期刊文献+
共找到16,537篇文章
< 1 2 250 >
每页显示 20 50 100
Enhancing Healthcare Data Security and Disease Detection Using Crossover-Based Multilayer Perceptron in Smart Healthcare Systems
1
作者 Mustufa Haider Abidi Hisham Alkhalefah Mohamed K.Aboudaif 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期977-997,共21页
The healthcare data requires accurate disease detection analysis,real-timemonitoring,and advancements to ensure proper treatment for patients.Consequently,Machine Learning methods are widely utilized in Smart Healthca... The healthcare data requires accurate disease detection analysis,real-timemonitoring,and advancements to ensure proper treatment for patients.Consequently,Machine Learning methods are widely utilized in Smart Healthcare Systems(SHS)to extract valuable features fromheterogeneous and high-dimensional healthcare data for predicting various diseases and monitoring patient activities.These methods are employed across different domains that are susceptible to adversarial attacks,necessitating careful consideration.Hence,this paper proposes a crossover-based Multilayer Perceptron(CMLP)model.The collected samples are pre-processed and fed into the crossover-based multilayer perceptron neural network to detect adversarial attacks on themedical records of patients.Once an attack is detected,healthcare professionals are promptly alerted to prevent data leakage.The paper utilizes two datasets,namely the synthetic dataset and the University of Queensland Vital Signs(UQVS)dataset,from which numerous samples are collected.Experimental results are conducted to evaluate the performance of the proposed CMLP model,utilizing various performancemeasures such as Recall,Precision,Accuracy,and F1-score to predict patient activities.Comparing the proposed method with existing approaches,it achieves the highest accuracy,precision,recall,and F1-score.Specifically,the proposedmethod achieves a precision of 93%,an accuracy of 97%,an F1-score of 92%,and a recall of 92%. 展开更多
关键词 Smart healthcare systems multilayer perceptron CYBERSECURITY adversarial attack detection Healthcare 4.0
下载PDF
End-to-End Joint Multi-Object Detection and Tracking for Intelligent Transportation Systems
2
作者 Qing Xu Xuewu Lin +6 位作者 Mengchi Cai Yu‑ang Guo Chuang Zhang Kai Li Keqiang Li Jianqiang Wang Dongpu Cao 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2023年第5期280-290,共11页
Environment perception is one of the most critical technology of intelligent transportation systems(ITS).Motion interaction between multiple vehicles in ITS makes it important to perform multi-object tracking(MOT).How... Environment perception is one of the most critical technology of intelligent transportation systems(ITS).Motion interaction between multiple vehicles in ITS makes it important to perform multi-object tracking(MOT).However,most existing MOT algorithms follow the tracking-by-detection framework,which separates detection and tracking into two independent segments and limit the global efciency.Recently,a few algorithms have combined feature extraction into one network;however,the tracking portion continues to rely on data association,and requires com‑plex post-processing for life cycle management.Those methods do not combine detection and tracking efciently.This paper presents a novel network to realize joint multi-object detection and tracking in an end-to-end manner for ITS,named as global correlation network(GCNet).Unlike most object detection methods,GCNet introduces a global correlation layer for regression of absolute size and coordinates of bounding boxes,instead of ofsetting predictions.The pipeline of detection and tracking in GCNet is conceptually simple,and does not require compli‑cated tracking strategies such as non-maximum suppression and data association.GCNet was evaluated on a multivehicle tracking dataset,UA-DETRAC,demonstrating promising performance compared to state-of-the-art detectors and trackers. 展开更多
关键词 Intelligent transportation systems Joint detection and tracking Global correlation network End-to-end tracking
下载PDF
Aquila Optimization with Machine Learning-Based Anomaly Detection Technique in Cyber-Physical Systems
3
作者 A.Ramachandran K.Gayathri +1 位作者 Ahmed Alkhayyat Rami Q.Malik 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期2177-2194,共18页
