Supervised learning will be a bottleneck for developing plant disease identification since it relies on learning from massive amounts of carefully labeled images, which is costly and time-consuming. On the contrary, self-supervised learning has succeeded in various image classification tasks; however, it has not been applied broadly in the plant disease analysis process. This work, therefore, studies the effectiveness of self-supervised learning using contrastive pre-training with SimCLR for plant disease image classification. We investigated unsupervised pre-training scenarios on unlabeled plant images across multiple architectures, including supervised fine-tuning on labeled samples. In addition, we explored the label efficiency of the self-supervised approach, acquired by fine-tuning the models on various fractions of labeled images. Our results demonstrated that the performance of self-supervised learning on plant disease became comparable to that of the supervised training approach.
{"title":"Self-supervised learning advanced plant disease image classification with SimCLR","authors":"Songpol Bunyang, Natdanai Thedwichienchai, Krisna Pintong, Nuj Lael, Wuthipoom Kunaborimas, Phawit Boonrat, Thitirat Siriborvornratanakul","doi":"10.1007/s43674-023-00065-z","DOIUrl":"10.1007/s43674-023-00065-z","url":null,"abstract":"<div><p>Supervised learning will be a bottleneck for developing plant disease identification since it relies on learning from massive amounts of carefully labeled images, which is costly and time-consuming. On the contrary, self-supervised learning has succeeded in various image classification tasks; however, it has not been applied broadly in the plant disease analysis process. This work, therefore, studies the effectiveness of self-supervised learning using contrastive pre-training with SimCLR for plant disease image classification. We investigated unsupervised pre-training scenarios on unlabeled plant images across multiple architectures, including supervised fine-tuning on labeled samples. In addition, we explored the label efficiency of the self-supervised approach, acquired by fine-tuning the models on various fractions of labeled images. Our results demonstrated that the performance of self-supervised learning on plant disease became comparable to that of the supervised training approach.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"3 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71910741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we have considered a non-linear mathematical model to study the chaotic situation, arising due to slow process of recruitment, leading to an increase in unemployment. We observed the effects on recruitment process due to delay and without delay. We have also studied the stability of equilibrium points with numerical examples to compare with analytical and theoretical results.
{"title":"Modeling of the chaotic situation in the recruitment processes","authors":"Harendra Verma, Vishnu Narayan Mishra, Pankaj Mathur","doi":"10.1007/s43674-023-00064-0","DOIUrl":"10.1007/s43674-023-00064-0","url":null,"abstract":"<div><p>In this paper, we have considered a non-linear mathematical model to study the chaotic situation, arising due to slow process of recruitment, leading to an increase in unemployment. We observed the effects on recruitment process due to delay and without delay. We have also studied the stability of equilibrium points with numerical examples to compare with analytical and theoretical results.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"3 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43674-023-00064-0.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50447880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Threat surface area for the Internet of Things is calculated as the sum of security vulnerabilities or the weakness and gaps in protection efforts for the device, operating systems, associated software applications, and the local infrastructure. This aggregates all the known and unknown threats that can potentially expose the device, logs, data, and hosted applications. By reducing the exposed elements of the device surface, the device vulnerabilities can decrease the exposed threat surface area. This research presents a new framework first to map the devices in the ecosystem, measure the potential threat surface area from the exposure indicators for each layer and then determine the threat vectors for device compromise to calculate the maturity and severity levels. The authors propose new metrics to reassess and re-calculate the maturity and severity levels. Based on the new metrics, newly exposed threat surface elements provide a new security perspective beneficial for stakeholders involved in design, implementation, and security ecosystem of smart devices.
