A collaborative security framework for software defined wireless sensor networksShakas Technologies
The document proposes a collaborative security framework for software-defined wireless sensor networks. The framework combines intrusion prevention with collaborative anomaly detection. It uses an intrusion prevention system for lightweight authentication in the data plane. It also leverages a collaborative anomaly detection system for cost-effective intrusion detection near the data plane. Additionally, a Smart Monitoring System in the control plane is used to correlate true positive alerts from sensor nodes at the network edge. The performance of the proposed model is evaluated under different security scenarios and shown to provide high security and reduce false alarms compared to other methods.
NEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter LeeNEC Public Safety
Powering the Internet of Identities with integrated cyber-physical security.
The Internet of Things is driving the integration of the cyber and physical state today. in order to ensure that commercial transactions and government services can be further enhanced, digital identity is critical, and will be the cornerstone that defines the very fabric of public safety in future societies.
NEC is unique in providing multi-layered security solutions, allowing us to assemble different solutions in response to the complexity of the different layers and provide a turn-key solution to our clients.
Walter Lee, Evangelist & Government Relations leader of NEC Global Safety Division shares about AI for Next Generation Cyber Defense.
Brought to you by NEC. To find out more, do visit http://www.nec.com/safety
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...Nexgen Technology
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: mailtonexgentech@gmail.com.
www.nexgenproject.com
Mobile: 9791938249,9025656779
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Deep learning is a machine learning method that attempts to learn layered models of inputs that mimics the human brain’s reasoning process. The layers correspond to distinct levels of concepts where higher-level concepts are derived from lower-level concepts (hierarchy of complex concepts that are constructed out of simpler concepts).
Mihai Raneti, Founder & CEO of CyberSwarm Inc.-Cybersecurity for the future: ...Codiax
The document discusses several topics related to cybersecurity, artificial intelligence, and hardware. It notes that cybersecurity grows in response to cybercrime. It also mentions that many organizations and governments are recognizing how AI can improve cybersecurity efforts, but there is a shortage of AI skills. Additionally, the document discusses how hardware limitations currently constrain AI and how a new CPU called CyberSwarm aims to advance cybersecurity through dedicated neural hardware.
NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...NEC Public Safety
Michael O'Connell, Vice President and Executive Advisor of NEC Corporation, speaks at Interpol World 2019.
Physical world and cyber space: risks closer than you might think
Countries around the globe are at the mercy of different types of security risks, such as smuggling of drugs, weapons and people, terrorism, among others. But one thing they all have in common: most attacks are architected and managed by the internet. Today, it is almost impossible to disassociate the threats from the physical world from the virtual. In a figurative way, we can imagine that the two scopes are sewn together by an invisible line that draws them ever closer.
Reach out at safety@nec.com.sg if you would like to have more details.
Dissertations are among the most important pieces of work which students complete at university. And they allow you to work individually and on something that truly attracts you. Computer science is a hot field for researchers. Many topic ideas can be generated for a dissertation in this special branch of engineering.
Ph.D. Assistance serves as an external mentor to brainstorm your idea and translate that into a research model. Hiring a mentor or tutor is common and therefore let your research committee know about the same. We do not offer any writing services without the involvement of the researcher.
Learn More: https://bit.ly/3bWsGpz
Contact Us:
Website: https://www.phdassistance.com/
UK NO: +44–1143520021
India No: +91–4448137070
WhatsApp No: +91 91769 66446
Email: info@phdassistance.com
A collaborative security framework for software defined wireless sensor networksShakas Technologies
The document proposes a collaborative security framework for software-defined wireless sensor networks. The framework combines intrusion prevention with collaborative anomaly detection. It uses an intrusion prevention system for lightweight authentication in the data plane. It also leverages a collaborative anomaly detection system for cost-effective intrusion detection near the data plane. Additionally, a Smart Monitoring System in the control plane is used to correlate true positive alerts from sensor nodes at the network edge. The performance of the proposed model is evaluated under different security scenarios and shown to provide high security and reduce false alarms compared to other methods.
NEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter LeeNEC Public Safety
Powering the Internet of Identities with integrated cyber-physical security.