Cyber-physical system(CPS)is a concept that integrates every computer-driven system interacting closely with its physical environment.Internet-of-things(IoT)is a union of devices and technologies that provide universa... Cyber-physical system(CPS)is a concept that integrates every computer-driven system interacting closely with its physical environment.Internet-of-things(IoT)is a union of devices and technologies that provide universal interconnection mechanisms between the physical and digital worlds.Since the complexity level of the CPS increases,an adversary attack becomes possible in several ways.Assuring security is a vital aspect of the CPS environment.Due to the massive surge in the data size,the design of anomaly detection techniques becomes a challenging issue,and domain-specific knowledge can be applied to resolve it.This article develops an Aquila Optimizer with Parameter Tuned Machine Learning Based Anomaly Detection(AOPTML-AD)technique in the CPS environment.The presented AOPTML-AD model intends to recognize and detect abnormal behaviour in the CPS environment.The presented AOPTML-AD framework initially pre-processes the network data by converting them into a compatible format.Besides,the improved Aquila optimization algorithm-based feature selection(IAOA-FS)algorithm is designed to choose an optimal feature subset.Along with that,the chimp optimization algorithm(ChOA)with an adaptive neuro-fuzzy inference system(ANFIS)model can be employed to recognise anomalies in the CPS environment.The ChOA is applied for optimal adjusting of the membership function(MF)indulged in the ANFIS method.The performance validation of the AOPTML-AD algorithm is carried out using the benchmark dataset.The extensive comparative study reported the better performance of the AOPTML-AD technique compared to recent models,with an accuracy of 99.37%. 展开更多
关键词 Machine learning industry 4.0 cyber-physical systems anomaly detection aquila optimizer
下载PDF
Multi-Attack Intrusion Detection System for Software-Defined Internet of Things Network
4
作者 Tarcizio Ferrao Franklin Manene Adeyemi Abel Ajibesin 《Computers, Materials & Continua》 SCIE EI 2023年第6期4985-5007,共23页
Currently,the Internet of Things(IoT)is revolutionizing communi-cation technology by facilitating the sharing of information between different physical devices connected to a network.To improve control,customization,f... Currently,the Internet of Things(IoT)is revolutionizing communi-cation technology by facilitating the sharing of information between different physical devices connected to a network.To improve control,customization,flexibility,and reduce network maintenance costs,a new Software-Defined Network(SDN)technology must be used in this infrastructure.Despite the various advantages of combining SDN and IoT,this environment is more vulnerable to various attacks due to the centralization of control.Most methods to ensure IoT security are designed to detect Distributed Denial-of-Service(DDoS)attacks,but they often lack mechanisms to mitigate their severity.This paper proposes a Multi-Attack Intrusion Detection System(MAIDS)for Software-Defined IoT Networks(SDN-IoT).The proposed scheme uses two machine-learning algorithms to improve detection efficiency and provide a mechanism to prevent false alarms.First,a comparative analysis of the most commonly used machine-learning algorithms to secure the SDN was performed on two datasets:the Network Security Laboratory Knowledge Discovery in Databases(NSL-KDD)and the Canadian Institute for Cyberse-curity Intrusion Detection Systems(CICIDS2017),to select the most suitable algorithms for the proposed scheme and for securing SDN-IoT systems.The algorithms evaluated include Extreme Gradient Boosting(XGBoost),K-Nearest Neighbor(KNN),Random Forest(RF),Support Vector Machine(SVM),and Logistic Regression(LR).Second,an algorithm for selecting the best dataset for machine learning in Intrusion Detection Systems(IDS)was developed to enable effective comparison between the datasets used in the development of the security scheme.The results showed that XGBoost and RF are the best algorithms to ensure the security of SDN-IoT and to be applied in the proposed security system,with average accuracies of 99.88%and 99.89%,respectively.Furthermore,the proposed security scheme reduced the false alarm rate by 33.23%,which is a significant improvement over prevalent schemes.Finally,tests of the algorithm for dataset selection showed that the rates of false positives and false negatives were reduced when the XGBoost and RF algorithms were trained on the CICIDS2017 dataset,making it the best for IDS compared to the NSL-KDD dataset. 展开更多
关键词 Dataset selection false alarm intrusion detection systems IoT security machine learning SDN-IoT security software-defined networks
下载PDF
A Novel MegaBAT Optimized Intelligent Intrusion Detection System in Wireless Sensor Networks
5
作者 G.Nagalalli GRavi 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期475-490,共16页