{"title":"Framework to measure and reduce the threat surface area for smart home devices","authors":"Akashdeep Bhardwaj, Keshav Kaushik, Vishal Dagar, Manoj Kumar","doi":"10.1007/s43674-023-00062-2","DOIUrl":"10.1007/s43674-023-00062-2","url":null,"abstract":"<div><p>Threat surface area for the Internet of Things is calculated as the sum of security vulnerabilities or the weakness and gaps in protection efforts for the device, operating systems, associated software applications, and the local infrastructure. This aggregates all the known and unknown threats that can potentially expose the device, logs, data, and hosted applications. By reducing the exposed elements of the device surface, the device vulnerabilities can decrease the exposed threat surface area. This research presents a new framework first to map the devices in the ecosystem, measure the potential threat surface area from the exposure indicators for each layer and then determine the threat vectors for device compromise to calculate the maturity and severity levels. The authors propose new metrics to reassess and re-calculate the maturity and severity levels. Based on the new metrics, newly exposed threat surface elements provide a new security perspective beneficial for stakeholders involved in design, implementation, and security ecosystem of smart devices.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"3 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50437072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-25DOI: 10.1007/s43674-023-00063-1
Shanshan Wang, Xiaohong Li, Jin Yao, Ben You
Local citation recommendation is a list of references that researchers need to cite based on a given context, so it could help researchers produce high-quality academic writing quickly and efficiently. However, existing citation recommendation methods only consider contextual content or author information, ignore the critical influence of historical citation information on citations, and learn the paper embedding at a coarse-grained level, resulting in lower-quality recommendations. To solve the above problems, we propose a novel two-stage citation recommendation model with multiple information fusion (MICR). The first stage is to enhance the target paper’s representation learning of the MICR model. To achieve the above goal, three encoders, which contain context information encoder, historical citation encoder, and author information encoder, are designed to learn rich representations of the target paper. The second stage is to select appropriate recommendation strategies for the target paper and candidate papers to achieve the goal of efficient citation recommendation. Experiments on two public citation datasets show that our model outperforms several competitive baseline methods on citation recommendation.
{"title":"Multi-information fusion based on dual attention and text embedding network for local citation recommendation","authors":"Shanshan Wang, Xiaohong Li, Jin Yao, Ben You","doi":"10.1007/s43674-023-00063-1","DOIUrl":"10.1007/s43674-023-00063-1","url":null,"abstract":"<div><p>Local citation recommendation is a list of references that researchers need to cite based on a given context, so it could help researchers produce high-quality academic writing quickly and efficiently. However, existing citation recommendation methods only consider contextual content or author information, ignore the critical influence of historical citation information on citations, and learn the paper embedding at a coarse-grained level, resulting in lower-quality recommendations. To solve the above problems, we propose a novel two-stage citation recommendation model with multiple information fusion (MICR). The first stage is to enhance the target paper’s representation learning of the MICR model. To achieve the above goal, three encoders, which contain context information encoder, historical citation encoder, and author information encoder, are designed to learn rich representations of the target paper. The second stage is to select appropriate recommendation strategies for the target paper and candidate papers to achieve the goal of efficient citation recommendation. Experiments on two public citation datasets show that our model outperforms several competitive baseline methods on citation recommendation.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"3 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50512939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-18DOI: 10.1007/s43674-023-00061-3
Totan Garai
In the real number set, generalized intuitionistic fuzzy numbers (GIFNs) are an impressive number of fuzzy sets (FSs). GIFNs are very proficient in managing the decision-making problem data. Our aim of this paper is to develop a new ranking method for solving a multi-attribute decision-making (MADM) problem with GIFN data. Here, we have defined the possibility mean and standard deviation of GIFNs. Then, we have formulated the magnitude of membership and non-membership function of GIFNs. In the proposed MADM problem, the attribute values are expressed as GIFNs, which is a very workable environment for decision-making problems. Finally, a numerical example is analyzed to demonstrate the flexibility, applicability and universality of the proposed ranking method and MADM problem.
{"title":"Ranking method of the generalized intuitionistic fuzzy numbers founded on possibility measures and its application to MADM problem","authors":"Totan Garai","doi":"10.1007/s43674-023-00061-3","DOIUrl":"10.1007/s43674-023-00061-3","url":null,"abstract":"<div><p>In the real number set, generalized intuitionistic fuzzy numbers (GIFNs) are an impressive number of fuzzy sets (FSs). GIFNs are very proficient in managing the decision-making problem data. Our aim of this paper is to develop a new ranking method for solving a multi-attribute decision-making (MADM) problem with GIFN data. Here, we have defined the possibility mean and standard deviation of GIFNs. Then, we have formulated the magnitude of membership and non-membership function of GIFNs. In the proposed MADM problem, the attribute values are expressed as GIFNs, which is a very workable environment for decision-making problems. Finally, a numerical example is analyzed to demonstrate the flexibility, applicability and universality of the proposed ranking method and MADM problem.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"3 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43674-023-00061-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50492891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this study, a decision support system (DSS) based on the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) method was developed using MATLAB to select the best dental implant alternative. The first step involved conducting interviews with experts to identify the criteria for TOPSIS. In the second step, a database was structured for each dental implant brand distributed in the market for the last five years. In the third step, MATLAB code and Graphical User Interfaces (GUI) were created to execute TOPSIS. The user can also display the other four options with a graph on the GUI, including the ranking scores (Ci*) for each option. The DSS was applied in two case studies. The MATLAB-based DSS tool has a compact, user-friendly interface, making it easy to adopt in implant selection decisions. The proposed DSS can be widely used in different applications in dental implant selection tasks.
{"title":"Development of a decision support system to use in the strategic purchasing of dental implants","authors":"Funda Özdiler Çopur, Dilek Çökeliler Serdaroğlu, Yusuf Tansel İç, Fikret Arı","doi":"10.1007/s43674-023-00060-4","DOIUrl":"10.1007/s43674-023-00060-4","url":null,"abstract":"<div><p>In this study, a decision support system (DSS) based on the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) method was developed using MATLAB to select the best dental implant alternative. The first step involved conducting interviews with experts to identify the criteria for TOPSIS. In the second step, a database was structured for each dental implant brand distributed in the market for the last five years. In the third step, MATLAB code and Graphical User Interfaces (GUI) were created to execute TOPSIS. The user can also display the other four options with a graph on the GUI, including the ranking scores (C<sub>i</sub><sup>*</sup>) for each option. The DSS was applied in two case studies. The MATLAB-based DSS tool has a compact, user-friendly interface, making it easy to adopt in implant selection decisions. The proposed DSS can be widely used in different applications in dental implant selection tasks.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"3 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50445318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Speech mood analysis is a challenging task with unclear optimal feature selection. The nature of the dataset, whether it is from an infant or adult, is crucial to consider. In this study, the characteristics of speech were investigated using Mel-frequency cepstral coefficients (MFCC) to analyze audio files. The CREMA-D dataset, which includes six different mood states (normal, angry, happy, sad, scared, and irritated), was employed to identify mood states from speech files. A mood classification system was proposed that integrates Support Vector Machines (SVM) and Long Short-Term Memory (LSTM) models to increase the number of labeled data in small datasets and improve classification accuracy.
A semi-supervised model was proposed in this study to improve the accuracy of speech mood classification systems. The approach was tested on a classification model that used SVM and LSTM, and it was found that the semi-supervised model outperforms both SVM and LSTM models, achieving a validation accuracy of 89.72%. This result surpasses the accuracy achieved by SVM and LSTM models alone. Moreover, the semi-supervised method was observed to accelerate the training process of the model. These outcomes illustrate the efficacy of the proposed model and its potential to enhance speech mood analysis techniques.