The Internet of Things is driving the integration of the cyber and physical state today. in order to ensure that commercial transactions and government services can be further enhanced, digital identity is critical, and will be the cornerstone that defines the very fabric of public safety in future societies.
NEC is unique in providing multi-layered security solutions, allowing us to assemble different solutions in response to the complexity of the different layers and provide a turn-key solution to our clients.
Walter Lee, Evangelist & Government Relations leader of NEC Global Safety Division shares about AI for Next Generation Cyber Defense.
Brought to you by NEC. To find out more, do visit http://www.nec.com/safety
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...Nexgen Technology
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: mailtonexgentech@gmail.com.
www.nexgenproject.com
Mobile: 9791938249,9025656779
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Deep learning is a machine learning method that attempts to learn layered models of inputs that mimics the human brain’s reasoning process. The layers correspond to distinct levels of concepts where higher-level concepts are derived from lower-level concepts (hierarchy of complex concepts that are constructed out of simpler concepts).
Mihai Raneti, Founder & CEO of CyberSwarm Inc.-Cybersecurity for the future: ...Codiax
The document discusses several topics related to cybersecurity, artificial intelligence, and hardware. It notes that cybersecurity grows in response to cybercrime. It also mentions that many organizations and governments are recognizing how AI can improve cybersecurity efforts, but there is a shortage of AI skills. Additionally, the document discusses how hardware limitations currently constrain AI and how a new CPU called CyberSwarm aims to advance cybersecurity through dedicated neural hardware.
NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...NEC Public Safety
Michael O'Connell, Vice President and Executive Advisor of NEC Corporation, speaks at Interpol World 2019.
Physical world and cyber space: risks closer than you might think
Countries around the globe are at the mercy of different types of security risks, such as smuggling of drugs, weapons and people, terrorism, among others. But one thing they all have in common: most attacks are architected and managed by the internet. Today, it is almost impossible to disassociate the threats from the physical world from the virtual. In a figurative way, we can imagine that the two scopes are sewn together by an invisible line that draws them ever closer.
Reach out at safety@nec.com.sg if you would like to have more details.
Dissertations are among the most important pieces of work which students complete at university. And they allow you to work individually and on something that truly attracts you. Computer science is a hot field for researchers. Many topic ideas can be generated for a dissertation in this special branch of engineering.
Ph.D. Assistance serves as an external mentor to brainstorm your idea and translate that into a research model. Hiring a mentor or tutor is common and therefore let your research committee know about the same. We do not offer any writing services without the involvement of the researcher.
Learn More: https://bit.ly/3bWsGpz
Contact Us:
Website: https://www.phdassistance.com/
UK NO: +44–1143520021
India No: +91–4448137070
WhatsApp No: +91 91769 66446
Email: info@phdassistance.com
NEC Public Safety | NEC XON 2020 Vision by Walter LeeNEC Public Safety
2020 Vision - A Future Beyond Imagination
Walter Lee, Evangelist & Government Relations Director of NEC Global Safety Division shares the 2020 Vision during the annual NEC XON Summit 2019.
NEC XON is an annual invitation-only summit gathering C suite executives and other delegates from across Africa to expose them to how innovative technology can help improve the lives of Africans.
Reach out at safety@nec.com.sg if you would like to have more details.
NEC Public Safety | NEC Airport Security Advances with Business Traveller NEC Public Safety
Star Alliance, the world's largest airline alliance, has partnered with NEC Corporation, a global leader in biometric technologies, to develop a biometric data-based identification platform. This will allow Star Alliance frequent flyers to use facial recognition technology to seamlessly pass through different stages of air travel like check-in, luggage drop, and boarding. The system is designed to improve customer experience while maintaining privacy, and may be implemented in some Star Alliance hub airports by early 2020.
The document outlines 12 IoT trends that will be important for entrepreneurs to know in 2020. It discusses trends like increased adoption of smart home devices and edge computing, improved security through machine learning and blockchain, growth of smart cities, predictive maintenance, and more personalized customer experiences through data convergence. The document provides an overview of emerging technologies and applications in the IoT space that entrepreneurs should be aware of.