Wireless Sensor Network(WSN),whichfinds as one of the major components of modern electronic and wireless systems.A WSN consists of numerous sensor nodes for the discovery of sensor networks to leverage features like d... Wireless Sensor Network(WSN),whichfinds as one of the major components of modern electronic and wireless systems.A WSN consists of numerous sensor nodes for the discovery of sensor networks to leverage features like data sensing,data processing,and communication.In thefield of medical health care,these network plays a very vital role in transmitting highly sensitive data from different geographic regions and collecting this information by the respective network.But the fear of different attacks on health care data typically increases day by day.In a very short period,these attacks may cause adversarial effects to the WSN nodes.Furthermore,the existing Intrusion Detection System(IDS)suffers from the drawbacks of limited resources,low detection rate,and high computational overhead and also increases the false alarm rates in detecting the different attacks.Given the above-mentioned problems,this paper proposes the novel MegaBAT optimized Long Short Term Memory(MBOLT)-IDS for WSNs for the effective detection of different attacks.In the proposed framework,hyperpara-meters of deep Long Short-Term Memory(LSTM)were optimized by the meta-heuristic megabat algorithm to obtain a low computational overhead and high performance.The experimentations have been carried out using(Wireless Sensor NetworkDetection System)WSN-DS datasets and performance metrics such as accuracy,recall,precision,specificity,and F1-score are calculated and compared with the other existing intelligent IDS.The proposed framework provides outstanding results in detecting the black hole,gray hole,scheduling,flooding attacks and significantly reduces the time complexity,which makes this system suitable for resource-constraint WSNs. 展开更多
关键词 Wireless sensor network intrusion detection systems long short term memory megabat optimization
下载PDF
Aerial multi-spectral AI-based detection system for unexploded ordnance
6
作者 Seungwan Cho Jungmok Ma Oleg A.Yakimenko 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第9期24-37,共14页
Unexploded ordnance(UXO)poses a threat to soldiers operating in mission areas,but current UXO detection systems do not necessarily provide the required safety and efficiency to protect soldiers from this hazard.Recent... Unexploded ordnance(UXO)poses a threat to soldiers operating in mission areas,but current UXO detection systems do not necessarily provide the required safety and efficiency to protect soldiers from this hazard.Recent technological advancements in artificial intelligence(AI)and small unmanned aerial systems(sUAS)present an opportunity to explore a novel concept for UXO detection.The new UXO detection system proposed in this study takes advantage of employing an AI-trained multi-spectral(MS)sensor on sUAS.This paper explores feasibility of AI-based UXO detection using sUAS equipped with a single(visible)spectrum(SS)or MS digital electro-optical(EO)sensor.Specifically,it describes the design of the Deep Learning Convolutional Neural Network for UXO detection,the development of an AI-based algorithm for reliable UXO detection,and also provides a comparison of performance of the proposed system based on SS and MS sensor imagery. 展开更多
关键词 Unexploded ordnance(UXO) Multispectral imaging Small unmanned aerial systems(sUAS) Object detection Deep learning convolutional neural network(DLCNN)
下载PDF
Video Based Vehicle Detection and its Application in Intelligent Transportation Systems 被引量:6
7
作者 Naveen Chintalacheruvu Venkatesan Muthukumar 《Journal of Transportation Technologies》 2012年第4期305-314,共10页
Video based vehicle detection technology is an integral part of Intelligent Transportation System (ITS), due to its non-intrusiveness and comprehensive vehicle behavior data collection capabilities. This paper propose... Video based vehicle detection technology is an integral part of Intelligent Transportation System (ITS), due to its non-intrusiveness and comprehensive vehicle behavior data collection capabilities. This paper proposes an efficient video based vehicle detection system based on Harris-Stephen corner detector algorithm. The algorithm was used to develop a stand alone vehicle detection and tracking system that determines vehicle counts and speeds at arterial roadways and freeways. The proposed video based vehicle detection system was developed to eliminate the need of complex calibration, robustness to contrasts variations, and better performance with low resolutions videos. The algorithm performance for accuracy in vehicle counts and speed was evaluated. The performance of the proposed system is equivalent or better compared to a commercial vehicle detection system. Using the developed vehicle detection and tracking system an advance warning intelligent transportation system was designed and implemented to alert commuters in advance of speed reductions and congestions at work zones and special events. The effectiveness of the advance warning system was evaluated and the impact discussed. 展开更多
