G. López-Vázquez, M. Ornelas-Rodríguez, Andrés Espinal, J. Soria-Alcaraz, Alfonso Rojas-Domínguez, H. J. Puga-Soberanes, J. M. Carpio, H. Rostro-González
{"title":"Evolving Random Topologies of Spiking Neural Networks for Pattern Recognition","authors":"G. López-Vázquez, M. Ornelas-Rodríguez, Andrés Espinal, J. Soria-Alcaraz, Alfonso Rojas-Domínguez, H. J. Puga-Soberanes, J. M. Carpio, H. Rostro-González","doi":"10.5121/CSIT.2019.90704","DOIUrl":"https://doi.org/10.5121/CSIT.2019.90704","url":null,"abstract":"Artificial Neural Networks (ANNs) have been successfully used in Pattern Recognition tasks. Evolutionary Spiking Neural Networks (ESNNs) constitute an approach to design thirdgeneration ANNs (also known as Spiking Neural Networks, SNNs) involving Evolutionary Algorithms (EAs) to govern some intrinsic aspects of the networks, such as topology, connections and/or parameters. Concerning the practicality of the networks, a rather simple standard is commonly used; restricted feed-forward fully-connected network topologies deprived from more complex connections are usually considered. Notwithstanding, a wider prospect of configurations in contrast to standard network topologies is available for research. In this paper, ESNNs are evolved to solve pattern classification tasks, using an EA-based algorithm known as Grammatical Evolution (GE). Experiments demonstrate competitive results and a distinctive variety of network designs when compared to a more traditional approach to design ESNNs.","PeriodicalId":383682,"journal":{"name":"8th International Conference on Soft Computing, Artificial Intelligence and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127730879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vulnerability Analysis of IP Cameras Using ARP Poisoning","authors":"T. Doughty, N. Israr, U. Adeel","doi":"10.5121/CSIT.2019.90712","DOIUrl":"https://doi.org/10.5121/CSIT.2019.90712","url":null,"abstract":"Internet Protocol (IP) cameras and Internet of Things (IoT) devices are known for their vulnerabilities, and Man in the Middle attacks present a significant privacy and security concern. Because the attacks are easy to perform and highly effective, this allows attackers to steal information and disrupt access to services. We evaluate the security of six IP cameras by performing and outlining various attacks which can be used by criminals. A threat scenario is used to describe how a criminal may attack cameras before and during a burglary. Our findings show that IP cameras remain vulnerable to ARP Poisoning or Spoofing, and while some cameras use Digest Authentication to obfuscate passwords, some vendors and applications remain insecure. We suggest methods to prevent ARP Poisoning, and reiterate the need for good password policy.","PeriodicalId":383682,"journal":{"name":"8th International Conference on Soft Computing, Artificial Intelligence and Applications","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115061540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}