In this presentation, Nikitha introduces the concept of IoT and associated trends.Her interest lies in developing centralized management systems to control IoT devices remotely
This document discusses fog computing, which extends cloud computing to the edge of the network. It describes the existing cloud computing model and proposes fog computing as an alternative to address issues like latency. Key topics covered include security issues, privacy issues, potential scenarios and applications of fog computing, and ideas for future enhancement.
This document lists 37 research project codes and titles from EC-CUBE. The projects cover a wide range of topics including cloud computing, network security, image processing, video processing, data mining, wireless sensor networks, and mobile computing. EC-CUBE is a research organization located in Bangalore, India that focuses on various areas of computer science and engineering. It provides contact information at the end.
The evolution of the Internet of things is bringing a more connected future for everyone. Catch up to the latest IoT trends in 2019 with this presentation and understand new ways to use IoT for your business this year.
Toward a statistical framework for source anonymity in sensor networksEcway Technologies
This document proposes a new statistical framework for modeling and evaluating anonymity in sensor networks. It introduces the concept of "interval indistinguishability" to quantitatively measure anonymity. It also maps the source anonymity problem to the statistical problem of binary hypothesis testing with nuisance parameters. This transforms the problem from analyzing real-valued data to binary codes, allowing coding theory to be applied. Existing solutions can be modified using this framework to improve their level of anonymity.
This paper proposes a model for detecting anomalous behavior in cloud computing. The model uses Software-Defined Networks to redirect virtual machine (VM) traffic so it can be captured and analyzed. The goal is to detect both known and unknown anomalous network behaviors between VMs. The model adopts hybrid techniques to analyze VM network behaviors and control network systems. Experimental results showed the approach was over 90% effective, proving the feasibility of the proposed anomalous behavior detection model.
A lightweight secure scheme for detecting provenance forgery and packet drop ...Shakas Technologies
This document proposes a lightweight scheme for securely transmitting data provenance in sensor networks to detect packet forgery and drop attacks. The scheme uses in-packet Bloom filters to encode provenance information with low overhead. It introduces mechanisms for provenance verification and reconstruction at the base station. The evaluation shows the technique can effectively and efficiently detect packet forgery and loss attacks staged by malicious nodes in a sensor network.
Hierarchical long short term memory network for cyberattack detectionShakas Technologies
This document discusses a hierarchical long short-term memory (HLSTM) network for cyberattack detection. The HLSTM network is proposed to enhance intrusion detection systems, which traditionally struggle to quickly and accurately identify complex, diverse network attacks, especially low-frequency attacks. The HLSTM network introduces a hierarchical structure that allows the model to learn across multiple temporal levels in complex network traffic sequences. When evaluated on the NSL-KDD benchmark dataset, the HLSTM network showed better detection performance compared to existing methods, with higher accuracy and lower false detection rates for low-frequency attack types.
Dominating set and network coding based routing in wireless mesh netwoksLeMeniz Infotech
Dominating set and network coding based routing in wireless mesh netwoks
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
1) The document proposes a chaos communication system using multiple-input multiple-output (MIMO) technique to improve data transmission speed.
2) It suggests applying a 2x2 MIMO configuration using correlation delay shift keying (CDSK) modulation over a Rayleigh fading channel.
3) The paper evaluates the bit error rate (BER) performance of the proposed system using MIMO detection algorithms like zero forcing and minimum mean square error to recover the transmitted signals.
Rough set method-cloud internet of things: a two-degree verification scheme ...IJECEIAES
The quick development of innovations and increasing use of the internet of things (IoT) in human life brings numerous challenges. It is because of the absence of adequate capacity resources and tremendous volumes of IoT information. This can be resolved by a cloud-based architecture. Consequently, a progression of challenging security and privacy concerns has emerged in the cloud based IoT context. In this paper, a novel approach to providing security in cloud based IoT environments is proposed. This approach mainly depends on the working of rough set rules for guaranteeing security during data sharing (rough set method-cloud IoT (RSM-CIoTD)). The proposed RSM-CIoTD conspire guarantees secure communication between the user and cloud service provider (CSP) in a cloud based IoT. To manage unauthorized users, an RSM-CIoTD scheme utilizes a registered authority which plays out a two-degree confirmation between the network substances. The security and privacy appraisal techniques utilize minimum and maximum trust benefits of past communication. The experiments show that our proposed system can productively and safely store the cloud service while outperforming other security methods.
