Protecting Autonomous UAVs from GPS Spoofing and Jamming: A Comparative Analysis of Detection and Mitigation Techniques DOI
Princess Chimmy Joeaneke,

Onyinye Obioha-Val,

Oluwaseun Oladeji Olaniyi

et al.

SSRN Electronic Journal, Journal Year: 2024, Volume and Issue: unknown

Published: Jan. 1, 2024

Language: Английский

Harnessing Machine Learning Intelligence Against Cyber Threats DOI
Bhupinder Singh, Christian Kaunert, Ritu Gautam

et al.

Advances in business strategy and competitive advantage book series, Journal Year: 2024, Volume and Issue: unknown, P. 319 - 352

Published: Aug. 28, 2024

The spread of cyberthreats in the digital age presents serious concerns to national security, stability economy, and personal privacy. Traditional security methods are unable keep up with increasing sophistication size cyberattacks. With facilitating quick identification mitigation cyberthreats, machine learning (ML) has revolutionary potential improve cybersecurity measures. But applying ML this field also brings important moral legal issues, particularly light international cybercrimes. This chapter comprehensively explores learning's dual nature cybersecurity, emphasizing both its advantages disadvantages. It talk about state cyber threats today, how is being incorporated into ramifications using investigations.

Language: Английский

Citations

4

Weakly-supervised thyroid ultrasound segmentation: Leveraging multi-scale consistency, contextual features, and bounding box supervision for accurate target delineation DOI
Mohammed Aly

Computers in Biology and Medicine, Journal Year: 2025, Volume and Issue: 186, P. 109669 - 109669

Published: Jan. 13, 2025

Language: Английский

Citations

0

Enhancing Clustering Efficiency in Heterogeneous Wireless Sensor Network Protocols Using the K-Nearest Neighbours Algorithm DOI Creative Commons
Abdulla Juwaied, Lidia Jackowska-Strumiłło, Artur Sierszeń

et al.

Sensors, Journal Year: 2025, Volume and Issue: 25(4), P. 1029 - 1029

Published: Feb. 9, 2025

Wireless Sensor Networks are formed by tiny, self-contained, battery-powered computers with radio links that can sense their surroundings for events of interest and store process the sensed data. nodes wirelessly communicate each other to relay information a central base station. Energy consumption is most critical parameter in (WSNs). Network lifespan directly influenced energy sensor nodes. All sensors network send receive data from station (BS) using different routing protocols algorithms. These use two main types clustering: hierarchical clustering flat clustering. Consequently, effective within (WSN) essential establishing secure connections among nodes, ensuring stable lifetime. This paper introduces novel approach improve efficiency, reduce length connections, increase lifetime heterogeneous employing K-Nearest Neighbours (KNN) algorithm optimise node selection mechanisms four protocols: Low-Energy Adaptive Clustering Hierarchy (LEACH), Stable Election Protocol (SEP), Threshold-sensitive Efficient (TEEN), Distributed Energy-efficient (DEC). Simulation results obtained MATLAB (R2024b) demonstrate efficacy proposed algorithm, revealing modified achieve shorter distances between cluster heads reduced consumption, improved compared original protocols. The KNN-based enhances network’s operational efficiency security, offering robust solution management WSNs.

Language: Английский

Citations

0

Ensemble-Based Machine Learning Techniques for Adaptive Wireless Sensor Networks DOI

Swathypriyadharsini Palaniswamy,

T. N. Chitradevi,

Prabha Devi D

et al.

