期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Machine Learning Based Cybersecurity Threat Detection for Secure IoT Assisted Cloud Environment
1
作者 Z.Faizal Khan Saeed M.Alshahrani +6 位作者 Abdulrahman Alghamdi Someah Alangari Nouf Ibrahim Altamami Khalid A.Alissa Sana Alazwari Mesfer Al Duhayyim Fahd N.Al-Wesabi 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期855-871,共17页
The Internet of Things(IoT)is determine enormous economic openings for industries and allow stimulating innovation which obtain between domains in childcare for eldercare,in health service to energy,and in developed t... The Internet of Things(IoT)is determine enormous economic openings for industries and allow stimulating innovation which obtain between domains in childcare for eldercare,in health service to energy,and in developed to transport.Cybersecurity develops a difficult problem in IoT platform whereas the presence of cyber-attack requires that solved.The progress of automatic devices for cyber-attack classifier and detection employing Artificial Intelligence(AI)andMachine Learning(ML)devices are crucial fact to realize security in IoT platform.It can be required for minimizing the issues of security based on IoT devices efficiently.Thus,this research proposal establishes novel mayfly optimized with Regularized Extreme Learning Machine technique called as MFO-RELM model for Cybersecurity Threat classification and detection fromthe cloud and IoT environments.The proposed MFORELM model provides the effective detection of cybersecurity threat which occur in the cloud and IoT platforms.To accomplish this,the MFO-RELM technique pre-processed the actual cloud and IoT data as to meaningful format.Besides,the proposed models will receive the pre-processing data and carry out the classifier method.For boosting the efficiency of the proposed models,theMFOtechnique was utilized to it.The experiential outcome of the proposed technique was tested utilizing the standard CICIDS 2017 dataset,and the outcomes are examined under distinct aspects. 展开更多
关键词 Mayfly optimization machine learning artificial intelligence CYBERSECURITY threat detection
下载PDF
Explainable Classification Model for Android Malware Analysis Using API and Permission-Based Features
2
作者 Nida Aslam Irfan Ullah Khan +5 位作者 Salma Abdulrahman Bader Aisha Alansari Lama Abdullah Alaqeel Razan Mohammed Khormy Zahra Abdultawab AlKubaish Tariq Hussain 《Computers, Materials & Continua》 SCIE EI 2023年第9期3167-3188,共22页
One of the most widely used smartphone operating systems,Android,is vulnerable to cutting-edge malware that employs sophisticated logic.Such malware attacks could lead to the execution of unauthorized acts on the vict... One of the most widely used smartphone operating systems,Android,is vulnerable to cutting-edge malware that employs sophisticated logic.Such malware attacks could lead to the execution of unauthorized acts on the victims’devices,stealing personal information and causing hardware damage.In previous studies,machine learning(ML)has shown its efficacy in detecting malware events and classifying their types.However,attackers are continuously developing more sophisticated methods to bypass detection.Therefore,up-to-date datasets must be utilized to implement proactive models for detecting malware events in Android mobile devices.Therefore,this study employed ML algorithms to classify Android applications into malware or goodware using permission and application programming interface(API)-based features from a recent dataset.To overcome the dataset imbalance issue,RandomOverSampler,synthetic minority oversampling with tomek links(SMOTETomek),and RandomUnderSampler were applied to the Dataset in different experiments.The results indicated that the extra tree(ET)classifier achieved the highest accuracy of 99.53%within an elapsed time of 0.0198 s in the experiment that utilized the RandomOverSampler technique.Furthermore,the explainable Artificial Intelligence(EAI)technique has been applied to add transparency to the high-performance ET classifier.The global explanation using the Shapely values indicated that the top three features contributing to the goodware class are:Ljava/net/URL;->openConnection,Landroid/location/LocationManager;->getLastKgoodwarewnLocation,and Vibrate.On the other hand,the top three features contributing to themalware class are Receive_Boot_Completed,Get_Tasks,and Kill_Background_Processes.It is believed that the proposedmodel can contribute to proactively detectingmalware events in Android devices to reduce the number of victims and increase users’trust. 展开更多
关键词 Android malware machine learning malware detection explainable artificial intelligence cyber security
下载PDF
Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms
3
作者 Iman Almomani Walid El-Shafai +3 位作者 Aala AlKhayer Albandari Alsumayt Sumayh S.Aljameel Khalid Alissa 《Computers, Materials & Continua》 SCIE EI 2023年第2期3515-3537,共23页
