Results 51 to 60 of about 10,483 (192)

AI‐Powered Anomaly Detection for Secure Internet of Things (IoT): Optimising XGBoost and Deep Learning With Bayesian Optimisation

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Intelligent and adaptive defence systems that can quickly thwart changing cyberthreats are becoming more and more necessary in the dynamic and data‐intensive Internet of things (IoT) environment. Using the NSL‐KDD benchmark dataset, this paper presents an improved anomaly detection system that combines an optimised sequential neural network ...
Seong‐O Shim   +4 more
wiley   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

Cyber Threat Intelligence : Challenges and Opportunities

open access: yes, 2018
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro   +2 more
core   +1 more source

POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers [PDF]

open access: yes, 2020
It is known that attackers can exfiltrate data from air-gapped computers through their speakers via sonic and ultrasonic waves. To eliminate the threat of such acoustic covert channels in sensitive systems, audio hardware can be disabled and the use of ...
Guri, Mordechai
core   +1 more source

On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection

open access: yesExpert Systems, Volume 43, Issue 5, May 2026.
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López   +3 more
wiley   +1 more source

Quantifying the need for supervised machine learning in conducting live forensic analysis of emergent configurations (ECO) in IoT environments

open access: yesForensic Science International: Reports, 2020
Machine learning has been shown as a promising approach to mine larger datasets, such as those that comprise data from a broad range of Internet of Things devices, across complex environment(s) to solve different problems.
Victor R. Kebande   +5 more
doaj   +1 more source

KFREAIN: Design of A Kernel-Level Forensic Layer for Improving Real-Time Evidence Analysis Performance in IoT Networks

open access: yesEmitter: International Journal of Engineering Technology, 2023
An exponential increase in number of attacks in IoT Networks makes it essential to formulate attack-level mitigation strategies. This paper proposes design of a scalable Kernel-level Forensic layer that assists in improving real-time evidence analysis ...
Seema Shukla   +2 more
doaj   +1 more source

Investigating the tension between cloud-related actors and individual privacy rights [PDF]

open access: yes, 2019
Historically, little more than lip service has been paid to the rights of individuals to act to preserve their own privacy. Personal information is frequently exploited for commercial gain, often without the person’s knowledge or permission.
Duncan, Bob   +2 more
core  

A Scoping Review and Bibliometric Analysis on Smart Firefighting in Buildings and Infrastructures

open access: yesFire and Materials, Volume 50, Issue 2, Page 145-173, March 2026.
ABSTRACT Smart Firefighting is a concept that has emerged within the fire engineering and fire science disciplines in recent years. It can enable informed decision making and improved fire safety. However, its scope, definition, outcomes, and value to emergency management remain unclear. To investigate this, a scoping review and a bibliometric analysis
José Antonio Morales Mere   +2 more
wiley   +1 more source

Security for eHealth system: data hiding in AMBTC compressed images via gradient-based coding

open access: yesComplex & Intelligent Systems, 2021
Various eHealth applications based on the Internet of Things (IoT) contain a considerable number of medical images and visual electronic health records, which are transmitted through the Internet everyday.
Yung-Yao Chen   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy