Sensors (Basel)
November 2024
Given the high risk of Internet of Things (IoT) device compromise, it is crucial to discuss the attack detection aspect. However, due to the physical limitations of IoT, such as battery life and sensing and processing power, the widely used detection techniques, such as signature-based or anomaly-based detection, are quite ineffective. This research extracted loop-based cases from the transmission session dataset of "CTU-IoT-Malware-Capture-7-1" ("Linux, Mirai") and implemented a loop-based detection machine learning approach.
View Article and Find Full Text PDFDNA steganography is a technique for securely transmitting important data using DNA sequences. It involves encrypting and hiding messages within DNA sequences to prevent unauthorized access and decoding of sensitive information. Biometric systems, such as fingerprinting and iris scanning, are used for individual recognition.
View Article and Find Full Text PDFIn smart cities, the fast increase in automobiles has caused congestion, pollution, and disruptions in the transportation of commodities. Each year, there are more fatalities and cases of permanent impairment due to everyday road accidents. To control traffic congestion, provide secure data transmission also detecting accidents the IoT-based Traffic Management System is used.
View Article and Find Full Text PDFThe recent era has witnessed exponential growth in the production of multimedia data which initiates exploration and expansion of certain domains that will have an overwhelming impact on human society in near future. One of the domains explored in this article is content-based image retrieval (CBIR), in which images are mostly encoded using hand-crafted approaches that employ different descriptors and their fusions. Although utilization of these approaches has yielded outstanding results, their performance in terms of a semantic gap, computational cost, and appropriate fusion based on problem domain is still debatable.
View Article and Find Full Text PDFIn recent years, the advent of cloud computing has transformed the field of computing and information technology. It has been enabling customers to rent virtual resources and take advantage of various on-demand services with the lowest costs. Despite the advantages of cloud computing, it faces several threats; an example is a distributed denial of service (DDoS) attack, which is considered among the most serious.
View Article and Find Full Text PDFIn the current era of smart homes and smart grids, complex technical systems that allow for the automation of domestic functions are rapidly growing and becoming more widely available. A wide range of technologies and software applications are now available for use in smart homes, and many of them are free to use. They allow for communication between home appliances and their users, as well as the automation, monitoring, and remote-control capabilities of home appliances themselves.
View Article and Find Full Text PDFOne of the main concerns for online shopping websites is to provide efficient and customized recommendations to a very large number of users based on their preferences. Collaborative filtering (CF) is the most famous type of recommender system method to provide personalized recommendations to users. CF generates recommendations by identifying clusters of similar users or items from the user-item rating matrix.
View Article and Find Full Text PDFDementia directly influences the quality of life of a person suffering from this chronic illness. The caregivers or carers of dementia people provide critical support to them but are subject to negative health outcomes because of burden and stress. The intervention of mobile health (mHealth) has become a fast-growing assistive technology (AT) in therapeutic treatment of individuals with chronic illness.
View Article and Find Full Text PDF