8th International Conference on Soft Computing, Artificial Intelligence and Applications最新文献

筛选
英文 中文
Evolving Random Topologies of Spiking Neural Networks for Pattern Recognition 用于模式识别的脉冲神经网络随机拓扑进化
G. López-Vázquez, M. Ornelas-Rodríguez, Andrés Espinal, J. Soria-Alcaraz, Alfonso Rojas-Domínguez, H. J. Puga-Soberanes, J. M. Carpio, H. Rostro-González
{"title":"Evolving Random Topologies of Spiking Neural Networks for Pattern Recognition","authors":"G. López-Vázquez, M. Ornelas-Rodríguez, Andrés Espinal, J. Soria-Alcaraz, Alfonso Rojas-Domínguez, H. J. Puga-Soberanes, J. M. Carpio, H. Rostro-González","doi":"10.5121/CSIT.2019.90704","DOIUrl":"https://doi.org/10.5121/CSIT.2019.90704","url":null,"abstract":"Artificial Neural Networks (ANNs) have been successfully used in Pattern Recognition tasks. Evolutionary Spiking Neural Networks (ESNNs) constitute an approach to design thirdgeneration ANNs (also known as Spiking Neural Networks, SNNs) involving Evolutionary Algorithms (EAs) to govern some intrinsic aspects of the networks, such as topology, connections and/or parameters. Concerning the practicality of the networks, a rather simple standard is commonly used; restricted feed-forward fully-connected network topologies deprived from more complex connections are usually considered. Notwithstanding, a wider prospect of configurations in contrast to standard network topologies is available for research. In this paper, ESNNs are evolved to solve pattern classification tasks, using an EA-based algorithm known as Grammatical Evolution (GE). Experiments demonstrate competitive results and a distinctive variety of network designs when compared to a more traditional approach to design ESNNs.","PeriodicalId":383682,"journal":{"name":"8th International Conference on Soft Computing, Artificial Intelligence and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127730879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vulnerability Analysis of IP Cameras Using ARP Poisoning IP摄像机ARP中毒漏洞分析
T. Doughty, N. Israr, U. Adeel
{"title":"Vulnerability Analysis of IP Cameras Using ARP Poisoning","authors":"T. Doughty, N. Israr, U. Adeel","doi":"10.5121/CSIT.2019.90712","DOIUrl":"https://doi.org/10.5121/CSIT.2019.90712","url":null,"abstract":"Internet Protocol (IP) cameras and Internet of Things (IoT) devices are known for their vulnerabilities, and Man in the Middle attacks present a significant privacy and security concern. Because the attacks are easy to perform and highly effective, this allows attackers to steal information and disrupt access to services. We evaluate the security of six IP cameras by performing and outlining various attacks which can be used by criminals. A threat scenario is used to describe how a criminal may attack cameras before and during a burglary. Our findings show that IP cameras remain vulnerable to ARP Poisoning or Spoofing, and while some cameras use Digest Authentication to obfuscate passwords, some vendors and applications remain insecure. We suggest methods to prevent ARP Poisoning, and reiterate the need for good password policy.","PeriodicalId":383682,"journal":{"name":"8th International Conference on Soft Computing, Artificial Intelligence and Applications","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115061540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信