信息工程最新文献

筛选
英文 中文
It is not only about having good attitudes: factor exploration of the attitudes toward security recommendations 不仅要有良好的态度:对安全建议态度的因素探讨
IF 3.9
Journal of Cybersecurity Pub Date : 2024-07-03 DOI: 10.1093/cybsec/tyae011
Miguel A Toro-Jarrin, Pilar Pazos, Miguel A Padilla
{"title":"It is not only about having good attitudes: factor exploration of the attitudes toward security recommendations","authors":"Miguel A Toro-Jarrin, Pilar Pazos, Miguel A Padilla","doi":"10.1093/cybsec/tyae011","DOIUrl":"https://doi.org/10.1093/cybsec/tyae011","url":null,"abstract":"Numerous factors determine information security-related actions (IS-actions) in the workplace. Attitudes toward following security rules and recommendations and attitudes toward specific IS actions determine intentions associated with those actions. IS research has examined the role of the instrumental aspect of attitudes. However, authors argue that attitudes toward a behavioral object are a multidimensional construct. We examined the dimensionality of attitudes toward security recommendations, hypothesized its multidimensional nature, and developed a new scale [attitudes toward security recommendations (ASR scale)]. The results indicated the multidimensional nature of attitudes toward security recommendations supporting our hypothesis. The results revealed two dimensions corresponding to the perceived legitimacy and effectiveness of security recommendations and its perceived rigor. The new ASR scale showed good psychometric properties. This work contributes to the IS research at suggesting that attitudes are a multidimensional construct in the IS context. These findings imply that the employee’s evaluation of information security policy can be examined considering their instrumentality (security recommendations are important) and rigor (security recommendations are strict). Different effects of the dimensions of attitudes over IS-action suggest different interventions. Additionally, this study offers the ASR scale as a new instrument to capture employees’ evaluation of security recommendations.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.9,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141547245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Addressing poxvirus challenges in the Middle East to enhance biosafety and biosecurity measures 应对中东痘病毒挑战,加强生物安全和生物安保措施
Journal of Biosafety and Biosecurity Pub Date : 2024-07-02 DOI: 10.1016/j.jobb.2024.06.003
Laith N. AL-Eitan , Haneen O. Ali , Hana S. Abu Kharmah , Maryam K. Alasmar , Iliya Y. Khair , Ahmad H. Mihyar
{"title":"Addressing poxvirus challenges in the Middle East to enhance biosafety and biosecurity measures","authors":"Laith N. AL-Eitan ,&nbsp;Haneen O. Ali ,&nbsp;Hana S. Abu Kharmah ,&nbsp;Maryam K. Alasmar ,&nbsp;Iliya Y. Khair ,&nbsp;Ahmad H. Mihyar","doi":"10.1016/j.jobb.2024.06.003","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.06.003","url":null,"abstract":"<div><p>The emergence and zoonotic transmission of poxviruses in the Middle East have been recognized as complex public health issues. Poxviruses, a vast family of DNA viruses, can infect many hosts, including animals and humans. The Middle East has had multiple epidemics of poxvirus infections (e.g., Monkeypox, Smallpox, and Camelpox) that have raised concerns owing to their detrimental effects on livestock, wildlife, and sporadic human cases. This review aims to thoroughly examine the complexity of the epidemiological patterns, intricate genetic diversity, and several contributing factors that support the emergence and zoonotic transmission of poxviruses in the Middle East. Several aspects of poxviruses contribute to the emergence of endemics and zoonotic breakouts, such as the complex nature of human-animal interactions, environmental changes, and their subtle capacity for viral adaptability. This review was compiled in the hopes of contributing to the current understanding of poxvirus biology and its implications for human and animal health in the Middle East. We provide a comprehensive overview of the most common poxviruses in the Middle East, including their classification, structure, replication cycle, pathogenesis, route of transmissions, and of how the Middle East has developed ways to mitigate these biological threats.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000335/pdfft?md5=951f14f2c0d40a84ed4f933830b032c0&pid=1-s2.0-S2588933824000335-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141594908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interdependent security games in the Stackelberg style: how first-mover advantage impacts free riding and security (under-)investment 斯塔克尔伯格式相互依存的安全博弈:先行者优势如何影响搭便车和安全(投资不足)问题