Deep learning techniques for obstacle detection and avoidance in driverless c...Shakas Technologies
Deep learning techniques are being used for obstacle detection and avoidance in driverless cars. A convolutional neural network model is trained to analyze video/images in real-time from an IoT device like a Raspberry Pi that controls the car. The CNN model can detect obstacles and allow the car to avoid collisions. It was tested and achieved 88.6% accuracy in detecting obstacles, demonstrating it can successfully support autonomous driving capabilities.
Hierarchical adaptive trust establishment solution for vehicular networksShakas Technologies
Hierarchical Adaptive Trust Establishment Solution for Vehicular Networks proposes a three-level hierarchical architecture to establish trust in vehicular networks. The solution aims to adapt to different communication scenarios and security levels required for applications like safety messaging. Simulation results show the solution can detect over 90% of attackers even when 25% of nodes are attackers, while reducing incorrect relaying decisions.
If caa s information flow control as a service for cloud securityShakas Technologies
Information flow control (IFC) is a well-understood mandatory access control methodology that can provide better cloud security than what is currently available. IFC models how information, like data, is allowed to flow between subjects like processes and objects like files in a system. Decentralized forms of IFC have been designed and implemented in academic research projects. This paper proposes IFC as a service (IFCaaS) for cloud security, where both cloud tenants and providers can agree on security policies in a way that does not require them to understand the details of the cloud software stack. IFCaaS would allow enforcement of security policies based on the data being protected.
Secure and reliable wireless advertising system using intellectual characteri...TELKOMNIKA JOURNAL
Smart cities wireless advertising (smart mobile-AD) filed is one of the well-known area of research where smart devices using mobile ad hoc networks (MANET) platform for advertisement and marketing purposes. Wireless advertising through multiple fusion internet of things (IoT) sensors is one of the important field where the sensors combines multiple sensors information and accomplish the control of self-governing intelligent machines for smart cities advertising framework. With many advantages, this field has suffered with data security. In order to tackle security threats, intrusion detection system (IDS) is adopted. However, the existing IDS system are not able to fulfill the security requirements. This paper proposes an intellectual characteristic selection algorithm (ICSA) integrated with normalized intelligent genetic algorithm-based min-max feature selection (NIGA-MFS). The proposed solution designs for wireless advertising system for business/advertising data security and other transactions using independent reconfigurable architecture. This approach supports the wireless advertising portals to manage the data delivery by using 4G standard. The proposed reconfigurable architecture is validated by using applications specific to microcontrollers with multiple fusion IoT sensors.
A time efficient approach for detecting errors in big sensor data on cloudShakas Technologies
This document describes a novel approach for detecting errors in large sensor data sets on cloud computing platforms. The approach classifies types of sensor data errors and analyzes the network features of clustered wireless sensor networks to support fast error detection and location. Specifically, it leverages the scale-free network topology to conduct most detection operations on limited temporal or spatial data blocks rather than the entire large data set, dramatically accelerating the detection and location process. The detection and location tasks can also be distributed across a cloud computing platform to take full advantage of its massive computation power and storage. An experiment on a cloud computing test platform demonstrated the approach can significantly reduce the time required for error detection and location in large data sets from large-scale sensor networks with
A time efficient approach for detecting errors in big sensor data on cloudShakas Technologies
This document describes a novel approach for detecting errors in big sensor data on cloud platforms. The approach classifies types of sensor data errors and exploits the network features of wireless sensor networks. It uses a scale-free network topology to conduct error detection on limited temporal or spatial data blocks rather than whole datasets, dramatically accelerating the detection and location process. The detection and location tasks are distributed across a cloud computing platform to fully utilize computation power and storage. Experiments on a cloud platform demonstrate the approach can significantly reduce time for error detection and location in large-scale sensor network data with accurate error detection.
A secure client side deduplication scheme in cloud storage environmentsShakas Technologies
The document proposes a new client-side data deduplication scheme for securely storing data in public cloud environments. The scheme encrypts each data file with a per-file key computed by the client, providing better confidentiality against unauthorized users by managing data access through the data owner. It also integrates access rights into metadata files, allowing authorized users to decrypt encrypted files only with their private keys. The scheme was implemented on OpenStack Swift.
