Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (106)
  • Open Access

    ARTICLE

    Deep Learning Based Intrusion Detection in Cloud Services for Resilience Management

    S. Sreenivasa Chakravarthi1,*, R. Jagadeesh Kannan2, V. Anantha Natarajan3, Xiao-Zhi Gao4

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5117-5133, 2022, DOI:10.32604/cmc.2022.022351

    Abstract In the global scenario one of the important goals for sustainable development in industrial field is innovate new technology, and invest in building infrastructure. All the developed and developing countries focus on building resilient infrastructure and promote sustainable developments by fostering innovation. At this juncture the cloud computing has become an important information and communication technologies model influencing sustainable development of the industries in the developing countries. As part of the innovations happening in the industrial sector, a new concept termed as ‘smart manufacturing’ has emerged, which employs the benefits of emerging technologies like internet… More >

  • Open Access

    ARTICLE

    Abnormality Identification in Video Surveillance System using DCT

    A. Balasundaram1,*, Golda Dilip2, M. Manickam3, Arun Kumar Sivaraman4, K. Gurunathan5, R. Dhanalakshmi6, S. Ashokkumar7

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 693-704, 2022, DOI:10.32604/iasc.2022.022241

    Abstract In the present world, video surveillance methods play a vital role in observing the activities that take place across secured and unsecured environment. The main aim with which a surveillance system is deployed is to spot abnormalities in specific areas like airport, military, forests and other remote areas, etc. A new block-based strategy is represented in this paper. This strategy is used to identify unusual circumstances by examining the pixel-wise frame movement instead of the standard object-based approaches. The density and also the speed of the movement is extorted by utilizing optical flow. The proposed More >

  • Open Access

    ARTICLE

    Sensor Data Based Anomaly Detection in Autonomous Vehicles using Modified Convolutional Neural Network

    Sivaramakrishnan Rajendar, Vishnu Kumar Kaliappan*

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 859-875, 2022, DOI:10.32604/iasc.2022.020936

    Abstract Automated Vehicles (AVs) reform the automotive industry by enabling real-time and efficient data exchange between the vehicles. While connectivity and automation of the vehicles deliver a slew of benefits, they may also introduce new safety, security, and privacy risks. Further, AVs rely entirely on the sensor data and the data from other vehicles too. On the other hand, the sensor data is susceptible to anomalies caused by cyber-attacks, errors, and faults, resulting in accidents and fatalities. Hence, it is essential to create techniques for detecting anomalies and identifying their sources before the wide adoption of More >

  • Open Access

    ARTICLE

    LogUAD: Log Unsupervised Anomaly Detection Based on Word2Vec

    Jin Wang1, Changqing Zhao1, Shiming He1,*, Yu Gu2, Osama Alfarraj3, Ahed Abugabah4

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1207-1222, 2022, DOI:10.32604/csse.2022.022365

    Abstract System logs record detailed information about system operation and are important for analyzing the system's operational status and performance. Rapid and accurate detection of system anomalies is of great significance to ensure system stability. However, large-scale distributed systems are becoming more and more complex, and the number of system logs gradually increases, which brings challenges to analyze system logs. Some recent studies show that logs can be unstable due to the evolution of log statements and noise introduced by log collection and parsing. Moreover, deep learning-based detection methods take a long time to train models.… More >

  • Open Access

    ARTICLE

    A Hybrid Deep Learning-Based Unsupervised Anomaly Detection in High Dimensional Data

    Amgad Muneer1,2,*, Shakirah Mohd Taib1,2, Suliman Mohamed Fati3, Abdullateef O. Balogun1, Izzatdin Abdul Aziz1,2

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5363-5381, 2022, DOI:10.32604/cmc.2022.021113

    Abstract Anomaly detection in high dimensional data is a critical research issue with serious implication in the real-world problems. Many issues in this field still unsolved, so several modern anomaly detection methods struggle to maintain adequate accuracy due to the highly descriptive nature of big data. Such a phenomenon is referred to as the “curse of dimensionality” that affects traditional techniques in terms of both accuracy and performance. Thus, this research proposed a hybrid model based on Deep Autoencoder Neural Network (DANN) with five layers to reduce the difference between the input and output. The proposed… More >

  • Open Access

    ARTICLE

    Industrial Datasets with ICS Testbed and Attack Detection Using Machine Learning Techniques