IF 3.9
Journal of Cybersecurity Pub Date : 2024-06-28 DOI: 10.1093/cybsec/tyae009
Ziyuan Huang, Parinaz Naghizadeh, Mingyan Liu
{"title":"Interdependent security games in the Stackelberg style: how first-mover advantage impacts free riding and security (under-)investment","authors":"Ziyuan Huang, Parinaz Naghizadeh, Mingyan Liu","doi":"10.1093/cybsec/tyae009","DOIUrl":"https://doi.org/10.1093/cybsec/tyae009","url":null,"abstract":"Network games are commonly used to capture the strategic interactions among interconnected agents in simultaneous moves. The agents’ actions in a Nash equilibrium must take into account the mutual dependencies connecting them, which is typically obtained by solving a set of fixed point equations. Stackelberg games, on the other hand, model the sequential moves between agents that are categorized as leaders and followers. The corresponding solution concept, the subgame perfect equilibrium, is typically obtained using backward induction. Both game forms enjoy very wide use in the (cyber)security literature, the network game often as a template to study security investment and externality—also referred to as the interdependent security games—and the Stackelberg game as a formalism to model a variety of attacker–defender scenarios. In this study, we examine a model that combines both types of strategic reasoning: the interdependency as well as sequential moves. Specifically, we consider a scenario with a network of interconnected first movers (firms or defenders, whose security efforts and practices collectively determine the security posture of the eco-system) and one or more second movers, the attacker(s), who determine how much effort to exert on attacking the many potential targets. This gives rise to an equilibrium concept that embodies both types of equilibria mentioned above. We will examine how its existence and uniqueness conditions differ from that for a standard network game. Of particular interest are comparisons between the two game forms in terms of effort exerted by the defender(s) and the attacker(s), respectively, and the free-riding behavior among the defenders.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.9,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141502761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A mathematical model for a disease outbreak considering waning-immunity class with nonlinear incidence and recovery rates 考虑到非线性发病率和恢复率的免疫力减弱类疾病爆发数学模型
Journal of Biosafety and Biosecurity Pub Date : 2024-06-26 DOI: 10.1016/j.jobb.2024.05.005
Nursanti Anggriani , Lazarus Kalvein Beay , Meksianis Z. Ndii , Fatuh Inayaturohmat , Sanubari Tansah Tresna
{"title":"A mathematical model for a disease outbreak considering waning-immunity class with nonlinear incidence and recovery rates","authors":"Nursanti Anggriani ,&nbsp;Lazarus Kalvein Beay ,&nbsp;Meksianis Z. Ndii ,&nbsp;Fatuh Inayaturohmat ,&nbsp;Sanubari Tansah Tresna","doi":"10.1016/j.jobb.2024.05.005","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.05.005","url":null,"abstract":"<div><p>In the spread of infectious diseases, intervention levels play a crucial role in shaping interactions between healthy and infected individuals, leading to a nonlinear transmission process. Additionally, the availability of medical resources limits the recovery rate of infected patients, adding further nonlinear dynamics to the healing process. Our research introduces novelty by combining nonlinear incidence and recovery rates alongside waning immunity in an epidemic model. We present a modified SIRW-type model, examining the epidemic problem with these factors. Through analysis, we explore conditions for non-endemic and co-existing cases based on the basic reproduction ratio. The local stability of equilibria is verified using the Routh-Hurwitz criteria, while global stability is assessed using Lyapunov functions for each equilibrium. Furthermore, we investigate bifurcations around both non-endemic and co-existing equilibria. Numerically, we give some simulations to support our analytical findings.