NEC Public Safety | NEC XON 2020 Vision by Walter LeeNEC Public Safety
2020 Vision - A Future Beyond Imagination
Walter Lee, Evangelist & Government Relations Director of NEC Global Safety Division shares the 2020 Vision during the annual NEC XON Summit 2019.
NEC XON is an annual invitation-only summit gathering C suite executives and other delegates from across Africa to expose them to how innovative technology can help improve the lives of Africans.
Reach out at safety@nec.com.sg if you would like to have more details.
NEC Public Safety | NEC Airport Security Advances with Business Traveller NEC Public Safety
Star Alliance, the world's largest airline alliance, has partnered with NEC Corporation, a global leader in biometric technologies, to develop a biometric data-based identification platform. This will allow Star Alliance frequent flyers to use facial recognition technology to seamlessly pass through different stages of air travel like check-in, luggage drop, and boarding. The system is designed to improve customer experience while maintaining privacy, and may be implemented in some Star Alliance hub airports by early 2020.
The document outlines 12 IoT trends that will be important for entrepreneurs to know in 2020. It discusses trends like increased adoption of smart home devices and edge computing, improved security through machine learning and blockchain, growth of smart cities, predictive maintenance, and more personalized customer experiences through data convergence. The document provides an overview of emerging technologies and applications in the IoT space that entrepreneurs should be aware of.
In this presentation, Nikitha introduces the concept of IoT and associated trends.Her interest lies in developing centralized management systems to control IoT devices remotely
This document discusses fog computing, which extends cloud computing to the edge of the network. It describes the existing cloud computing model and proposes fog computing as an alternative to address issues like latency. Key topics covered include security issues, privacy issues, potential scenarios and applications of fog computing, and ideas for future enhancement.
This document lists 37 research project codes and titles from EC-CUBE. The projects cover a wide range of topics including cloud computing, network security, image processing, video processing, data mining, wireless sensor networks, and mobile computing. EC-CUBE is a research organization located in Bangalore, India that focuses on various areas of computer science and engineering. It provides contact information at the end.
The evolution of the Internet of things is bringing a more connected future for everyone. Catch up to the latest IoT trends in 2019 with this presentation and understand new ways to use IoT for your business this year.
Toward a statistical framework for source anonymity in sensor networksEcway Technologies
This document proposes a new statistical framework for modeling and evaluating anonymity in sensor networks. It introduces the concept of "interval indistinguishability" to quantitatively measure anonymity. It also maps the source anonymity problem to the statistical problem of binary hypothesis testing with nuisance parameters. This transforms the problem from analyzing real-valued data to binary codes, allowing coding theory to be applied. Existing solutions can be modified using this framework to improve their level of anonymity.
This paper proposes a model for detecting anomalous behavior in cloud computing. The model uses Software-Defined Networks to redirect virtual machine (VM) traffic so it can be captured and analyzed. The goal is to detect both known and unknown anomalous network behaviors between VMs. The model adopts hybrid techniques to analyze VM network behaviors and control network systems. Experimental results showed the approach was over 90% effective, proving the feasibility of the proposed anomalous behavior detection model.
A lightweight secure scheme for detecting provenance forgery and packet drop ...Shakas Technologies
This document proposes a lightweight scheme for securely transmitting data provenance in sensor networks to detect packet forgery and drop attacks. The scheme uses in-packet Bloom filters to encode provenance information with low overhead. It introduces mechanisms for provenance verification and reconstruction at the base station. The evaluation shows the technique can effectively and efficiently detect packet forgery and loss attacks staged by malicious nodes in a sensor network.
Hierarchical long short term memory network for cyberattack detectionShakas Technologies
This document discusses a hierarchical long short-term memory (HLSTM) network for cyberattack detection. The HLSTM network is proposed to enhance intrusion detection systems, which traditionally struggle to quickly and accurately identify complex, diverse network attacks, especially low-frequency attacks. The HLSTM network introduces a hierarchical structure that allows the model to learn across multiple temporal levels in complex network traffic sequences. When evaluated on the NSL-KDD benchmark dataset, the HLSTM network showed better detection performance compared to existing methods, with higher accuracy and lower false detection rates for low-frequency attack types.
