首页 > 最新文献

2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)最新文献

英文 中文
Real World Solutions for Smart Cities Transportation to be Pandemic Ready 智慧城市交通的现实世界解决方案为流行病做好准备
Yusra Amir, S. Deb, M. S. Alam, Y. Rafat, S. Hameed
The COVID-19 is the current widespread health disaster. It has speedily spread all over the world causing a massive impact on the health, environmental, social and economic condition of the total world’s population. Enormous actions undertaken worldwide to minimize the expansion of this deadly contagion by testing at a large scale, quarantining the suspected people, upholding lockdowns and restricting social gatherings. The transportation sector has been one amid the leading sufferers of Coronavirus. Airlines, railways, and the public transport sector are badly hit due to this coronavirus outbreak. In this paper, we studied the effect of Coronavirus on the various transport sectors all over the world, taking into consideration the worldwide scenario and India’s condition as well. Further, this paper analyses the possible ways and measures regarding how the transport services are dealing with this pandemic.
COVID-19是当前广泛的卫生灾难。它迅速蔓延到世界各地,对世界总人口的健康、环境、社会和经济状况造成巨大影响。世界各地采取了大量行动,通过大规模检测、隔离疑似人员、维持封锁和限制社交聚会,尽量减少这种致命传染病的蔓延。交通运输部门是冠状病毒的主要受害者之一。由于这次冠状病毒的爆发,航空公司、铁路和公共交通部门受到了严重打击。在本文中,我们研究了冠状病毒对世界各地各种运输部门的影响,同时考虑到全球的情况和印度的情况。此外,本文还分析了交通运输服务如何应对这次大流行的可能方法和措施。
{"title":"Real World Solutions for Smart Cities Transportation to be Pandemic Ready","authors":"Yusra Amir, S. Deb, M. S. Alam, Y. Rafat, S. Hameed","doi":"10.1109/ICRCICN50933.2020.9296179","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296179","url":null,"abstract":"The COVID-19 is the current widespread health disaster. It has speedily spread all over the world causing a massive impact on the health, environmental, social and economic condition of the total world’s population. Enormous actions undertaken worldwide to minimize the expansion of this deadly contagion by testing at a large scale, quarantining the suspected people, upholding lockdowns and restricting social gatherings. The transportation sector has been one amid the leading sufferers of Coronavirus. Airlines, railways, and the public transport sector are badly hit due to this coronavirus outbreak. In this paper, we studied the effect of Coronavirus on the various transport sectors all over the world, taking into consideration the worldwide scenario and India’s condition as well. Further, this paper analyses the possible ways and measures regarding how the transport services are dealing with this pandemic.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116881168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lung Cancer Detection Using Deep Learning Network: A Comparative Analysis 基于深度学习网络的肺癌检测:比较分析
Susmita Das, Swanirbhar Majumder
Deep learning is an emergent and influential method which is used for feature learning and pattern recognition. We provide a comparison between Computer Aided Diagnosis scheme using Deep Learning Technique and traditional Computer Aided Diagnosis scheme in our paper. In this paper, we have compared several deep neural networks for recognition of pulmonary cancer. In our study, we find that Convolutional neural networks are used for pulmonary cancer detection in most of the cases, as compared to other algorithms in deep learning techniques. In conclusion, we address the few difficulties in the implementation of the systems for pulmonary cancer, then we summarise the advantages and disadvantages of the existing algorithms for diagnosis of pulmonary cancer.
