Cyber security addresses the protection of information systems in cyberspace. These systems face multiple attacks on a daily basis, with the level of complication getting increasingly challenging. Despite the existenc...Cyber security addresses the protection of information systems in cyberspace. These systems face multiple attacks on a daily basis, with the level of complication getting increasingly challenging. Despite the existence of multiple solutions, attackers are still quite successful at identifying vulnerabilities to exploit. This is why cyber deception is increasingly being used to divert attackers’ attention and, therefore, enhance the security of information systems. To be effective, deception environments need fake data. This is where Natural Language (NLP) Processing comes in. Many cyber security models have used NLP for vulnerability detection in information systems, email classification, fake citation detection, and many others. Although it is used for text generation, existing models seem to be unsuitable for data generation in a deception environment. Our goal is to use text generation in NLP to generate data in the deception context that will be used to build multi-level deception in information systems. Our model consists of three (3) components, including the connection component, the deception component, composed of several states in which an attacker may be, depending on whether he is malicious or not, and the text generation component. The text generation component considers as input the real data of the information system and allows the production of several texts as output, which are usable at different deception levels.展开更多
Computer grids are infrastructures in which heterogeneous and distributed resources offer very high computing or storage performance. If they offer extreme computing performance, they are also subject to the appearanc...Computer grids are infrastructures in which heterogeneous and distributed resources offer very high computing or storage performance. If they offer extreme computing performance, they are also subject to the appearance of many failures related to this type of architecture. While performing tasks, if the response time of a node in the system incomprehensibly exceeds the requirements of the specifications, the node experiences an omission failure. The task running in the failed node will be unavailable until the node resumes normal activity. Waiting not being a possible solution, many fault tolerance methods have been proposed. Despite this large number of fault tolerance methods on offer, computer grids are still prone to many failures by omission. In this work, a numerical study of the failures by omission which occur in the calculation grids during the execution of the tasks was carried out and a model allowing anticipating its failures was proposed with the formalism PDEVS (Parallel Discret EVent system Specification).展开更多
The Multilayer Perceptron Neural Network (MLPNN) induction technique has been successfully applied to a variety of machine learning tasks, including the extraction and classification of image features. However, not mu...The Multilayer Perceptron Neural Network (MLPNN) induction technique has been successfully applied to a variety of machine learning tasks, including the extraction and classification of image features. However, not much has been done in the application of MLPNN on images obtained by remote sensing. In this article, two automatic classification systems used in image feature extraction and classification from remote sensing data are presented. The first is a combination of two models: a MLPNN induction technique, integrated under ENVI (Environment for Visualizing Images) platform for classification, and a pre-processing model including dark subtraction for the calibration of the image, the Principal Components Analysis (PCA) for band selections and Independent Components Analysis (ICA) as blind source separator for feature extraction of the Landsat image. The second classification system is a MLPNN induction technique based on the Keras platform. In this case, there was no need for pre-processing model. Experimental results show the two classification systems to outperform other typical feature extraction and classification methods in terms of accuracy for some lithological classes including Granite1 class with the highest class accuracies of 96.69% and 92.69% for the first and second classification system respectively. Meanwhile, the two classification systems perform almost equally with the overall accuracies of 53.01% and 49.98% for the first and second models respectively </span><span style="font-family:Verdana;">though the keras model has the advantage of not integrating the pre-processing</span><span style="font-family:Verdana;"> model, hence increasing its efficiency. The application of these two systems to the study area resulted in the generation of an updated geological mapping with six lithological classes detected including the Gneiss, the Micaschist, the Schist and three versions of Granites (Granite1, Granite2 and Granite3).展开更多
文摘Cyber security addresses the protection of information systems in cyberspace. These systems face multiple attacks on a daily basis, with the level of complication getting increasingly challenging. Despite the existence of multiple solutions, attackers are still quite successful at identifying vulnerabilities to exploit. This is why cyber deception is increasingly being used to divert attackers’ attention and, therefore, enhance the security of information systems. To be effective, deception environments need fake data. This is where Natural Language (NLP) Processing comes in. Many cyber security models have used NLP for vulnerability detection in information systems, email classification, fake citation detection, and many others. Although it is used for text generation, existing models seem to be unsuitable for data generation in a deception environment. Our goal is to use text generation in NLP to generate data in the deception context that will be used to build multi-level deception in information systems. Our model consists of three (3) components, including the connection component, the deception component, composed of several states in which an attacker may be, depending on whether he is malicious or not, and the text generation component. The text generation component considers as input the real data of the information system and allows the production of several texts as output, which are usable at different deception levels.
文摘Computer grids are infrastructures in which heterogeneous and distributed resources offer very high computing or storage performance. If they offer extreme computing performance, they are also subject to the appearance of many failures related to this type of architecture. While performing tasks, if the response time of a node in the system incomprehensibly exceeds the requirements of the specifications, the node experiences an omission failure. The task running in the failed node will be unavailable until the node resumes normal activity. Waiting not being a possible solution, many fault tolerance methods have been proposed. Despite this large number of fault tolerance methods on offer, computer grids are still prone to many failures by omission. In this work, a numerical study of the failures by omission which occur in the calculation grids during the execution of the tasks was carried out and a model allowing anticipating its failures was proposed with the formalism PDEVS (Parallel Discret EVent system Specification).
文摘The Multilayer Perceptron Neural Network (MLPNN) induction technique has been successfully applied to a variety of machine learning tasks, including the extraction and classification of image features. However, not much has been done in the application of MLPNN on images obtained by remote sensing. In this article, two automatic classification systems used in image feature extraction and classification from remote sensing data are presented. The first is a combination of two models: a MLPNN induction technique, integrated under ENVI (Environment for Visualizing Images) platform for classification, and a pre-processing model including dark subtraction for the calibration of the image, the Principal Components Analysis (PCA) for band selections and Independent Components Analysis (ICA) as blind source separator for feature extraction of the Landsat image. The second classification system is a MLPNN induction technique based on the Keras platform. In this case, there was no need for pre-processing model. Experimental results show the two classification systems to outperform other typical feature extraction and classification methods in terms of accuracy for some lithological classes including Granite1 class with the highest class accuracies of 96.69% and 92.69% for the first and second classification system respectively. Meanwhile, the two classification systems perform almost equally with the overall accuracies of 53.01% and 49.98% for the first and second models respectively </span><span style="font-family:Verdana;">though the keras model has the advantage of not integrating the pre-processing</span><span style="font-family:Verdana;"> model, hence increasing its efficiency. The application of these two systems to the study area resulted in the generation of an updated geological mapping with six lithological classes detected including the Gneiss, the Micaschist, the Schist and three versions of Granites (Granite1, Granite2 and Granite3).