Dominating set and network coding based routing in wireless mesh netwoksLeMeniz Infotech
Dominating set and network coding based routing in wireless mesh netwoks
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
1) The document proposes a chaos communication system using multiple-input multiple-output (MIMO) technique to improve data transmission speed.
2) It suggests applying a 2x2 MIMO configuration using correlation delay shift keying (CDSK) modulation over a Rayleigh fading channel.
3) The paper evaluates the bit error rate (BER) performance of the proposed system using MIMO detection algorithms like zero forcing and minimum mean square error to recover the transmitted signals.
Rough set method-cloud internet of things: a two-degree verification scheme ...IJECEIAES
The quick development of innovations and increasing use of the internet of things (IoT) in human life brings numerous challenges. It is because of the absence of adequate capacity resources and tremendous volumes of IoT information. This can be resolved by a cloud-based architecture. Consequently, a progression of challenging security and privacy concerns has emerged in the cloud based IoT context. In this paper, a novel approach to providing security in cloud based IoT environments is proposed. This approach mainly depends on the working of rough set rules for guaranteeing security during data sharing (rough set method-cloud IoT (RSM-CIoTD)). The proposed RSM-CIoTD conspire guarantees secure communication between the user and cloud service provider (CSP) in a cloud based IoT. To manage unauthorized users, an RSM-CIoTD scheme utilizes a registered authority which plays out a two-degree confirmation between the network substances. The security and privacy appraisal techniques utilize minimum and maximum trust benefits of past communication. The experiments show that our proposed system can productively and safely store the cloud service while outperforming other security methods.
Deep learning techniques for obstacle detection and avoidance in driverless c...Shakas Technologies
Deep learning techniques are being used for obstacle detection and avoidance in driverless cars. A convolutional neural network model is trained to analyze video/images in real-time from an IoT device like a Raspberry Pi that controls the car. The CNN model can detect obstacles and allow the car to avoid collisions. It was tested and achieved 88.6% accuracy in detecting obstacles, demonstrating it can successfully support autonomous driving capabilities.
Hierarchical adaptive trust establishment solution for vehicular networksShakas Technologies
Hierarchical Adaptive Trust Establishment Solution for Vehicular Networks proposes a three-level hierarchical architecture to establish trust in vehicular networks. The solution aims to adapt to different communication scenarios and security levels required for applications like safety messaging. Simulation results show the solution can detect over 90% of attackers even when 25% of nodes are attackers, while reducing incorrect relaying decisions.
If caa s information flow control as a service for cloud securityShakas Technologies
Information flow control (IFC) is a well-understood mandatory access control methodology that can provide better cloud security than what is currently available. IFC models how information, like data, is allowed to flow between subjects like processes and objects like files in a system. Decentralized forms of IFC have been designed and implemented in academic research projects. This paper proposes IFC as a service (IFCaaS) for cloud security, where both cloud tenants and providers can agree on security policies in a way that does not require them to understand the details of the cloud software stack. IFCaaS would allow enforcement of security policies based on the data being protected.
Secure and reliable wireless advertising system using intellectual characteri...TELKOMNIKA JOURNAL
Smart cities wireless advertising (smart mobile-AD) filed is one of the well-known area of research where smart devices using mobile ad hoc networks (MANET) platform for advertisement and marketing purposes. Wireless advertising through multiple fusion internet of things (IoT) sensors is one of the important field where the sensors combines multiple sensors information and accomplish the control of self-governing intelligent machines for smart cities advertising framework. With many advantages, this field has suffered with data security. In order to tackle security threats, intrusion detection system (IDS) is adopted. However, the existing IDS system are not able to fulfill the security requirements. This paper proposes an intellectual characteristic selection algorithm (ICSA) integrated with normalized intelligent genetic algorithm-based min-max feature selection (NIGA-MFS). The proposed solution designs for wireless advertising system for business/advertising data security and other transactions using independent reconfigurable architecture. This approach supports the wireless advertising portals to manage the data delivery by using 4G standard. The proposed reconfigurable architecture is validated by using applications specific to microcontrollers with multiple fusion IoT sensors.