Advances in computer and electrical engineering book series, Journal Year: 2025, Volume and Issue: unknown, P. 319 - 360

Published: Feb. 7, 2025

Wireless sensor networks (WSN) have gained popularity in next-generation IoT connectivity due to their sustainability and low maintenance. However, the dynamic nature of energy sources environmental conditions presents challenges security reliability WSNs, particularly mitigating various network attacks. Machine learning offers solutions these by enabling adaptive real-time behaviour. This chapter addresses WSN applying ML techniques a multi-class dataset attacks such as normal, flooding, TDMA, grayhole, blackhole. SMOTE is applied manage class imbalance, an ensemble framework proposed with classifiers logistic regression, random forest, gradient boost, xtreme decision tree, LGBM, SVM, CatBoost were predict WSN-DS dataset. The models are rigorously tested evaluated using accuracy, precision, recall, F1-score. Gradient catboost outperform all other achieving 98% accuracy.

Language: Английский

Citations

0

Unveiling the Invisible: Powering Security Threat Detection in WSN With AI DOI

K. P. Uvarajan,

Kishore Balasubramanian,

C. Gowri Shankar

et al.

Concurrency and Computation Practice and Experience, Journal Year: 2025, Volume and Issue: 37(9-11)

Published: April 11, 2025

ABSTRACT Security in wireless sensor networks (WSNs) is of paramount importance due to their pervasive deployment critical infrastructure and sensitive environments. Despite ubiquitous nature, WSNs are vulnerable various security threats, ranging from unauthorized access data manipulation network disruption. In response these challenges, this paper proposes a novel approach leveraging the Base Stacked Long Short‐Term Memory with Attention Models AdaBoost Ensemble (BSLAM‐AE) architecture enhance WSNs. The proposed model designed address unique characteristics challenges WSNs, combining deep learning ensemble techniques detect mitigate threats effectively. BSLAM‐AE incorporates stacked LSTM attention mechanisms, enabling analysis time‐series detection subtle anomalies or breaches. addition, an ensemble‐learning component iteratively trains set models improve predictive accuracy robustness. Implemented PyCharm integrated development environment, experimental results demonstrate efficacy model, achieving impressive 98% detecting Overall, represents significant advancement WSN security, offering comprehensive efficient solution for mitigating threats. By techniques, provides enhanced reliability, thereby safeguarding against potential attacks ensuring integrity availability infrastructure.

Language: Английский

Citations

0

‘As of my last knowledge update’: How is content generated by ChatGPT infiltrating scientific papers published in premier journals? DOI Creative Commons
Artur Strzelecki

Learned Publishing, Journal Year: 2024, Volume and Issue: 38(1)

Published: Dec. 24, 2024

Abstract The aim of this paper is to highlight the situation whereby content generated by large language model ChatGPT appearing in peer‐reviewed papers journals recognized publishers. demonstrates how identify sections that indicate a text fragment was generated, is, entirely created, ChatGPT. To prepare an illustrative compilation appear indexed Web Science and Scopus databases possessing Impact Factor CiteScore indicators, SPAR4SLR method used, which mainly applied systematic literature reviews. Three main findings are presented: highly regarded premier journals, articles bear hallmarks AI models, whose use not declared authors (1); many these identified already receiving citations from other scientific works, also placed found (2); and, most belong disciplines medicine computer science, but there such as environmental engineering, sociology, education, economics management (3). This aims continue add recently initiated discussion on models like creation scholarly works.

Language: Английский

Citations

2

Reinforcing Network Security: Network Attack Detection Using Random Grove Blend in Weighted MLP Layers DOI Creative Commons
Adel Binbusayyis

Mathematics, Journal Year: 2024, Volume and Issue: 12(11), P. 1720 - 1720

Published: May 31, 2024

In the modern world, evolution of internet supports automation several tasks, such as communication, education, sports, etc. Conversely, it is prone to types attacks that disturb data transfer in network. Efficient attack detection needed avoid consequences an attack. Traditionally, manual limited by human error, less efficiency, and a time-consuming mechanism. To address problem, large number existing methods focus on techniques for better efficacy detection. However, improvement significant factors accuracy, handling larger data, over-fitting versus fitting, tackle this issue, proposed system utilized Random Grove Blend Weighted MLP (Multi-Layer Perceptron) Layers classify network attacks. The used its advantages solving complex non-linear problems, datasets, high accuracy. computation requirements great deal labeled training data. resolve random info grove blend weight weave layer are incorporated into attain this, UNSW–NB15 dataset, which comprises nine attack, detect Moreover, Scapy tool (2.4.3) generate real-time dataset classifying efficiency presented mechanism calculated with performance metrics. Furthermore, internal external comparisons processed respective research reveal system’s efficiency. model utilizing attained accuracy 98%. Correspondingly, intended contribute associated enhancing security.