{"title":"Speech emotion classification using semi-supervised LSTM","authors":"Nattipon Itponjaroen, Kumpee Apsornpasakorn, Eakarat Pimthai, Khwanchai Kaewkaisorn, Shularp Panitchart, Thitirat Siriborvornratanakul","doi":"10.1007/s43674-023-00059-x","DOIUrl":"10.1007/s43674-023-00059-x","url":null,"abstract":"<div><p>Speech mood analysis is a challenging task with unclear optimal feature selection. The nature of the dataset, whether it is from an infant or adult, is crucial to consider. In this study, the characteristics of speech were investigated using Mel-frequency cepstral coefficients (MFCC) to analyze audio files. The CREMA-D dataset, which includes six different mood states (normal, angry, happy, sad, scared, and irritated), was employed to identify mood states from speech files. A mood classification system was proposed that integrates Support Vector Machines (SVM) and Long Short-Term Memory (LSTM) models to increase the number of labeled data in small datasets and improve classification accuracy.</p><p>A semi-supervised model was proposed in this study to improve the accuracy of speech mood classification systems. The approach was tested on a classification model that used SVM and LSTM, and it was found that the semi-supervised model outperforms both SVM and LSTM models, achieving a validation accuracy of 89.72%. This result surpasses the accuracy achieved by SVM and LSTM models alone. Moreover, the semi-supervised method was observed to accelerate the training process of the model. These outcomes illustrate the efficacy of the proposed model and its potential to enhance speech mood analysis techniques.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"3 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50504732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the adoption of Industry 4.0 advances and the manufacturing process becomes increasingly digital, the Digital Twin (DT) will prove invaluable for testing and simulating new parameters and design variants. DT solutions build a 3D digital replica of the physical object allowing the managers to develop better products, detect physical issues sooner, and predict outcomes more accurately. In the past few years, Digital Twins (DTs) dramatically reduced the cost of developing new manufacturing approaches, improved efficiency, reduced waste, and minimized batch-to-batch variability. This paper aims to highlight the evolution of DTs, review its enabling technologies, identify challenges and opportunities for implementing DT in Industry 4.0, and examine its range of applications in manufacturing, including smart logistics and supply chain management. The paper also highlights some real examples of the application of DT in manufacturing.
{"title":"The impact of digital twins on the evolution of intelligent manufacturing and Industry 4.0","authors":"Mohsen Attaran, Sharmin Attaran, Bilge Gokhan Celik","doi":"10.1007/s43674-023-00058-y","DOIUrl":"10.1007/s43674-023-00058-y","url":null,"abstract":"<div><p>As the adoption of Industry 4.0 advances and the manufacturing process becomes increasingly digital, the Digital Twin (DT) will prove invaluable for testing and simulating new parameters and design variants. DT solutions build a 3D digital replica of the physical object allowing the managers to develop better products, detect physical issues sooner, and predict outcomes more accurately. In the past few years, Digital Twins (DTs) dramatically reduced the cost of developing new manufacturing approaches, improved efficiency, reduced waste, and minimized batch-to-batch variability. This paper aims to highlight the evolution of DTs, review its enabling technologies, identify challenges and opportunities for implementing DT in Industry 4.0, and examine its range of applications in manufacturing, including smart logistics and supply chain management. The paper also highlights some real examples of the application of DT in manufacturing.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"3 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43674-023-00058-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9623751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-23DOI: 10.1007/s43674-023-00057-z
Ahmed El-Kosairy, Nashwa Abdelbaki, Heba Aslan
In recent years, cyber security attacks have increased massively. This introduces the need to defend against such attacks. Cyber security threat intelligence has recently been introduced to secure systems against security attacks. Cyber security threat intelligence (CTI) should be fast, trustful, and protect the sender's identity to stop these attacks at the right time. Threat intelligence sharing is vitally important since it is considered an effective way to improve threat understanding. This leads to protecting the assets and preventing the attack vectors. However, there is a paradox between the privacy safeguard needs of threat intelligence sharing; the need to produce complete proper threat intelligence feeds to be shared with the community, and other challenges and needs that are not covered in the traditional CTI. This paper aims to study how Blockchain technology can be incorporated with the CTI to solve the current issues and challenges in the traditional CTI. We collected the latest contributions that use Blockchain to overcome the conventional CTI problems and compared them to raise the reader’s awareness about the different methods used. Also, we mentioned the uncovered areas for each paper to offer a wide range of details and information about different areas that need to be investigated. Furthermore, the prospect challenges of integrating the Blockchain and CTI are discussed.