A time efficient approach for detecting errors in big sensor data on cloudShakas Technologies
This document describes a novel approach for detecting errors in large sensor data sets on cloud computing platforms. The approach classifies types of sensor data errors and analyzes the network features of clustered wireless sensor networks to support fast error detection and location. Specifically, it leverages the scale-free network topology to conduct most detection operations on limited temporal or spatial data blocks rather than the entire large data set, dramatically accelerating the detection and location process. The detection and location tasks can also be distributed across a cloud computing platform to take full advantage of its massive computation power and storage. An experiment on a cloud computing test platform demonstrated the approach can significantly reduce the time required for error detection and location in large data sets from large-scale sensor networks with
A time efficient approach for detecting errors in big sensor data on cloudShakas Technologies
This document describes a novel approach for detecting errors in big sensor data on cloud platforms. The approach classifies types of sensor data errors and exploits the network features of wireless sensor networks. It uses a scale-free network topology to conduct error detection on limited temporal or spatial data blocks rather than whole datasets, dramatically accelerating the detection and location process. The detection and location tasks are distributed across a cloud computing platform to fully utilize computation power and storage. Experiments on a cloud platform demonstrate the approach can significantly reduce time for error detection and location in large-scale sensor network data with accurate error detection.
A secure client side deduplication scheme in cloud storage environmentsShakas Technologies
The document proposes a new client-side data deduplication scheme for securely storing data in public cloud environments. The scheme encrypts each data file with a per-file key computed by the client, providing better confidentiality against unauthorized users by managing data access through the data owner. It also integrates access rights into metadata files, allowing authorized users to decrypt encrypted files only with their private keys. The scheme was implemented on OpenStack Swift.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...IRJET Journal
This document summarizes an article that proposes an enhanced Elliptic Curve Digital Signature Algorithm (ECDSA) to prevent fake pages from being introduced in mobile web browsers. ECDSA is commonly used for digital signatures but verification is slower than algorithms like RSA. However, RSA uses larger key sizes not suitable for mobile. Currently, some websites hack confidential information by introducing fake pages similar to the original. The proposed enhanced ECDSA aims to improve verification speed to prevent such fake pages on mobile. It discusses ECDSA and its security issues for mobile. It also reviews other literature on improving ECDSA verification efficiency and security. The document feasibility of the proposed approach.
Expressive, efficient, and revocable data access control for multi authority ...Shakas Technologies
Our proposed data access control scheme allows for expressive, efficient and revocable access to data stored in multi-authority cloud storage systems. It utilizes a revocable multi-authority ciphertext-policy attribute-based encryption scheme which allows multiple independent authorities to issue attributes. Our attribute revocation method can efficiently achieve both forward security and backward security. Analysis and simulation results show that the proposed scheme is secure and more efficient than previous works.
The document presents a proposed framework for user authentication in mobile cloud environments called Dynamic Key Based User Authentication (DKBUA). The framework uses a dynamic key generation algorithm with six phases: registration, communication, key generation, key sending, encryption/decryption, and authentication. The algorithm is designed to be lightweight to reduce computation load. It also uses encryption/decryption to securely transmit communications. An analysis of existing authentication mechanisms is provided and the proposed framework is claimed to be resilient against denial of service attacks, known plaintext attacks, masquerading attacks, and insider attacks.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
A data quarantine model to secure data in edge computingIJECEIAES
Edge computing provides an agile data processing platform for latencysensitive and communication-intensive applications through a decentralized cloud and geographically distributed edge nodes. Gaining centralized control over the edge nodes can be challenging due to security issues and threats. Among several security issues, data integrity attacks can lead to inconsistent data and intrude edge data analytics. Further intensification of the attack makes it challenging to mitigate and identify the root cause. Therefore, this paper proposes a new concept of data quarantine model to mitigate data integrity attacks by quarantining intruders. The efficient security solutions in cloud, ad-hoc networks, and computer systems using quarantine have motivated adopting it in edge computing. The data acquisition edge nodes identify the intruders and quarantine all the suspected devices through dimensionality reduction. During quarantine, the proposed concept builds the reputation scores to determine the falsely identified legitimate devices and sanitize their affected data to regain data integrity. As a preliminary investigation, this work identifies an appropriate machine learning method, linear discriminant analysis (LDA), for dimensionality reduction. The LDA results in 72.83% quarantine accuracy and 0.9 seconds training time, which is efficient than other state-of-the-art methods. In future, this would be implemented and validated with ground truth data.