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000311/pdfft?md5=9a3f3ac37c5d275226798d8df28d62fc&pid=1-s2.0-S2588933824000311-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141594902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The association between mycotic pneumonia and neonatal septicemia 霉菌性肺炎与新生儿败血症之间的关系
Journal of Biosafety and Biosecurity Pub Date : 2024-06-26 DOI: 10.1016/j.jobb.2024.06.002
Salman Khalid Salman, Yasir Mufeed Abdulateef, Sawsan Qahtan Taha Al-Quhli
{"title":"The association between mycotic pneumonia and neonatal septicemia","authors":"Salman Khalid Salman,&nbsp;Yasir Mufeed Abdulateef,&nbsp;Sawsan Qahtan Taha Al-Quhli","doi":"10.1016/j.jobb.2024.06.002","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.06.002","url":null,"abstract":"<div><h3>Background</h3><p>Candida species are the fourth most common etiological agents of late-onset infection in the neonatal intensive care unit (NICU) and are responsible for considerable morbidity and mortality.</p></div><div><h3>Objectives</h3><p>From November 2023 to February 2024, we investigated the association of mycotic pneumonia with septicemia in 60 neonates, and their roles of mycotic pneumonia in the morbidity and mortality of neonates in two NICUs in the Al-Ramadi Teaching Hospital for Maternity and Children.</p></div><div><h3>Methods</h3><p>All infants in this study had been diagnosed with septicemia and treated with empirical antimicrobial therapy. An early morning nasogastric tube (NG-tube) was used to collect swallowed sputum by suction for culture and sensitivity testing.</p></div><div><h3>Results</h3><p>The average white blood count for the neonates was 8547 ± 5884.5 cells/mm<sup>2</sup>. The mean C-reactive protein was 39.3 ± 26 mg/l, the mean serum albumin was 2.9 ± 0.2 g/dl and the positive bacterial blood culture was 28 (46.7 %). 9 (15 %) neonates died during the study period. The NG-tube culture identified fungal growth in all samples. Of these, 49 (81.6 %) were identified as <em>Candida albicans</em>, 6 (10 %) as <em>Candida tropicalis</em>, and 5 (8.3 %) as <em>Cryptococcus laurentii</em>. The bacterial culture results from the NG-tube samples identified 13 (21.6 %) patients with gram-positive bacteria and 47 (78.3 %) with gram-negative bacteria.</p></div><div><h3>Conclusion</h3><p>We found a prevalence of Candida spp. among neonates in addition to microbial oxygen tube contamination, indicating a biosafety breach in the neonatal unit. Mycotic infection requires global attention as a probable cause of respiratory failure in neonatal septicemia.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000323/pdfft?md5=e98223a68d44a37acdaeed7c16c9e563&pid=1-s2.0-S2588933824000323-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Structure-based discovery of F. religiosa phytochemicals as potential inhibitors against Monkeypox (mpox) viral protein 基于结构发现 F. religiosa 植物化学物质作为猴痘 (mpox) 病毒蛋白的潜在抑制剂
Journal of Biosafety and Biosecurity Pub Date : 2024-06-24 DOI: 10.1016/j.jobb.2024.05.004
Ranjan K. Mohapatra , Ahmed Mahal , Pranab K. Mohapatra , Ashish K. Sarangi , Snehasish Mishra , Meshari A. Alsuwat , Nada N. Alshehri , Sozan M. Abdelkhalig , Mohammed Garout , Mohammed Aljeldah , Ahmad A. Alshehri , Ahmed Saif , Mohammed Abdulrahman Alshahrani , Ali S. Alqahtani , Yahya A. Almutawif , Hamza M.A. Eid , Faisal M Albaqami , Mohnad Abdalla , Ali A. Rabaan
