Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregation

J Sharma, C Giri, OC Granmo, M Goodwin - EURASIP Journal on …, 2019 - Springer
Recent advances in intrusion detection systems based on machine learning have indeed
outperformed other techniques, but struggle with detecting multiple classes of attacks with …

Gradation measurement of asphalt mixture by X-Ray CT images and digital image processing methods

C Xing, H Xu, Y Tan, X Liu, C Zhou, T Scarpas - Measurement, 2019 - Elsevier
Gradation measurement is important for quality control of pavement construction. Computed
tomography (CT) can capture the microstructure images of asphalt mixture. However, an …

Software and hardware security of IoT

AK Singh, N Kushwaha - 2021 IEEE International IOT …, 2021 - ieeexplore.ieee.org
With the tremendous growth of IoT application, providing security to IoT systems has become
more critical. In this paper, a technique is presented to ensure the safety of Internet of Things …

Semi-blind source scanner identification

CB Rabah, G Coatrieux… - … Conference on Internet …, 2019 - ieeexplore.ieee.org
In this paper, we focus on the identification of a scanner at the origin of a given scanned
document provided by a public or private organization. Such documents have generally a …

Resource allocation in the cloud for video-on-demand applications using multiple cloud service providers

PM Reddy, A Ahmed, SH Manjula, KR Venugopal - Cluster Computing, 2019 - Springer
Abstract Video-on-demand (VoD) applications have become extensively used nowadays.
YouTube is one of the most extensively used VoD application. These applications are used …

Cloud Malicious Threat Detection Using Convolution Filter and EBPNN

R Singh, PK Mannepalli - 2021 5th International Conference on …, 2021 - ieeexplore.ieee.org
As number of online services are conducted on cloud due to its flexibility and operational
cost, so some of the malicious activity are performed which needs to be detected under …

[PDF][PDF] Cloud Malicious Threat Detection By Features From Intelligent Water Drop Set And EBPN

R Singh, PK Mannepalli - International Journal of Advanced …, 2020 - academia.edu
Cloud increase strength of various organizations to work from any location and time. This
flexibility lead to increase some security issue. As malicious programs take advantage of …

Comparative Analysis of Hadoop MapReduce and Spark Based on People's Livelihood Appeal Data

L Liang, H Zhao, Y Shen - CCF Conference on Big Data, 2021 - Springer
In data research area, one of the most challenging issues is how to extract the key
information from massive data with high efficiency. Hadoop and Spark are two widely …