unsupervised... To diagnose the aeroengine faults accurately,the supervised Kohonen(S-Kohonen)network is proposed for fault diagnosis.Via adding the output layer behind competitive layer,the network was modified from the unsupervised structure to the supervised structure.Meanwhile,the hybrid particle swarm optimization(H-PSO)was used to optimize the connection weights,after using adaptive inheritance mode(AIM)based on the elite strategy,and adaptive detecting response mechanism(ADRM),HPSO could guide the particles adaptively jumping out of the local solution space,and ensure obtaining the global optimal solution with higher probability.So the optimized S-Kohonen network could overcome the problems of non-identifiability for recognizing the unknown samples,and the non-uniqueness for classification results existing in traditional Kohonen(T-Kohonen)network.The comparison study on the GE90 engine borescope image texture feature recognition is carried out,the research results show that:the optimized S-Kohonen network has a strong ability of practical application in the classification fault diagnosis;the classification accuracy is higher than the common neural network model. 展开更多
关键词 supervised Kohonen network hybrid particle swarm optimization adaptive inheritance mode adaptive detecting response mechanism fault diagnosis electrical sytem
下载PDF
An Attack Modeling Based on Colored Petri Net
5
作者 周世杰 秦志光 +1 位作者 张峰 刘锦德 《Journal of Electronic Science and Technology of China》 2004年第1期47-52,共6页
A color petri net (CPN) based attack modeling approach is addressed. Compared with graph-based modeling, CPN based attack model is flexible enough to model Internet intrusions, because of their static and dynamic feat... A color petri net (CPN) based attack modeling approach is addressed. Compared with graph-based modeling, CPN based attack model is flexible enough to model Internet intrusions, because of their static and dynamic features. The processes and rules of building CPN based attack model from attack tree are also presented. In order to evaluate the risk of intrusion, some cost elements are added to CPN based attack modeling. This extended model is useful in intrusion detection and risk evaluation. Experiences show that it is easy to exploit CPN based attack modeling approach to provide the controlling functions, such as intrusion response and intrusion defense. A case study given in this paper shows that CPN based attack model has many unique characters which attack tree model hasn’t. 展开更多
关键词 petri net color petri net (CPN) intrusion detection and response attack modeling
下载PDF
Electromagneto-mechanical fields of giant magnetostrictive/piezoelectric laminates under concentrated load
6
作者 Yasuhide Shindo Yuzo Kori +1 位作者 Kotaro Mori Fumio Narita 《International Journal of Smart and Nano Materials》 SCIE EI 2012年第2期169-182,共14页
This paper presents the nonlinear electromagneto-mechanical behavior of magnetostrictive/piezoelectric laminates under three-point bending both numerically and experimentally.The laminates are fabricated using thin Te... This paper presents the nonlinear electromagneto-mechanical behavior of magnetostrictive/piezoelectric laminates under three-point bending both numerically and experimentally.The laminates are fabricated using thin Terfenol-D and PZT layers.The three-point bending test was conducted on the Terfenol-D/PZT laminates,and the displacement,induced magnetic field and induced voltage due to mechanical loads were measured.Three-dimensional finite element analysis was also carried out,and the electromagneto-mechanical fields in the laminates were predicted by introducing a second-order magnetoelastic constant for Terfenol-D.Comparison was then made between simulation and experiment. 展开更多
关键词 Magnetostrictive/piezoelectric mechanics finite element method material testing electronic laminates detection and response characteristics smart materials and structures
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部