{"title":"Structure-based discovery of F. religiosa phytochemicals as potential inhibitors against Monkeypox (mpox) viral protein","authors":"Ranjan K. Mohapatra ,&nbsp;Ahmed Mahal ,&nbsp;Pranab K. Mohapatra ,&nbsp;Ashish K. Sarangi ,&nbsp;Snehasish Mishra ,&nbsp;Meshari A. Alsuwat ,&nbsp;Nada N. Alshehri ,&nbsp;Sozan M. Abdelkhalig ,&nbsp;Mohammed Garout ,&nbsp;Mohammed Aljeldah ,&nbsp;Ahmad A. Alshehri ,&nbsp;Ahmed Saif ,&nbsp;Mohammed Abdulrahman Alshahrani ,&nbsp;Ali S. Alqahtani ,&nbsp;Yahya A. Almutawif ,&nbsp;Hamza M.A. Eid ,&nbsp;Faisal M Albaqami ,&nbsp;Mohnad Abdalla ,&nbsp;Ali A. Rabaan","doi":"10.1016/j.jobb.2024.05.004","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.05.004","url":null,"abstract":"<div><p>Outbreaks of Monkeypox (mpox) in over 100 non-endemic countries in 2022 represented a serious global health concern. Once a neglected disease, mpox has become a global public health issue. A42R profilin-like protein from mpox (PDB ID: 4QWO) represents a potential new lead for drug development and may interact with various synthetic and natural compounds. In this report, the interaction of A42R profilin-like protein with six phytochemicals found in the medicinal plant <em>Ficus religiosa</em> (abundant in India) was examined. Based on the predicted and compared protein–ligand binding energies, biological properties, IC<sub>50</sub> values and toxicity, two compounds, kaempferol (C-1) and piperine (C-4), were selected. ADMET characteristics and quantitative structure–activity relationship (QSAR) of these two compounds were determined, and molecular dynamics (MD) simulations were performed. <em>In silico</em> examination of the kaempferol (C-1) and piperine (C-4) interactions with A42R profilin-like protein gave best-pose ligand-binding energies of –6.98 and –5.57 kcal/mol, respectively. The predicted IC<sub>50</sub> of C-1 was 7.63 μM and 82 μM for C-4. Toxicity data indicated that kaempferol and piperine are non-mutagenic, and the QSAR data revealed that piperlongumine (5.92) and piperine (5.25) had higher log P values than the other compounds examined. MD simulations of A42R profilin-like protein in complex with C-1 and C-4 were performed to examine the stability of the ligand–protein interactions. As/C and C-4 showed the highest affinity and activities, they may be suitable lead candidates for developing mpox therapeutic drugs. This study should facilitate discovering and synthesizing innovative therapeutics to address other infectious diseases.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S258893382400030X/pdfft?md5=ec15123379db8c297e57ae0d9b373a79&pid=1-s2.0-S258893382400030X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141594907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
‘The trivial tickets build the trust’: a co-design approach to understanding security support interactions in a large university 琐碎的门票建立信任":了解一所大型大学中安全支持互动的共同设计方法
IF 3.9
Journal of Cybersecurity Pub Date : 2024-06-20 DOI: 10.1093/cybsec/tyae007
Albesë Demjaha, David Pym, Tristan Caulfield, Simon Parkin
{"title":"‘The trivial tickets build the trust’: a co-design approach to understanding security support interactions in a large university","authors":"Albesë Demjaha, David Pym, Tristan Caulfield, Simon Parkin","doi":"10.1093/cybsec/tyae007","DOIUrl":"https://doi.org/10.1093/cybsec/tyae007","url":null,"abstract":"Increasingly, organizations are acknowledging the importance of human factors in the management of security in workplaces. There are challenges in managing security infrastructures in which there may be centrally mandated and locally managed initiatives to promote secure behaviours. We apply a co-design methodology to harmonize employee behaviour and centralized security management in a large university. This involves iterative rounds of interviews connected by the co-design methodology: 14 employees working with high-value data with specific security needs; seven support staff across both local and central IT and IT-security support teams; and two senior security decision-makers in the organization. We find that employees prefer local support together with assurances that they are behaving securely, rather than precise instructions that lack local context. Trust in support teams that understand local needs also improves engagement, especially for employees who are unsure what to do. Policy is understood by employees through their interactions with support staff and when they see colleagues enacting secure behaviours in the workplace. The iterative co-design approach brings together the viewpoints of a range of employee groups and security decision-makers that capture key influences that drive secure working practices. We provide recommendations for improvements to workplace security, including recognizing that communication of the policy is as important as what is in the policy.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.9,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141502762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-Commerce Fraud Detection Based on Machine Learning Techniques: Systematic Literature Review 基于机器学习技术的电子商务欺诈检测:系统性文献综述