Nowadays,there is tremendous growth in biometric authentication and cybersecurity applications.Thus,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private s... Nowadays,there is tremendous growth in biometric authentication and cybersecurity applications.Thus,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private sectors.Therefore,designing and implementing robust security algorithms for users’biometrics is still a hot research area to be investigated.This work presents a powerful biometric security system(BSS)to protect different biometric modalities such as faces,iris,and fingerprints.The proposed BSSmodel is based on hybridizing auto-encoder(AE)network and a chaos-based ciphering algorithm to cipher the details of the stored biometric patterns and ensures their secrecy.The employed AE network is unsupervised deep learning(DL)structure used in the proposed BSS model to extract main biometric features.These obtained features are utilized to generate two random chaos matrices.The first random chaos matrix is used to permute the pixels of biometric images.In contrast,the second random matrix is used to further cipher and confuse the resulting permuted biometric pixels using a two-dimensional(2D)chaotic logisticmap(CLM)algorithm.To assess the efficiency of the proposed BSS,(1)different standardized color and grayscale images of the examined fingerprint,faces,and iris biometrics were used(2)comprehensive security and recognition evaluation metrics were measured.The assessment results have proven the authentication and robustness superiority of the proposed BSSmodel compared to other existing BSSmodels.For example,the proposed BSS succeeds in getting a high area under the receiver operating characteristic(AROC)value that reached 99.97%and low rates of 0.00137,0.00148,and 3516 CMC,2023,vol.74,no.20.00157 for equal error rate(EER),false reject rate(FRR),and a false accept rate(FAR),respectively. 展开更多
关键词 Biometric security deep learning AE network 2D CLM cybersecurity and authentication applications feature extraction unsupervised learning
下载PDF
Optimal Deep Learning Driven Intrusion Detection in SDN-Enabled IoT Environment
4
作者 Mohammed Maray Haya Mesfer Alshahrani +5 位作者 Khalid A.Alissa Najm Alotaibi Abdulbaset Gaddah AliMeree Mahmoud Othman Manar Ahmed Hamza 《Computers, Materials & Continua》 SCIE EI 2023年第3期6587-6604,共18页
In recent years,wireless networks are widely used in different domains.This phenomenon has increased the number of Internet of Things(IoT)devices and their applications.Though IoT has numerous advantages,the commonly-... In recent years,wireless networks are widely used in different domains.This phenomenon has increased the number of Internet of Things(IoT)devices and their applications.Though IoT has numerous advantages,the commonly-used IoT devices are exposed to cyber-attacks periodically.This scenario necessitates real-time automated detection and the mitigation of different types of attacks in high-traffic networks.The Software-Defined Networking(SDN)technique and the Machine Learning(ML)-based intrusion detection technique are effective tools that can quickly respond to different types of attacks in the IoT networks.The Intrusion Detection System(IDS)models can be employed to secure the SDN-enabled IoT environment in this scenario.The current study devises a Harmony Search algorithmbased Feature Selection with Optimal Convolutional Autoencoder(HSAFSOCAE)for intrusion detection in the SDN-enabled IoT environment.The presented HSAFS-OCAE method follows a three-stage process in which the Harmony Search Algorithm-based FS(HSAFS)technique is exploited at first for feature selection.Next,the CAE method is leveraged to recognize and classify intrusions in the SDN-enabled IoT environment.Finally,the Artificial Fish SwarmAlgorithm(AFSA)is used to fine-tune the hyperparameters.This process improves the outcomes of the intrusion detection process executed by the CAE algorithm and shows the work’s novelty.The proposed HSAFSOCAE technique was experimentally validated under different aspects,and the comparative analysis results established the supremacy of the proposed model. 展开更多
关键词 Internet of things SDN controller feature selection hyperparameter tuning autoencoder
下载PDF
Optimal Deep Learning Model Enabled Secure UAV Classification for Industry 4.0
5
作者 Khalid A.Alissa Mohammed Maray +6 位作者 Areej A.Malibari Sana Alazwari Hamed Alqahtani Mohamed K.Nour Marwa Obbaya Mohamed A.Shamseldin Mesfer Al Duhayyim 《Computers, Materials & Continua》 SCIE EI 2023年第3期5349-5367,共19页
Emerging technologies such as edge computing,Internet of Things(IoT),5G networks,big data,Artificial Intelligence(AI),and Unmanned Aerial Vehicles(UAVs)empower,Industry 4.0,with a progressive production methodology th... Emerging technologies such as edge computing,Internet of Things(IoT),5G networks,big data,Artificial Intelligence(AI),and Unmanned Aerial Vehicles(UAVs)empower,Industry 4.0,with a progressive production methodology that shows attention to the interaction between machine and human beings.In the literature,various authors have focused on resolving security problems in UAV communication to provide safety for vital applications.The current research article presents a Circle Search Optimization with Deep Learning Enabled Secure UAV Classification(CSODL-SUAVC)model for Industry 4.0 environment.The suggested CSODL-SUAVC methodology is aimed at accomplishing two core objectives such as secure communication via image steganography and image classification.Primarily,the proposed CSODL-SUAVC method involves the following methods such as Multi-Level Discrete Wavelet Transformation(ML-DWT),CSO-related Optimal Pixel Selection(CSO-OPS),and signcryption-based encryption.The proposed model deploys the CSO-OPS technique to select the optimal pixel points in cover images.The secret images,encrypted by signcryption technique,are embedded into cover images.Besides,the image classification process includes three components namely,Super-Resolution using Convolution Neural Network(SRCNN),Adam optimizer,and softmax classifier.The integration of the CSO-OPS algorithm and Adam optimizer helps in achieving the maximum performance upon UAV communication.The proposed CSODLSUAVC model was experimentally validated using benchmark datasets and the outcomes were evaluated under distinct aspects.The simulation outcomes established the supreme better performance of the CSODL-SUAVC model over recent approaches. 展开更多
关键词 Unmanned Aerial Vehicles Artificial Intelligence emerging technologies Deep Learning Industry 4.0 image steganography
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部