期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Decentralized content sharing in mobile ad-hoc networks:A survey
1
作者 Shahriar Kaisar joarder kamruzzaman +1 位作者 Gour Karmakar Md Mamunur Rashid 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1363-1398,共36页
The evolution of smart mobile devices has significantly impacted the way we generate and share contents and introduced a huge volume of Internet traffic.To address this issue and take advantage of the short-range comm... The evolution of smart mobile devices has significantly impacted the way we generate and share contents and introduced a huge volume of Internet traffic.To address this issue and take advantage of the short-range communication capabilities of smart mobile devices,the decentralized content sharing approach has emerged as a suitable and promising alternative.Decentralized content sharing uses a peer-to-peer network among colocated smart mobile device users to fulfil content requests.Several articles have been published to date to address its different aspects including group management,interest extraction,message forwarding,participation incentive,and content replication.This survey paper summarizes and critically analyzes recent advancements in decentralized content sharing and highlights potential research issues that need further consideration. 展开更多
关键词 Decentralized content sharing Mobile ad-hoc networks Delay-tolerant networks Flying ad hoc networks Message forwarding Content caching INCENTIVE Group formation Misbehavior detection
下载PDF
Enhancing Telemarketing Success Using Ensemble-Based Online Machine Learning
2
作者 Shahriar Kaisar Md Mamunur Rashid +3 位作者 Abdullahi Chowdhury Sakib Shahriar Shafin joarder kamruzzaman Abebe Diro 《Big Data Mining and Analytics》 EI CSCD 2024年第2期294-314,共21页
Telemarketing is a well-established marketing approach to offering products and services to prospective customers.The effectiveness of such an approach,however,is highly dependent on the selection of the appropriate c... Telemarketing is a well-established marketing approach to offering products and services to prospective customers.The effectiveness of such an approach,however,is highly dependent on the selection of the appropriate consumer base,as reaching uninterested customers will induce annoyance and consume costly enterprise resources in vain while missing interested ones.The introduction of business intelligence and machine learning models can positively influence the decision-making process by predicting the potential customer base,and the existing literature in this direction shows promising results.However,the selection of influential features and the construction of effective learning models for improved performance remain a challenge.Furthermore,from the modelling perspective,the class imbalance nature of the training data,where samples with unsuccessful outcomes highly outnumber successful ones,further compounds the problem by creating biased and inaccurate models.Additionally,customer preferences are likely to change over time due to various reasons,and/or a fresh group of customers may be targeted for a new product or service,necessitating model retraining which is not addressed at all in existing works.A major challenge in model retraining is maintaining a balance between stability(retaining older knowledge)and plasticity(being receptive to new information).To address the above issues,this paper proposes an ensemble machine learning model with feature selection and oversampling techniques to identify potential customers more accurately.A novel online learning method is proposed for model retraining when new samples are available over time.This newly introduced method equips the proposed approach to deal with dynamic data,leading to improved readiness of the proposed model for practical adoption,and is a highly useful addition to the literature.Extensive experiments with real-world data show that the proposed approach achieves excellent results in all cases(e.g.,98.6%accuracy in classifying customers)and outperforms recent competing models in the literature by a considerable margin of 3%on a widely used dataset. 展开更多
关键词 machine learning online learning OVERSAMPLING TELEMARKETING imbalanced dataset ensemble model
原文传递
RBFK cipher:a randomized butterfly architecture‑based lightweight block cipher for IoT devices in the edge computing environment
3
作者 Sohel Rana M.Rubaiyat Hossain Mondal joarder kamruzzaman 《Cybersecurity》 EI CSCD 2023年第3期18-36,共19页
Internet security has become a major concern with the growing use of the Internet of Things(IoT)and edge computing technologies.Even though data processing is handled by the edge server,sensitive data is generated and... Internet security has become a major concern with the growing use of the Internet of Things(IoT)and edge computing technologies.Even though data processing is handled by the edge server,sensitive data is generated and stored by the IoT devices,which are subject to attack.Since most IoT devices have limited resources,standard security algorithms such as AES,DES,and RSA hamper their ability to run properly.In this paper,a lightweight symmetric key cipher termed randomized butterfly architecture of fast Fourier transform for key(RBFK)cipher is proposed for resource-constrained IoT devices in the edge computing environment.The butterfly