IF 13.6 1区 计算机科学
Big Data Mining and Analytics Pub Date : 2024-06-01 DOI: 10.26599/bdma.2023.9020023
Abed Mutemi, F. Bação
{"title":"E-Commerce Fraud Detection Based on Machine Learning Techniques: Systematic Literature Review","authors":"Abed Mutemi, F. Bação","doi":"10.26599/bdma.2023.9020023","DOIUrl":"https://doi.org/10.26599/bdma.2023.9020023","url":null,"abstract":": The e-commerce industry’s rapid growth, accelerated by the COVID-19 pandemic, has led to an alarming increase in digital fraud and associated losses. To establish a healthy e-commerce ecosystem, robust cyber security and anti-fraud measures are crucial. However, research on fraud detection systems has struggled to keep pace due to limited real-world datasets. Advances in artificial intelligence, Machine Learning (ML), and cloud computing have revitalized research and applications in this domain. While ML and data mining techniques are popular in fraud detection, specific reviews focusing on their application in e-commerce platforms like eBay and Facebook are lacking depth. Existing reviews provide broad overviews but fail to grasp the intricacies of ML algorithms in the e-commerce context. To bridge this gap, our study conducts a systematic literature review using the Preferred Reporting Items for Systematic reviews and Meta-Analysis (PRISMA) methodology. We aim to explore the effectiveness of these techniques in fraud detection within digital marketplaces and the broader e-commerce landscape. Understanding the current state of the literature and emerging trends is crucial given the rising fraud incidents and associated costs. Through our investigation, we identify research opportunities and provide insights to industry stakeholders on key ML and data mining techniques for combating e-commerce fraud. Our paper examines the research on these techniques as published in the past decade. Employing the PRISMA approach, we conducted a content analysis of 101 publications, identifying research gaps, recent techniques, and highlighting the increasing utilization of artificial neural networks in fraud detection within the industry.","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":null,"pages":null},"PeriodicalIF":13.6,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141235310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unstructured Big Data Threat Intelligence Parallel Mining Algorithm 非结构化大数据威胁情报并行挖掘算法
IF 13.6 1区 计算机科学
Big Data Mining and Analytics Pub Date : 2024-06-01 DOI: 10.26599/bdma.2023.9020032
Zhihua Li, Xinye Yu, Tao Wei, Junhao Qian
{"title":"Unstructured Big Data Threat Intelligence Parallel Mining Algorithm","authors":"Zhihua Li, Xinye Yu, Tao Wei, Junhao Qian","doi":"10.26599/bdma.2023.9020032","DOIUrl":"https://doi.org/10.26599/bdma.2023.9020032","url":null,"abstract":"","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":null,"pages":null},"PeriodicalIF":13.6,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141230556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Adaptive Scalable Data Pipeline for Multiclass Attack Classification in Large-Scale IoT Networks 用于大规模物联网网络多类攻击分类的自适应可扩展数据管道
IF 13.6 1区 计算机科学
Big Data Mining and Analytics Pub Date : 2024-06-01 DOI: 10.26599/bdma.2023.9020027
Selvam Saravanan, Uma Maheswari Balasubramanian
{"title":"An Adaptive Scalable Data Pipeline for Multiclass Attack Classification in Large-Scale IoT Networks","authors":"Selvam Saravanan, Uma Maheswari Balasubramanian","doi":"10.26599/bdma.2023.9020027","DOIUrl":"https://doi.org/10.26599/bdma.2023.9020027","url":null,"abstract":"","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":null,"pages":null},"PeriodicalIF":13.6,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141232523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信