Browsing Computer Science & Engineering by Title
Now showing items 1283-1302 of 2127
-
Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)It is critical to secure the Industrial Internet of Things (IIoT) devices because of potentially devastating consequences in case of an attack. Machine learning (ML) and big data analytics are the two powerful leverages ... -
Machine Learning-based Regression and Classification Models for Oil Assessment of Power Transformers
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Expensive and widely used power and distribution transformers need to be monitored to ensure the reliability of the power grid. Evaluating the transformer oil different parameters is vital to determine the transformer ... -
Machine Learning-Based Software Defect Prediction for Mobile Applications: A Systematic Literature Review
( MDPI , 2022 , Article Review)Software defect prediction studies aim to predict defect-prone components before the testing stage of the software development process. The main benefit of these prediction models is that more testing resources can be ... -
Machine unlearning: Its need and implementation strategies
( Association for Computing Machinery , 2021 , Conference Paper)Generally when users share information about themselves on some online platforms, they knowingly or unknowingly allow this data to be used by the companies behind these companies for various purposes including selling this ... -
Machine-Learning-Aided Optical Fiber Communication System
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)The fiber optical network offers high speed, large bandwidth, and a high degree of reliability. However, the development of optical communication technology has hit a bottleneck due to several challenges such as energy ... -
Machine-Learning-Based Efficient and Secure RSU Placement Mechanism for Software-Defined-IoV
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)The massive increase in computing and network capabilities has resulted in a paradigm shift from vehicular networks to the Internet of Vehicles (IoV). Owing to the dynamic and heterogeneous nature of IoV, it requires ... -
Machine-to-Machine (M2M) communications: A survey
( Academic Press , 2016 , Article Review)Machine-to-Machine (M2M) communication is a promising technology for next generation communication systems. This communication paradigm facilitates ubiquitous communications with full mechanical automation, where a large ... -
Making federated learning robust to adversarial attacks by learning data and model association
( Elsevier , 2022 , Article)One of the key challenges in federated learning (FL) is the detection of malicious parameter updates. In a typical FL setup, the presence of malicious client(s) can potentially demolish the overall training of the shared ... -
Malicious mining code detection based on ensemble learning in cloud computing environment
( Elsevier B.V. , 2021 , Article)Hackers increasingly tend to abuse and nefariously use cloud services by injecting malicious mining code. This malicious code can be spread through infrastructures in the cloud platforms and pose a great threat to users ... -
A Malicious Mining Code Detection Method Based on Multi-Features Fusion
( IEEE Computer Society , 2022 , Article)With the continuous increase in the economic value of new digital currencies represented by Bitcoin, more and more cybercriminals use malicious code to occupy victims system resources and network resources for mining without ... -
Malicious uav detection using integrated audio and visual features for public safety applications
( MDPI AG , 2020 , Article)Unmanned aerial vehicles (UAVs) have become popular in surveillance, security, and remote monitoring. However, they also pose serious security threats to public privacy. The timely detection of a malicious drone is currently ... -
Malicious-proof and fair credit-based resource allocation techniques for DSA systems
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)We propose a credit-based resource allocation technique for dynamic spectrum access that is robust against malicious and selfish behaviors and ensures good overall system fairness performance while also allowing spectrum ... -
Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security
( Association for Computing Machinery , 2022 , Article)With the construction of smart cities, the number of Internet of Things (IoT) devices is growing rapidly, leading to an explosive growth of malware designed for IoT devices. These malware pose a serious threat to the ... -
Malware detection based on graph attention networks for intelligent transportation systems
( MDPI , 2021 , Article)Intelligent Transportation Systems (ITS) aim to make transportation smarter, safer, reliable, and environmentally friendly without detrimentally affecting the service quality. ITS can face security issues due to their ... -
Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Advanced persistent threat (APT), with intense penetration, long duration, and high customization, has become one of the most grievous threats to cybersecurity. Furthermore, the design and development of Internet-of-Things ... -
Managing Client-Specific Customised Functions in Multi-Tenant Software-as-a-Service
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)Maintainability and easy-to-customisation are some quality properties that most application software in software-as-a-service (SaaS) should posses. These quality attributes are the pre requisite for most application software ... -
Managing criticalities of e-health IoT systems
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Lately, Internet-based solutions, brought by the Internet of Things (IoT) and cloud computation and storage technologies, have been driving revolutionary approaches in innumerable domains, including the sensitive domain ... -
Managing optimality in multi-sensor data fusion consistency using intersection and largest ellipsoid algorithms
( Nova Science Publishers, Inc. , 2009 , Book chapter)The purpose of this chapter is to provide a theoretical and practical framework to tackle the target tracking problem known as the track-to-track correlation problem. When static (e.g. radars) or dynamic (e.g. AWACs) sensors ... -
Managing Security Control Assumptions Using Causal Traceability
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions ... -
The many benefits of annotator rationales for relevance judgments
( International Joint Conferences on Artificial Intelligence , 2017 , Conference Paper)When collecting subjective human ratings of items, it can be difficult to measure and enforce data quality due to task subjectivity and lack of insight into how judges arrive at each rating decision. To address this, we ...