    Sinil Mubarak1, Mohamed Hadi Habaebi1,*, Md Rafiqul Islam1, Asaad Balla1, Mohammad Tahir2, Elfatih A. A. Elsheikh3, F. M. Suliman3

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1345-1360, 2022, DOI:10.32604/iasc.2022.020801

    Abstract Industrial control systems (ICS) are the backbone for the implementation of cybersecurity solutions. They are susceptible to various attacks, due to openness in connectivity, unauthorized attempts, malicious attacks, use of more commercial off the shelf (COTS) software and hardware, and implementation of Internet protocols (IP) that exposes them to the outside world. Cybersecurity solutions for Information technology (IT) secured with firewalls, intrusion detection/protection systems do nothing much for Operational technology (OT) ICS. An innovative concept of using real operational technology network traffic-based testbed, for cyber-physical system simulation and analysis, is presented. The testbed is equipped… More >

  • Open Access

    ARTICLE

    Rule-Based Anomaly Detection Model with Stateful Correlation Enhancing Mobile Network Security

    Rafia Afzal, Raja Kumar Murugesan*

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1825-1841, 2022, DOI:10.32604/iasc.2022.020598

    Abstract The global Signalling System No. 7 (SS7) network protocol standard has been developed and regulated based only on trusted partner networks. The SS7 network protocol by design neither secures the communication channel nor verifies the entire network peers. The SS7 network protocol used in telecommunications has deficiencies that include verification of actual subscribers, precise location, subscriber’s belonging to a network, absence of illegitimate message filtering mechanism, and configuration deficiencies in home routing networks. Attackers can take advantage of these deficiencies and exploit them to impose threats such as subscriber or network data disclosure, intercept mobile… More >

  • Open Access

    ARTICLE

    Improved Anomaly Detection in Surveillance Videos with Multiple Probabilistic Models Inference

    Zhen Xu1, Xiaoqian Zeng1, Genlin Ji1,*, Bo Sheng2

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1703-1717, 2022, DOI:10.32604/iasc.2022.016919

    Abstract Anomaly detection in surveillance videos is an extremely challenging task due to the ambiguous definitions for abnormality. In a complex surveillance scenario, the kinds of abnormal events are numerous and might co-exist, including such as appearance and motion anomaly of objects, long-term abnormal activities, etc. Traditional video anomaly detection methods cannot detect all these kinds of abnormal events. Hence, we utilize multiple probabilistic models inference to detect as many different kinds of abnormal events as possible. To depict realistic events in a scene, the parameters of our methods are tailored to the characteristics of video… More >

  • Open Access

    ARTICLE

    Arrhythmia and Disease Classification Based on Deep Learning Techniques

    Ramya G. Franklin1,*, B. Muthukumar2

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 835-851, 2022, DOI:10.32604/iasc.2022.019877

    Abstract Electrocardiography (ECG) is a method for monitoring the human heart’s electrical activity. ECG signal is often used by clinical experts in the collected time arrangement for the evaluation of any rhythmic circumstances of a topic. The research was carried to make the assignment computerized by displaying the problem with encoder-decoder methods, by using misfortune appropriation to predict standard or anomalous information. The two Convolutional Neural Networks (CNNs) and the Long Short-Term Memory (LSTM) fully connected layer (FCL) have shown improved levels over deep learning networks (DLNs) across a wide range of applications such as speech… More >

  • Open Access

    ARTICLE

    Deep Semisupervised Learning-Based Network Anomaly Detection in Heterogeneous Information Systems

    Nazarii Lutsiv1, Taras Maksymyuk1,*, Mykola Beshley1, Orest Lavriv1, Volodymyr Andrushchak1, Anatoliy Sachenko2, Liberios Vokorokos3, Juraj Gazda3

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 413-431, 2022, DOI:10.32604/cmc.2022.018773

    Abstract The extensive proliferation of modern information services and ubiquitous digitization of society have raised cybersecurity challenges to new levels. With the massive number of connected devices, opportunities for potential network attacks are nearly unlimited. An additional problem is that many low-cost devices are not equipped with effective security protection so that they are easily hacked and applied within a network of bots (botnet) to perform distributed denial of service (DDoS) attacks. In this paper, we propose a novel intrusion detection system (IDS) based on deep learning that aims to identify suspicious behavior in modern heterogeneous… More >

Displaying 71-80 on page 8 of 106. Per Page