Similar to Cloud intrusion detection method based on stacked contractive auto encoder and support vector machine (20)
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...Shakas Technologies
A Personal Privacy Data Protection Scheme for Encryption and Revocation of High-Dimensional Attri
Shakas Technologies ( Galaxy of Knowledge)
#11/A 2nd East Main Road,
Gandhi Nagar,
Vellore - 632006.
Mobile : +91-9500218218 / 8220150373| land line- 0416- 3552723
Shakas Training & Development | Shakas Sales & Services | Shakas Educational Trust|IEEE projects | Research & Development | Journal Publication |
Email : info@shakastech.com | shakastech@gmail.com |
website: www.shakastech.com
Facebook: https://www.facebook.com/pages/Shakas-Technologies
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Shakas Technologies
Detecting Mental Disorders in social Media through Emotional patterns-The case of Anorexia and depression
Shakas Technologies ( Galaxy of Knowledge)
#11/A 2nd East Main Road,
Gandhi Nagar,
Vellore - 632006.
Mobile : +91-9500218218 / 8220150373| land line- 0416- 3552723
Shakas Training & Development | Shakas Sales & Services | Shakas Educational Trust|IEEE projects | Research & Development | Journal Publication |
Email : info@shakastech.com | shakastech@gmail.com |
website: www.shakastech.com
Facebook: https://www.facebook.com/pages/Shakas-Technologies
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Shakas Technologies ( Galaxy of Knowledge)
#11/A 2nd East Main Road,
Gandhi Nagar,
Vellore - 632006.
Mobile : +91-9500218218 / 8220150373| land line- 0416- 3552723
Shakas Training & Development | Shakas Sales & Services | Shakas Educational Trust|IEEE projects | Research & Development | Journal Publication |
Email : info@shakastech.com | shakastech@gmail.com |
website: www.shakastech.com
Facebook: https://www.facebook.com/pages/Shakas-Technologies
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Shakas Technologies
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evolution Model Based on Distributed Representations.
Shakas Technologies ( Galaxy of Knowledge)
#11/A 2nd East Main Road,
Gandhi Nagar,
Vellore - 632006.
Mobile : +91-9500218218 / 8220150373| land line- 0416- 3552723
Shakas Training & Development | Shakas Sales & Services | Shakas Educational Trust|IEEE projects | Research & Development | Journal Publication |
Email : info@shakastech.com | shakastech@gmail.com |
website: www.shakastech.com
Facebook: https://www.facebook.com/pages/Shakas-Technologies
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Generating privacy-protected synthetic data using Secludy and Milvus
Cloud intrusion detection method based on stacked contractive auto encoder and support vector machine
1. 2020 – 2021
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 Mo: +91 9500218218 / +91 8220150373
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
Cloud Intrusion Detection Method Based on Stacked Contractive Auto-Encoder
and Support Vector Machine
Abstract
Security issues have resulted in severe damage to the cloud computing environment,
adversely affecting the healthy and sustainable development of cloud computing.
Intrusion detection is one of the technologies for protecting the cloud computing
environment from malicious attacks. However, network traffic in the cloud computing
environment is characterized by large scale, high dimensionality, and high redundancy,
these characteristics pose serious challenges to the development of cloud intrusion
detection systems. Deep learning technology has shown considerable potential for
intrusion detection. Therefore, this study aims to use deep learning to extract essential
feature representations automatically and realize high detection performance efficiently.
An effective stacked contractive autoencoder (SCAE) method is presented for
unsupervised feature extraction. By using the SCAE method, better and robust low-
dimensional features can be automatically learned from raw network traffic. A novel
cloud intrusion detection system is designed on the basis of the SCAE and support
vector machine (SVM) classification algorithm. The SCAE+SVM approach combines
both deep and shallow learning techniques, and it fully exploits their advantages to
significantly reduce the analytical overhead. Experiments show that the proposed
SCAE+SVM method achieves higher detection performance compared to three other
state-of-the-art methods on two well-known intrusion detection evaluation datasets,
namely KDD Cup 99 and NSL-KDD.