关键词 VEHICLE detection VIDEO and IMAGE PROCESSING ADVANCE WARNING systems
下载PDF
A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications 被引量:8
8
作者 Arif Sari 《Journal of Information Security》 2015年第2期142-154,共13页
Cloud computing has become one of the most projecting words in the IT world due to its design for providing computing service as a utility. The typical use of cloud computing as a resource has changed the scenery of c... Cloud computing has become one of the most projecting words in the IT world due to its design for providing computing service as a utility. The typical use of cloud computing as a resource has changed the scenery of computing. Due to the increased flexibility, better reliability, great scalability, and decreased costs have captivated businesses and individuals alike because of the pay-per-use form of the cloud environment. Cloud computing is a completely internet dependent technology where client data are stored and maintained in the data center of a cloud provider like Google, Amazon, Apple Inc., Microsoft etc. The Anomaly Detection System is one of the Intrusion Detection techniques. It’s an area in the cloud environment that is been developed in the detection of unusual activities in the cloud networks. Although, there are a variety of Intrusion Detection techniques available in the cloud environment, this review paper exposes and focuses on different IDS in cloud networks through different categorizations and conducts comparative study on the security measures of Dropbox, Google Drive and iCloud, to illuminate their strength and weakness in terms of security. 展开更多
关键词 ANOMALY detection systems CLOUD COMPUTING CLOUD Environment Intrustion detection systems CLOUD Security
下载PDF
Protecting Against Address Space Layout Randomisation (ASLR) Compromises and Return-to-Libc Attacks Using Network Intrusion Detection Systems 被引量:2
9
作者 David J Day Zheng-Xu Zhao 《International Journal of Automation and computing》 EI 2011年第4期472-483,共12页
Writable XOR executable (W⊕X) and address space layout randomisation (ASLR) have elevated the understanding necessary to perpetrate buffer overflow exploits [1] . However, they have not proved to be a panacea [1 ... Writable XOR executable (W⊕X) and address space layout randomisation (ASLR) have elevated the understanding necessary to perpetrate buffer overflow exploits [1] . However, they have not proved to be a panacea [1 3] , and so other mechanisms, such as stack guards and prelinking, have been introduced. In this paper, we show that host-based protection still does not offer a complete solution. To demonstrate the protection inadequacies, we perform an over the network brute force return-to-libc attack against a preforking concurrent server to gain remote access to a shell. The attack defeats host protection including W⊕X and ASLR. We then demonstrate that deploying a network intrusion detection systems (NIDS) with appropriate signatures can detect this attack efficiently. 展开更多
关键词 Buffer overflow stack overflow intrusion detection systems (IDS) signature rules return-to-libc attack pre-forking.
下载PDF
Fault detection and optimization for networked control systems with uncertain time-varying delay 被引量:2
10
作者 Qing Wang Zhaolei Wang +1 位作者 Chaoyang Dong Erzhuo Niu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第3期544-556,共13页
The observer-based robust fault detection filter design and optimization for networked control systems (NOSs) with uncer- tain time-varying delays are addressed. The NCSs with uncertain time-varying delays are model... The observer-based robust fault detection filter design and optimization for networked control systems (NOSs) with uncer- tain time-varying delays are addressed. The NCSs with uncertain time-varying delays are modeled as parameter-uncertain systems by the matrix theory. Based on the model, an observer-based residual generator is constructed and the sufficient condition for the existence of the desired fault detection filter is derived in terms of the linear matrix inequality. Furthermore, a time domain opti- mization approach is proposed to improve the performance of the fault detection system. To prevent the false alarms, a new thresh- old function is established, and the solution of the optimization problem is given by using the singular value decomposition (SVD) of the matrix. A numerical example is provided to illustrate the effectiveness of the proposed approach. 展开更多
关键词 fault detection networked control systems residual generator time-varying delay time domain optimization approach.
下载PDF
Design of a bilinear fault detection observer for singular bilinear systems 被引量:2
11
作者 Zhanshan WANG Huaguang ZHANG 《控制理论与应用(英文版)》 EI 2007年第1期28-36,共9页
A bilinear fault detection observer is proposed for a class of continuous time singular bilinear systems subject to unknown input disturbance and fault. By singular value decomposition on the original system, a biline... A bilinear fault detection observer is proposed for a class of continuous time singular bilinear systems subject to unknown input disturbance and fault. By singular value decomposition on the original system, a bilinear fault detection observer is proposed for the decomposed system via an algebraic Riccati equation, and the domain of attraction of the state estimation error is estimated. A design procedure is presented to determine the fault detection threshold. A model of flexible joint robot is used to demonstrate the effectiveness of the proposed method. 展开更多
关键词 Singular bilinear systems (SBS) Bilinear observer Fault detection State estimation Domain of attraction
下载PDF
A Robust Fault Detection Approach for Nonlinear Systems 被引量:1
12
作者 Min-Ze Chen Qi Zhao Dong-Hua Zhou 《International Journal of Automation and computing》 EI 2006年第1期23-28,共6页
In this paper, we study the robust fault detection problem of nonlinear systems. Based on the Lyapunov method, a robust fault detection approach for a general class of nonlinear systems is proposed. A nonlinear observ... In this paper, we study the robust fault detection problem of nonlinear systems. Based on the Lyapunov method, a robust fault detection approach for a general class of nonlinear systems is proposed. A nonlinear observer is first provided, and a sufficient condition is given to make the observer locally stable. Then, a practical algorithm is presented to facilitate the realization of the proposed observer for robust fault detection. Finally, a numerical example is provided to show the effectiveness of the proposed approach. 展开更多
关键词 ROBUST nonlinear systems fault detection OBSERVER stability.
下载PDF
Fault detection based on H_∞ states observer for networked control systems 被引量:1
13
作者 Zhu Zhangqing Jiao Xiaocheng 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第2期379-387,共9页
The influence of random short time-delay to networked control systems (NCS) is changed into an unknown bounded uncertain part. Without changing the structure of the system, an Hoo states observer is designed for NCS... The influence of random short time-delay to networked control systems (NCS) is changed into an unknown bounded uncertain part. Without changing the structure of the system, an Hoo states observer is designed for NCS with short time-delay. Based on the designed states observer, a robust fault detection approach is proposed for NCS. In addition, an optimization method for the selection of the detection threshold is introduced for better tradeoff between the robustness and the sensitivity. Finally, some simulation results demonstrate that the presented states observer is robust and the fault detection for NCS is effective. 展开更多
关键词 networked control systems fault detection states observers TIME-DELAYS ROBUSTNESS
下载PDF
Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks 被引量:2
14
作者 Vasaki Ponnusamy Mamoona Humayun +2 位作者 NZJhanjhi Aun Yichiet Maram Fahhad Almufareh 《Computer Systems Science & Engineering》 SCIE EI 2022年第3期1199-1215,共17页
Internet of Things(IoT)devices work mainly in wireless mediums;requiring different Intrusion Detection System(IDS)kind of solutions to leverage 802.11 header information for intrusion detection.Wireless-specific traff... Internet of Things(IoT)devices work mainly in wireless mediums;requiring different Intrusion Detection System(IDS)kind of solutions to leverage 802.11 header information for intrusion detection.Wireless-specific traffic features with high information gain are primarily found in data link layers rather than application layers in wired networks.This survey investigates some of the complexities and challenges in deploying wireless IDS in terms of data collection methods,IDS techniques,IDS placement strategies,and traffic data analysis techniques.This paper’s main finding highlights the lack of available network traces for training modern machine-learning models against IoT specific intrusions.Specifically,the Knowledge Discovery in Databases(KDD)Cup dataset is reviewed to highlight the design challenges of wireless intrusion detection based on current data attributes and proposed several guidelines to future-proof following traffic capture methods in the wireless network(WN).The paper starts with a review of various intrusion detection techniques,data collection methods and placement methods.The main goal of this paper is to study the design challenges of deploying intrusion detection system in a wireless environment.Intrusion detection system deployment in a wireless environment is not as straightforward as in the wired network environment due to the architectural complexities.So this paper reviews the traditional wired intrusion detection deployment methods and discusses how these techniques could be adopted into the wireless environment and also highlights the design challenges in the wireless environment.The main wireless environments to look into would be Wireless Sensor Networks(WSN),Mobile Ad Hoc Networks(MANET)and IoT as this are the future trends and a lot of attacks have been targeted into these networks.So it is very crucial to design an IDS specifically to target on the wireless networks. 展开更多