architecture is used in the key scheduling system to produce strong round keys for five rounds of the encryption method.The RBFK cipher has two key sizes:64 and 128 bits,with a block size of 64 bits.The RBFK ciphers have a larger avalanche effect due to the butterfly architecture ensuring strong security.The proposed cipher satisfies the Shannon characteristics of confusion and diffusion.The memory usage and execution cycle of the RBFK cipher are assessed using the fair evaluation of the lightweight cryptographic systems(FELICS)tool.The proposed ciphers were also implemented using MATLAB 2021a to test key sensitivity by analyzing the histogram,correlation graph,and entropy of encrypted and decrypted images.Since the RBFK ciphers with minimal computational complexity provide better security than recently proposed competing ciphers,these are suitable for IoT devices in an edge computing environment. 展开更多
关键词 Avalanche effects Block ciphers Butterfly architecture Edge computing FELICS IOT Lightweight cryptosystems MATLAB
原文传递
Survey of intrusion detection systems:techniques,datasets and challenges 被引量:32
4
作者 Ansam Khraisat Iqbal Gondal +1 位作者 Peter Vamplew joarder kamruzzaman 《Cybersecurity》 CSCD 2019年第1期1-22,共22页
Cyber-attacks are becoming more sophisticated and thereby presenting increasing challenges in accurately detecting intrusions.Failure to prevent the intrusions could degrade the credibility of security services,e.g.da... Cyber-attacks are becoming more sophisticated and thereby presenting increasing challenges in accurately detecting intrusions.Failure to prevent the intrusions could degrade the credibility of security services,e.g.data confidentiality,integrity,and availability.Numerous intrusion detection methods have been proposed in the literature to tackle computer security threats,which can be broadly classified into Signature-based Intrusion Detection Systems(SIDS)and Anomaly-based Intrusion Detection Systems(AIDS).This survey paper presents a taxonomy of contemporary IDS,a comprehensive review of notable recent works,and an overview of the datasets commonly used for evaluation purposes.It also presents evasion techniques used by attackers to avoid detection and discusses future research challenges to counter such techniques so as to make computer systems more secure. 展开更多
关键词 MALWARE Intrusion detection system NSL_KDD Anomaly detection Machine learning
原文传递
Hidden Markov Models Incorporating Fuzzy Measures and Integrals for Protein Sequence Identification and Alignment 被引量:6
5
作者 Niranjan P. Bidargaddi Madhu Chetty joarder kamruzzaman 《Genomics, Proteomics & Bioinformatics》 SCIE CAS CSCD 2008年第2期98-110,共13页
Profile hidden Markov models (HMMs) based on classical HMMs have been widely applied for protein sequence identification. The formulation of the forward and backward variables in profile HMMs is made under statistic... Profile hidden Markov models (HMMs) based on classical HMMs have been widely applied for protein sequence identification. The formulation of the forward and backward variables in profile HMMs is made under statistical independence assumption of the probability theory. We propose a fuzzy profile HMM to overcome the limitations of that assumption and to achieve an improved alignment for protein sequences belonging to a given family. The proposed model fuzzifies the forward and backward variables by incorporating Sugeno fuzzy measures and Choquet integrals, thus further extends the generalized HMM. Based on the fuzzified forward and backward variables, we propose a fuzzy Baum-Welch parameter estimation algorithm for profiles. The strong correlations and the sequence preference involved in the protein structures make this fuzzy architecture based model as a suitable candidate for building profiles of a given family, since the fuzzy set can handle uncertainties better than classical methods. 展开更多
关键词 fuzzy profile HMM sequence alignment fuzzy measure fuzzy integral
下载PDF
Survey of intrusion detection systems:techniques,datasets and challenges
6
作者 Ansam Khraisat Iqbal Gondal +1 位作者 Peter Vamplew joarder kamruzzaman 《Cybersecurity》 2018年第1期12-33,共22页
Cyber-attacks are becoming more sophisticated and thereby presenting increasing challenges in accurately detecting intrusions.Failure to prevent the intrusions could degrade the credibility of security services,e.g.da... Cyber-attacks are becoming more sophisticated and thereby presenting increasing challenges in accurately detecting intrusions.Failure to prevent the intrusions could degrade the credibility of security services,e.g.data confidentiality,integrity,and availability.Numerous intrusion detection methods have been proposed in the literature to tackle computer security threats,which can be broadly classified into Signature-based Intrusion Detection Systems(SIDS)and Anomaly-based Intrusion Detection Systems(AIDS).This survey paper presents a taxonomy of contemporary IDS,a comprehensive review of notable recent works,and an overview of the datasets commonly used for evaluation purposes.It also presents evasion techniques used by attackers to avoid detection and discusses future research challenges to counter such techniques so as to make computer systems more secure. 展开更多
关键词 MALWARE Intrusion detection system NSL_KDD Anomaly detection Machine learning
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部