深度学习是一种新兴的、有影响力的特征学习和模式识别方法。本文对基于深度学习技术的计算机辅助诊断方案与传统的计算机辅助诊断方案进行了比较。在本文中,我们比较了几种用于肺癌识别的深度神经网络。在我们的研究中,我们发现与深度学习技术中的其他算法相比,卷积神经网络在大多数情况下用于肺癌检测。总之,我们解决了在肺癌诊断系统实施中的一些困难,然后总结了现有肺癌诊断算法的优点和缺点。
{"title":"Lung Cancer Detection Using Deep Learning Network: A Comparative Analysis","authors":"Susmita Das, Swanirbhar Majumder","doi":"10.1109/ICRCICN50933.2020.9296197","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296197","url":null,"abstract":"Deep learning is an emergent and influential method which is used for feature learning and pattern recognition. We provide a comparison between Computer Aided Diagnosis scheme using Deep Learning Technique and traditional Computer Aided Diagnosis scheme in our paper. In this paper, we have compared several deep neural networks for recognition of pulmonary cancer. In our study, we find that Convolutional neural networks are used for pulmonary cancer detection in most of the cases, as compared to other algorithms in deep learning techniques. In conclusion, we address the few difficulties in the implementation of the systems for pulmonary cancer, then we summarise the advantages and disadvantages of the existing algorithms for diagnosis of pulmonary cancer.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116086854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
ICRCICN 2020 Cover Page icicann 2020封面
{"title":"ICRCICN 2020 Cover Page","authors":"","doi":"10.1109/icrcicn50933.2020.9296151","DOIUrl":"https://doi.org/10.1109/icrcicn50933.2020.9296151","url":null,"abstract":"","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125581831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CG-D2D: Cooperative Game Theory based Resource optimization for D2D Communication in 5G Wireless Network CG-D2D:基于协作博弈论的5G无线网络D2D通信资源优化
Subhankar Ghosh, D. De
Device-to-Device (D2D) communication have paved the way for resource allocation among a large number of wireless devices. A cooperative game theory based resource allocation in D2D communication for 5G wireless network is discussed in this article. Nearby devices combine to form a cluster and exchange data between themselves. Due to the short distance between the devices into the cluster, the amount of data loss between them is much less. In CG-D2D, a utility function and two algorithms are proposed through which spectrum manager allocate the resources between devices in the cluster and allocate the resources among the clusters. In this article, the power consumption, Signal to Interference plus Noise Ratio (SINR) and spectral efficiency (SE) of proposed CG-D2D are calculated and compared it with the existing networks. The proposed CG-D2D reduces the power consumption by approximately 10% – 30% and enhances the SINR and spectral efficiency (SE) by approximately 2% – 8% and 2% – 4% respectively than the existing approaches.
设备到设备(D2D)通信为大量无线设备之间的资源分配铺平了道路。本文讨论了5G无线网络D2D通信中基于合作博弈理论的资源分配方法。附近的设备组合成一个集群,并在它们之间交换数据。由于进入集群的设备之间距离较近,因此它们之间的数据丢失量要小得多。在CG-D2D中,提出了一个效用函数和两种算法,用于频谱管理器在集群内设备之间分配资源和在集群之间分配资源。本文计算了所提出的CG-D2D网络的功耗、信噪比(SINR)和频谱效率(SE),并与现有网络进行了比较。与现有方法相比,所提出的CG-D2D可将功耗降低约10% - 30%,将SINR和频谱效率(SE)分别提高约2% - 8%和2% - 4%。
{"title":"CG-D2D: Cooperative Game Theory based Resource optimization for D2D Communication in 5G Wireless Network","authors":"Subhankar Ghosh, D. De","doi":"10.1109/ICRCICN50933.2020.9296163","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296163","url":null,"abstract":"Device-to-Device (D2D) communication have paved the way for resource allocation among a large number of wireless devices. A cooperative game theory based resource allocation in D2D communication for 5G wireless network is discussed in this article. Nearby devices combine to form a cluster and exchange data between themselves. Due to the short distance between the devices into the cluster, the amount of data loss between them is much less. In CG-D2D, a utility function and two algorithms are proposed through which spectrum manager allocate the resources between devices in the cluster and allocate the resources among the clusters. In this article, the power consumption, Signal to Interference plus Noise Ratio (SINR) and spectral efficiency (SE) of proposed CG-D2D are calculated and compared it with the existing networks. The proposed CG-D2D reduces the power consumption by approximately 10% – 30% and enhances the SINR and spectral efficiency (SE) by approximately 2% – 8% and 2% – 4% respectively than the existing approaches.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122932056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Employing Deep Learning In Intraday Stock Trading 在股票盘中交易中运用深度学习
G. Taroon, Ayushi Tomar, Chinthakunta Manjunath, M. Balamurugan, Bikramaditya Ghosh, Addapalli V. N. Krishna
Accurate stock price prediction is a significant benefit to the Stock investors. The future Stock value of any company is determined by Stock market prediction. A successful prediction of the stock’s future price could result in a significant profit; Hence investors prefer a precise Stock price prediction. Although there are many different approaches to helps in forecasting stock prices, this paper will briefly look into the deep learning models and compare LSTM model and its variants. The key intention of this study is to propose a model that is best suitable and can be implemented to forecasting trend of stock prices. This paper focuses on binary classification problem, predicting the next-minute price movement of SPDR S&P 500 index The testing experiments performed on the SPDR S&P 500 index reveals that the variants of LSTM models, Slim LSTM1, slim LSTM2, and Slim LSTM3 with less parameters, provide better performance when compared to the Standard LSTM Model.