关键词 Internet of Things MANET intrusion detection systems wireless networks
下载PDF
Searching for exoplanets with HEPS:I.detection probability of Earth-like planets in multiple systems 被引量:1
15
作者 Zhou-Yi Yu Hui-Gen Liu +6 位作者 Ji-Lin Zhou Dong-Hong Wu Ming Yang Songhu Wang Hui Zhang Zi Zhu Jia-Cheng Liu 《Research in Astronomy and Astrophysics》 SCIE CAS CSCD 2019年第1期35-46,共12页
The astrometry method has great advantages in searching for exoplanets in the habitable zone around solar-like stars. However, the presence of multiple planets may cause a problem with degeneracy when trying to comput... The astrometry method has great advantages in searching for exoplanets in the habitable zone around solar-like stars. However, the presence of multiple planets may cause a problem with degeneracy when trying to compute accurate planet parameters from observation data and reduce detectability. The degeneracy problem is extremely critical, especially in a space mission which has limited observation time and cadence. In this series of papers, we study the detectability of habitable Earth-mass planets in different types of multi-planet systems, aiming to find the most favorable targets for the potential space mission–Habitable ExoPlanet Survey(HEPS). In the first paper, we present an algorithm to find planets in the habitable zone around solar-like stars using astrometry. We find the detectability can be well described by planets' signal-to-noise ratio(SNR) and a defined parameter S = M2/(T1-T2)2, where M2 and T2are the mass and period of the second planet, respectively. T1 is the period of the planet in the habitable zone. The parameter S represents the influence of planetary architectures. We fit the detectability as a function of both the SNR of the planet in the habitable zone and the parameter S. An Earth-like planet in a habitable zone is harder to detect(with detectability PHP< 80%) in a system with a hot Jupiter or warm Jupiter(within2 AU), in which the parameter S is large. These results can be used in target selections and to determine the priority of target stars for HEPS, especially when we select and rank nearby planet hosts with a single planet. 展开更多
关键词 ASTROMETRY stars:planetary systems planets and satellites:detection methods:numerical
下载PDF
Cyber Security Analysis and Evaluation for Intrusion Detection Systems 被引量:1
16
作者 Yoosef B.Abushark Asif Irshad Khan +5 位作者 Fawaz Alsolami Abdulmohsen Almalawi Md Mottahir Alam Alka Agrawal Rajeev Kumar Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2022年第7期1765-1783,共19页
Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the world.Machine learning algorithms that are intuitive can analyse risks and respond swiftly to breaches a... Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the world.Machine learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and security issues.It is crucial in offering a proactive security system in the field of cybersecurity.In real time,cybersecurity protects information,information systems,and networks from intruders.In the recent decade,several assessments on security and privacy estimates have noted a rapid growth in both the incidence and quantity of cybersecurity breaches.At an increasing rate,intruders are breaching information security.Anomaly detection,software vulnerability diagnosis,phishing page identification,denial of service assaults,and malware identification are the foremost cyber-security concerns that require efficient clarifications.Practitioners have tried a variety of approaches to address the present cybersecurity obstacles and concerns.In a similar vein,the goal of this research is to assess the idealness of machine learning-based intrusion detection systems under fuzzy conditions using a Multi-Criteria Decision Making(MCDM)-based Analytical Hierarchy Process(AHP)and a Technique for Order of Preference by Similarity to Ideal-Solutions(TOPSIS).Fuzzy sets are ideal for dealing with decision-making scenarios in which experts are unsure of the best course of action.The projected work would support practitioners in identifying,prioritising,and selecting cybersecurityrelated attributes for intrusion detection systems,allowing them to design more optimal and effective intrusion detection systems. 展开更多
关键词 CYBERSECURITY machine learning AHP-TOPSIS fuzzy logic intrusion detection systems
下载PDF
Distributed Fault Detection for Consensus in Second-Order Discrete-Time Multiagent Systems with Adversary 被引量:1
17
作者 权悦 彭力 +1 位作者 吴志海 刘全胜 《Journal of Donghua University(English Edition)》 EI CAS 2014年第4期418-422,共5页
This paper is concerned with distributed fault detection of second-order discrete-time multi-agent systems with adversary,where the adversary is regarded as a slowly time-varying signal.Firstly,a novel intrusion detec... This paper is concerned with distributed fault detection of second-order discrete-time multi-agent systems with adversary,where the adversary is regarded as a slowly time-varying signal.Firstly,a novel intrusion detection scheme based on the theory of unknown input observability( UIO) is proposed. By constructing a bank of UIO,the states of the malicious agents can be directly estimated. Secondly,the faulty-node-removal algorithm is provided.Simulations are also provided to demonstrate the effectiveness of the theoretical results. 展开更多
关键词 second-order discrete-time multi-agent systems distributed detection and identification slowly time-varying signals unknown input observers
下载PDF
Alleviating the Cold Start Problem in Recommender Systems Based on Modularity Maximization Community Detection Algorithm 被引量:4