Language: Английский

Citations

1

Revolutionizing online education: Advanced facial expression recognition for real-time student progress tracking via deep learning model DOI Creative Commons
Mohammed Aly

Multimedia Tools and Applications, Journal Year: 2024, Volume and Issue: unknown

Published: June 5, 2024

Abstract This paper presents a groundbreaking online educational platform that utilizes facial expression recognition technology to track the progress of students within classroom environment. Through periodic image capture and data extraction, employs ResNet50, CBAM, TCNs for enhanced recognition. Achieving accuracies 91.86%, 91.71%, 95.85%, 97.08% on RAF-DB, FER2013, CK + , KDEF datasets, respectively, proposed model surpasses initial ResNet50 in accuracy detection students' learning states. Comparative evaluations against state-of-the-art models using datasets underscore significance results institutions. By enhancing emotion accuracy, improving feature relevance, capturing temporal dynamics, enabling real-time monitoring, ensuring robustness adaptability environments, this approach offers valuable insights educators enhance teaching strategies student outcomes. The combined capabilities contribute uniquely dynamic changes expressions over time, thereby facilitating accurate interpretation emotions engagement levels more effective monitoring behaviors real-time.

Language: Английский

Citations

1

A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model DOI Creative Commons
Mohammed Ahmed Subhi, Omar Fitian Rashid, Safa Ahmed Abdulsahib

et al.

Deleted Journal, Journal Year: 2024, Volume and Issue: 4(2), P. 120 - 128

Published: Aug. 28, 2024

Cybersecurity refers to the actions that are used by people and companies protect themselves their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks still a major concern in computer community. Many gaps, like Denial of Service, spam, phishing, other types attacks, reported daily, attack numbers growing. Intrusion detection is protection method detect report any traffic automatically may affect security, such as internal external maloperations. This paper an anomaly intrusion system based on new RNA encoding ResNet50 Model, where done splitting training records into different groups. These groups protocol, service, flag, digit, each group represented number characters can represent group's values. The phase converts sequences, allowing comprehensive representation dataset. model, utilizing ResNet architecture, effectively tackles challenges achieves high rates types. KDD-Cup99 Dataset both testing. testing dataset includes do not appear dataset, which means future. efficiency suggested calculating rate (DR), false alarm (FAR), accuracy. achieved DR, FAR, accuracy equal 96.24%, 6.133%, 95.99%. experimental results exhibit improve detection.

Language: Английский

Citations

1

Text Mining Algorithm Naive Bayes Classifier to Improve Quality Sentiment Analysis Passport Mobile Application DOI Open Access
M. Alvi Syahrin, W Wilonotomo,

Budy Mulyawan

et al.

Published: March 4, 2024

Mobile Passport is an application that can be used as a digital service for people in Indonesia to apply new passport and official online replacement from the Directorate General of Immigration replacing APAPO (Online Service Application). User reviews are output big data generated result Internet Things. The problem formulation this research how implementation Naive Bayes text mining classifier algorithm analyze contained well accuracy, precision recall values. This uses KDD (Knowledge Discovery database) method which consists selection, preprocessing, transformation, mining, evaluation using R Studio tool. resulting knowledge information process useful base decision making. because its reliability handling quickly accurate predictions based on class probabilities, thus enabling obtain consistent reliable results.

Language: Английский

Citations

0