Results 41 to 50 of about 201 (114)
We propose a blockchain‐based system to enhance cloud systems' resilience against distributed denial of service attacks. Our approach integrates a hierarchical risk‐based attack tolerance mechanism with smart contracts, dynamically estimating risks at local, cluster, and global levels using Dempster–Shafer theory. Simulations show improved availability,
Faiza Benmenzer +2 more
wiley +1 more source
A Method of Detections’ Fusion for GNSS Anti-Spoofing
The spoofing attack is one of the security threats of systems depending on the Global Navigation Satellite System (GNSS). There have been many GNSS spoofing detection methods, and each of them focuses on a characteristic of the GNSS signal or a ...
Huiqi Tao, Hong Li, Mingquan Lu
doaj +1 more source
Distribution‐Matched Imputation for Incomplete Data Evidential Classification
This paper introduces a novel distribution‐matched imputation (DMI) method that leverages evidential reasoning to address classification challenges in datasets with missing values, optimizing weights to minimize the inconsistency between training and test sets.
Qiong Hu +5 more
wiley +1 more source
Quantification of uncertain degree in the Dempster-Shafer evidence theory (DST) framework with belief entropy is still an open issue, even a blank field for the open world assumption.
Yongchuan Tang +2 more
doaj +1 more source
Reliability Analysis Based on Aleatory and Epistemic Uncertainty Using Binary Decision Diagrams
The development of a mathematical model is an important step in reliability analysis. However, initial data are often not clearly defined, and some necessary information about the system’s behavior may be missing. Most mathematical models in reliability analysis primarily address aleatory uncertainty.
Elena Zaitseva +2 more
wiley +1 more source
Early life is a crucial window for recognizing children’s interests and talents that shape later development. This study implements and compares two reasoning algorithms—Certainty Factor (CF) and Dempster–Shafer Theory (DST)—within a rule-based expert ...
Supardi Supardi +2 more
doaj +1 more source
Vehicular ad hoc networks (VANETs) support safety and comfortable driving through frequent information exchange among intelligent vehicles. As an open access environment, VANETs are vulnerable to security threats, such as electronic attack and privacy ...
Chunhua Zhang +3 more
doaj +1 more source
The proposed study aims to enhance online privacy within social networking platforms by categorizing users into three trust levels (acquaintances, friends, close friends) based on engagement and trust. The method dynamically adjusts relationship status over time, considering past and present offenses, offering a more realistic simulation of real‐world ...
Nisha P. Shetty +4 more
wiley +1 more source
Water utilization for different human activities is universally crucial, but it is not readily available for consumption in some areas, such as the central parts of Lagos State, Nigeria.
K.S. Ishola +5 more
doaj +1 more source
Multi-sensor data fusion technology in an important tool in building decision-making applications. Modified Dempster−Shafer (DS) evidence theory can handle conflicting sensor inputs and can be applied without any prior information.
Md Nazmuzzaman Khan, Sohel Anwar
doaj +1 more source