18
作者 S. Vairachilai M. K. Kavithadevi M. Raja 《Circuits and Systems》 2016年第8期1268-1279,共12页
Recommender system (RS) has become a very important factor in many eCommerce sites. In our daily life, we rely on the recommendation from other persons either by word of mouth, recommendation letters, movie, item and ... Recommender system (RS) has become a very important factor in many eCommerce sites. In our daily life, we rely on the recommendation from other persons either by word of mouth, recommendation letters, movie, item and book reviews printed in newspapers, etc. The typical Recommender Systems are software tools and techniques that provide support to people by identifying interesting products and services in online store. It also provides a recommendation for certain users who search for the recommendations. The most important open challenge in Collaborative filtering recommender system is the cold start problem. If the adequate or sufficient information is not available for a new item or users, the recommender system runs into the cold start problem. To increase the usefulness of collaborative recommender systems, it could be desirable to eliminate the challenge such as cold start problem. Revealing the community structures is crucial to understand and more important with the increasing popularity of online social networks. The community detection is a key issue in social network analysis in which nodes of the communities are tightly connected each other and loosely connected between other communities. Many algorithms like Givan-Newman algorithm, modularity maximization, leading eigenvector, walk trap, etc., are used to detect the communities in the networks. To test the community division is meaningful we define a quality function called modularity. Modularity is that the links within a community are higher than the expected links in those communities. In this paper, we try to give a solution to the cold-start problem based on community detection algorithm that extracts the community from the social networks and identifies the similar users on that network. Hence, within the proposed work several intrinsic details are taken as a rule of thumb to boost the results higher. Moreover, the simulation experiment was taken to solve the cold start problem. 展开更多
关键词 Collaborative Recommender systems Cold Start Problem Community detection Pearson Correlation Coefficient
下载PDF
Study of Intrusion Detection Systems
19
作者 Li-Chin Huang Min-Shiang Hwang 《Journal of Electronic Science and Technology》 CAS 2012年第3期269-275,共7页
Modern network systems have much trouble in security vulnerabilities such as buffer overflow, bugs in Microsoft Internet, sensor network routing protocol too simple, security flaws of applications, and operating syste... Modern network systems have much trouble in security vulnerabilities such as buffer overflow, bugs in Microsoft Internet, sensor network routing protocol too simple, security flaws of applications, and operating systems. Moreover, wireless devices such as smart phones, personal digital assistants (PDAs), and sensors have become economically feasible because of technological advances in wireless communication and manufacturing of small and low-cost sensors. There are typologies of vulnerabilities to be exploited in these devices. In order to improve securities, many mechanisms are adopted, including authentication, cryptography, access control, and intrusion detection systems (IDS). In general, intrusion detection techniques can be categorized into two groups: misuse detection and anomaly detection. The misuse detection systems use patterns of weB-known attacks or weak spots of the systems to identify intrusions. The weakness of misuse detection systems is unable to detect any future (unknown) intrusion until corresponding attack signatures are intruded into the signature database. Anomaly detection methods try to determine whether the deviation is from the established normal usage patterns or not. The critical success of anomaly detection relies on the model of normal behaviors. 展开更多
关键词 Anomaly detection detection systems misuse detection mobilevulnerability wireless.intrusionsecurity
下载PDF
Robust fault detection in linear systemsbased on full-order state observers
20
作者 Aiguo WU Guangren DUAN 《控制理论与应用(英文版)》 EI 2007年第4期325-330,共6页
A parametric approach to robust fault detection in linear systems with unknown disturbances is presented. The residual is generated using full-order state observers (FSO). Based on an analytical solution to a type o... A parametric approach to robust fault detection in linear systems with unknown disturbances is presented. The residual is generated using full-order state observers (FSO). Based on an analytical solution to a type of Sylvester matrix equations, the parameterization of the observer gain matrix is given. In terms of the design degrees of freedom provided by the parametric observer design and a group of introduced parameter vectors, a sufficient and necessary condition for fullorder state observer design with disturbance decoupling is then established. By properly constraining the design parameters according to this proposed condition, the effect of the disturbance on the residual signal is also decoupled, and a simple algorithm is developed. The presented approach offers all the degrees of design freedom. Finally, a numerical example illustrates the effect of the proposed approach. 展开更多
关键词 Robust fault detection Full-order state observers Linear systems Parametric approach
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部