准确的股票价格预测对股票投资者来说是一项重要的利益。任何公司的未来股票价值都是由股票市场预测决定的。对股票未来价格的成功预测可能会带来可观的利润;因此,投资者更喜欢准确的股价预测。虽然有许多不同的方法可以帮助预测股票价格,但本文将简要介绍深度学习模型,并比较LSTM模型及其变体。本研究的主要目的是提出一个最适合并可用于股票价格趋势预测的模型。本文主要研究二元分类问题,预测SPDR标准普尔500指数的下一分钟价格走势。对SPDR标准普尔500指数进行的测试实验表明,与标准LSTM模型相比,参数较少的LSTM模型的变体Slim LSTM1、Slim LSTM2和Slim LSTM3具有更好的性能。
{"title":"Employing Deep Learning In Intraday Stock Trading","authors":"G. Taroon, Ayushi Tomar, Chinthakunta Manjunath, M. Balamurugan, Bikramaditya Ghosh, Addapalli V. N. Krishna","doi":"10.1109/ICRCICN50933.2020.9296174","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296174","url":null,"abstract":"Accurate stock price prediction is a significant benefit to the Stock investors. The future Stock value of any company is determined by Stock market prediction. A successful prediction of the stock’s future price could result in a significant profit; Hence investors prefer a precise Stock price prediction. Although there are many different approaches to helps in forecasting stock prices, this paper will briefly look into the deep learning models and compare LSTM model and its variants. The key intention of this study is to propose a model that is best suitable and can be implemented to forecasting trend of stock prices. This paper focuses on binary classification problem, predicting the next-minute price movement of SPDR S&P 500 index The testing experiments performed on the SPDR S&P 500 index reveals that the variants of LSTM models, Slim LSTM1, slim LSTM2, and Slim LSTM3 with less parameters, provide better performance when compared to the Standard LSTM Model.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128972693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cache Aware Task Scheduling Algorithm for Heterogeneous Cloud Computing Environment 异构云计算环境下的缓存感知任务调度算法
S. Nagendra Prasad, Subhash Kulkarni, Prasanth Venkatareddy
heterogeneous multicore computational environment are increasingly being used for executing scientific workload. Heterogeneous computational framework aid is reducing energy dissipation for executing real-time data intensive workload by employing Dynamic Power Management (DPM) and Dynamic Voltage and Frequency Scaling (DVFS). However, reducing energy and improving performance is becoming major constraint in modelling workload scheduling model in heterogeneous computational environment. For building tradeoffs model this work assume that different task will have different execution path, I/O access, memory, active processing, and cache requirement. Considering such assumption this paper present cache aware workload scheduling (CATS) algorithm by minimizing energy dissipation and utilizing cache resource more efficiently. The CATS model achieves much lesser execution time and energy consumption when compared with existing multiobjective based and DVFS-based workload scheduling algorithm.