{"title":"A survey on cyber threat intelligence sharing based on Blockchain","authors":"Ahmed El-Kosairy, Nashwa Abdelbaki, Heba Aslan","doi":"10.1007/s43674-023-00057-z","DOIUrl":"10.1007/s43674-023-00057-z","url":null,"abstract":"<div><p>In recent years, cyber security attacks have increased massively. This introduces the need to defend against such attacks. Cyber security threat intelligence has recently been introduced to secure systems against security attacks. Cyber security threat intelligence (CTI) should be fast, trustful, and protect the sender's identity to stop these attacks at the right time. Threat intelligence sharing is vitally important since it is considered an effective way to improve threat understanding. This leads to protecting the assets and preventing the attack vectors. However, there is a paradox between the privacy safeguard needs of threat intelligence sharing; the need to produce complete proper threat intelligence feeds to be shared with the community, and other challenges and needs that are not covered in the traditional CTI. This paper aims to study how Blockchain technology can be incorporated with the CTI to solve the current issues and challenges in the traditional CTI. We collected the latest contributions that use Blockchain to overcome the conventional CTI problems and compared them to raise the reader’s awareness about the different methods used. Also, we mentioned the uncovered areas for each paper to offer a wide range of details and information about different areas that need to be investigated. Furthermore, the prospect challenges of integrating the Blockchain and CTI are discussed.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"3 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50507816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-20DOI: 10.1007/s43674-023-00056-0
Ahmed El-Kosairy, Nashwa Abdelbaki
Cloud computing technology is growing fast. It offers end-users flexibility, ease of use, agility, and more at a low cost. This expands the attack surface and factors, resulting in more attacks, vulnerabilities, and corruption. Traditional and old security controls are insufficient against new attacks and cybercrime. Technologies such as intrusion detection system (IDS), intrusion prevention system (IPS), Firewalls, Web Application Firewall (WAF), Next-Generation Firewall (NGFW), and endpoints are not enough, especially against a new generation of ransomware and hacking techniques. In addition to a slew of cloud computing options, such as software as a service (SaaS), it is challenging to manage and secure cloud technology. A new technique is needed to detect zero-day attacks related to ransomware, targeted attacks, or intruders. This paper presents our new technique for detecting zero-day ransomware attacks and intruders inside cloud technology. The proposed technique is based on a deception system based on honey files and tokens.
{"title":"Deception as a service: Intrusion and Ransomware Detection System for Cloud Computing (IRDS4C)","authors":"Ahmed El-Kosairy, Nashwa Abdelbaki","doi":"10.1007/s43674-023-00056-0","DOIUrl":"10.1007/s43674-023-00056-0","url":null,"abstract":"<div><p>Cloud computing technology is growing fast. It offers end-users flexibility, ease of use, agility, and more at a low cost. This expands the attack surface and factors, resulting in more attacks, vulnerabilities, and corruption. Traditional and old security controls are insufficient against new attacks and cybercrime. Technologies such as intrusion detection system (IDS), intrusion prevention system (IPS), Firewalls, Web Application Firewall (WAF), Next-Generation Firewall (NGFW), and endpoints are not enough, especially against a new generation of ransomware and hacking techniques. In addition to a slew of cloud computing options, such as software as a service (SaaS), it is challenging to manage and secure cloud technology. A new technique is needed to detect zero-day attacks related to ransomware, targeted attacks, or intruders. This paper presents our new technique for detecting zero-day ransomware attacks and intruders inside cloud technology. The proposed technique is based on a deception system based on honey files and tokens.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"3 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50499988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}