异构多核计算环境越来越多地被用于执行科学工作负载。异构计算框架通过采用动态电源管理(DPM)和动态电压频率缩放(DVFS)来减少执行实时数据密集型工作负载的能量消耗。然而,在异构计算环境下,降低能耗和提高性能已成为构建工作负载调度模型的主要制约因素。为了构建折衷模型,本工作假定不同的任务将具有不同的执行路径、I/O访问、内存、活动处理和缓存需求。考虑到这一假设,本文提出了最小化能量消耗和更有效利用缓存资源的缓存感知工作负载调度算法。与现有的基于多目标和基于dvfs的工作负载调度算法相比,CATS模型的执行时间和能耗明显降低。
{"title":"Cache Aware Task Scheduling Algorithm for Heterogeneous Cloud Computing Environment","authors":"S. Nagendra Prasad, Subhash Kulkarni, Prasanth Venkatareddy","doi":"10.1109/ICRCICN50933.2020.9296177","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296177","url":null,"abstract":"heterogeneous multicore computational environment are increasingly being used for executing scientific workload. Heterogeneous computational framework aid is reducing energy dissipation for executing real-time data intensive workload by employing Dynamic Power Management (DPM) and Dynamic Voltage and Frequency Scaling (DVFS). However, reducing energy and improving performance is becoming major constraint in modelling workload scheduling model in heterogeneous computational environment. For building tradeoffs model this work assume that different task will have different execution path, I/O access, memory, active processing, and cache requirement. Considering such assumption this paper present cache aware workload scheduling (CATS) algorithm by minimizing energy dissipation and utilizing cache resource more efficiently. The CATS model achieves much lesser execution time and energy consumption when compared with existing multiobjective based and DVFS-based workload scheduling algorithm.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121075818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Diffie-Hellman Instantiations in Pre- and Post- Quantum World: A Review Paper 前量子世界和后量子世界中的Diffie-Hellman实例:综述
Ali Raya, K. Mariyappn
key exchange primitive is a fundamental pillar in public key cryptography. Diffie-Hellman is an example of a keyexchange protocol, which enables the establishment of shared secret key over an insecure public channel between two parties. Different instantiations of Diffie-Hellman can be found based on the underlying group/set where the computations required for establishing the shared key are carried out. In this paper, three different implementations of Diffie-Hellman protocol will be reviewed and compared: the core Diffie-Hellman (DH) protocol, Elliptic Curve Diffie-Hellman (ECDH) as examples of secure protocols in a pre-quantum world, and Supersingular Isogeny Diffie-Hellman (SIDH) as an example of a quantum-safe protocol for key establishment. The steps of establishing the shared key in each instantiation will be shown, security analysis will be discussed for the different implementations in both pre- and post-quantum world, and finally, a brief comparison of the three instantiations will be drawn.
密钥交换原语是公钥密码学的基本支柱。Diffie-Hellman是密钥交换协议的一个例子,它允许在双方之间不安全的公共通道上建立共享密钥。可以根据执行建立共享密钥所需的计算的底层组/集找到Diffie-Hellman的不同实例。本文将回顾和比较Diffie-Hellman协议的三种不同实现:核心Diffie-Hellman (DH)协议,椭圆曲线Diffie-Hellman (ECDH)协议作为前量子世界安全协议的例子,以及超奇异等源Diffie-Hellman (SIDH)协议作为量子安全密钥建立协议的例子。将显示在每个实例化中建立共享密钥的步骤,将讨论在前量子世界和后量子世界中不同实现的安全性分析,最后将对三种实例化进行简要比较。
{"title":"Diffie-Hellman Instantiations in Pre- and Post- Quantum World: A Review Paper","authors":"Ali Raya, K. Mariyappn","doi":"10.1109/ICRCICN50933.2020.9296172","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296172","url":null,"abstract":"key exchange primitive is a fundamental pillar in public key cryptography. Diffie-Hellman is an example of a keyexchange protocol, which enables the establishment of shared secret key over an insecure public channel between two parties. Different instantiations of Diffie-Hellman can be found based on the underlying group/set where the computations required for establishing the shared key are carried out. In this paper, three different implementations of Diffie-Hellman protocol will be reviewed and compared: the core Diffie-Hellman (DH) protocol, Elliptic Curve Diffie-Hellman (ECDH) as examples of secure protocols in a pre-quantum world, and Supersingular Isogeny Diffie-Hellman (SIDH) as an example of a quantum-safe protocol for key establishment. The steps of establishing the shared key in each instantiation will be shown, security analysis will be discussed for the different implementations in both pre- and post-quantum world, and finally, a brief comparison of the three instantiations will be drawn.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130062777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Neural Networks for detecting Intrusions: A survey 人工神经网络在入侵检测中的研究进展
Loreen Mahmoud, R. Praveen
Nowadays, the networks attacks became very sophisticated and hard to be recognized, The traditional types of intrusion detection systems became inefficient in predicting new types of attacks. As the IDS is an important factor in securing the network in the real time, many new effective IDS approaches have been proposed. In this paper, we intend to discuss different Artificial Neural Networks based IDS approaches, also we are going to categorize them in four categories (normal ANN, DNN, CNN, RNN) and make a comparison between them depending on different performance parameters (accuracy, FNR, FPR, training time, epochs and the learning rate) and other factors like the network structure, the classification type, the used dataset. At the end of the survey, we will mention the merits and demerits of each approach and suggest some enhancements to avoid the noticed drawbacks.
如今,网络攻击变得越来越复杂和难以识别,传统的入侵检测系统在预测新的攻击类型方面变得低效。由于入侵检测是保证网络实时安全的重要因素,人们提出了许多新的有效的入侵检测方法。在本文中,我们打算讨论不同的基于人工神经网络的IDS方法,并将它们分为四类(normal ANN, DNN, CNN, RNN),并根据不同的性能参数(准确率,FNR, FPR,训练时间,epoch和学习率)以及网络结构,分类类型,使用的数据集等其他因素对它们进行比较。在调查的最后,我们将提到每种方法的优点和缺点,并提出一些改进建议,以避免注意到的缺点。
{"title":"Artificial Neural Networks for detecting Intrusions: A survey","authors":"Loreen Mahmoud, R. Praveen","doi":"10.1109/ICRCICN50933.2020.9296181","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296181","url":null,"abstract":"Nowadays, the networks attacks became very sophisticated and hard to be recognized, The traditional types of intrusion detection systems became inefficient in predicting new types of attacks. As the IDS is an important factor in securing the network in the real time, many new effective IDS approaches have been proposed. In this paper, we intend to discuss different Artificial Neural Networks based IDS approaches, also we are going to categorize them in four categories (normal ANN, DNN, CNN, RNN) and make a comparison between them depending on different performance parameters (accuracy, FNR, FPR, training time, epochs and the learning rate) and other factors like the network structure, the classification type, the used dataset. At the end of the survey, we will mention the merits and demerits of each approach and suggest some enhancements to avoid the noticed drawbacks.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125550987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
ICRCICN 2020 Index ICRCICN 2020索引
{"title":"ICRCICN 2020 Index","authors":"","doi":"10.1109/icrcicn50933.2020.9296149","DOIUrl":"https://doi.org/10.1109/icrcicn50933.2020.9296149","url":null,"abstract":"","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133965824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Cyberattacks and its Detection Mechanisms 网络攻击及其检测机制分析
K. Sudar, P. Deepalakshmi, P. Nagaraj, V. Muneeswaran
With the help of Internet, there are tremendous innovations and developments in technologies. Most of the business organizations are forced to use the flexible and modern network technologies for business processing. This opens the door for cyber criminals to initiate cyberattacks to disrupt the business process. There are lot of reasons behind these cyberattacks like stealing login credentials, financial information and confidential information, disrupting the services available to legitimate users and to gain unauthorized access. To defend against cyberattacks, several mechanisms were proposed by researchers. In this paper, we analyzed about different types of cyberattacks and detection mechanisms to defend against those attacks. We also analyzed about different datasets and evaluation metrics used to evaluate the performance of every detection mechanism.
在互联网的帮助下,技术有了巨大的创新和发展。大多数业务组织都被迫使用灵活的现代网络技术进行业务处理。这为网络犯罪分子发起网络攻击以破坏业务流程打开了大门。这些网络攻击背后有很多原因,比如窃取登录凭证、财务信息和机密信息,破坏合法用户可用的服务,并获得未经授权的访问。为了防御网络攻击,研究人员提出了几种机制。在本文中,我们分析了不同类型的网络攻击和检测机制来防御这些攻击。我们还分析了用于评估每种检测机制性能的不同数据集和评估指标。
{"title":"Analysis of Cyberattacks and its Detection Mechanisms","authors":"K. Sudar, P. Deepalakshmi, P. Nagaraj, V. Muneeswaran","doi":"10.1109/ICRCICN50933.2020.9296178","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296178","url":null,"abstract":"With the help of Internet, there are tremendous innovations and developments in technologies. Most of the business organizations are forced to use the flexible and modern network technologies for business processing. This opens the door for cyber criminals to initiate cyberattacks to disrupt the business process. There are lot of reasons behind these cyberattacks like stealing login credentials, financial information and confidential information, disrupting the services available to legitimate users and to gain unauthorized access. To defend against cyberattacks, several mechanisms were proposed by researchers. In this paper, we analyzed about different types of cyberattacks and detection mechanisms to defend against those attacks. We also analyzed about different datasets and evaluation metrics used to evaluate the performance of every detection mechanism.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132685227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
期刊
2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1