Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2024
Android malware detection for timely detection using multi-class deep learning methods
International Journal of Intelligent Engineering Informatics (IJIEI), Volume 12, Issue 2Pages 213–235https://doi.org/10.1504/ijiei.2024.138860Android malware has emerged as a severe danger to national security because of the widespread usage of smartphones and the inherent risk it provides to its users. Due to code obfuscation, antivirus products and other typical detection algorithms struggle ...
- Work in ProgressApril 2023
Investigating Perceived Message Credibility and Detection Accuracy of Fake and Real Information Across Information Types and Modalities.
CHI EA '23: Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing SystemsArticle No.: 187, Pages 1–7https://doi.org/10.1145/3544549.3585719(Mis-)information thrives on social media, so it has become increasingly important for users to tell real from misleading content because erroneously following misinformation can cause serious consequences. In this study, we investigated users’ ...
- research-articleJanuary 2022
A novel neural network model for shrimp segmentation to detect white spot syndrome
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 43, Issue 1Pages 1453–1466https://doi.org/10.3233/JIFS-220172Image segmentation is an essential part of almost any image processing methodology and it play a critical role in protecting the region of interest on any substrate image before its actual analysis is prescribed. In fact, the accuracy of any processing ...
- research-articleMay 2021
J-UNIWARD Steganoanalysis
Cybernetics and Systems Analysis (KLU-CASA), Volume 57, Issue 3Pages 501–508https://doi.org/10.1007/s10559-021-00374-6AbstractThe author analyzes the problem of detecting the adaptive steganography by the J-UNIWARD method by steganoanalytical systems based on machine learning. As determined by the comparative analysis of the accuracy, the statistical models of ...
- research-articleFebruary 2021
A Comparative Study of ML-ELM and DNN for Intrusion Detection
ACSW '21: Proceedings of the 2021 Australasian Computer Science Week MulticonferenceArticle No.: 1, Pages 1–7https://doi.org/10.1145/3437378.3437390Intrusion detection remains one of the critical research issues in network security. Many machine learning algorithms have been proposed to develop intrusion detection systems, which can categorize network traffic into normal and anomalous classes. The ...
-
- research-articleJanuary 2021
A robust passive blind copy-move image forgery detection
International Journal of Information and Computer Security (IJICS), Volume 14, Issue 3-4Pages 300–317https://doi.org/10.1504/ijics.2021.114707Image forensic is the important research area which deals to verify the authenticity of the digital image. Copy-move forgery is common type of forgery used to modify the image. This paper proposes passive blind forensic copy-move forgery detection ...
- research-articleSeptember 2020
Authorisation, attack detection and avoidance framework for IoT devices
Internet of Things (IoT) involve large volumes of data generated from the interactions between devices and people, and security is a main alarm in IoT. Most of the anomaly detection techniques in IoT use supervised machine learning technique which involve ...
- research-articleJanuary 2020
A multi-filter feature selection in detecting distributed denial-of-service attack
ICTCE '19: Proceedings of the 3rd International Conference on Telecommunications and Communication EngineeringPages 57–62https://doi.org/10.1145/3369555.3369572Distributed Denial of Services (DDoS) has become the most intrusive security threat on the Internet. Flash crowd attack is the most challenging problem among the attacks which targeting the web server during the Flash Events (FEs). It mimics the ...
- research-articleJune 2019
Multistage spectrum sensing scheme with SNR estimation
IET Communications (CMU2), Volume 13, Issue 9Pages 1148–1154https://doi.org/10.1049/iet-com.2018.5665Multistage detection has inspired a heated debate due to its capacity to take full advantage of each detector. Motivated by this, an investigation into multistage spectrum sensing is conducted and a two‐stage spectrum detector is proposed based on energy ...
- research-articleApril 2019
Decision‐fusion‐based reliable CSS scheme in CR networks
Cognitive radio (CR) is a rapidly growing technology that can be employed to effectively utilise the radio spectrum. The detection accuracy of the CR user is compromised when a network is under degrading conditions like fading and shadowing effects. ...
- research-articleMarch 2019
Deep Learning-Based Intrusion Detection System for Advanced Metering Infrastructure
NISS '19: Proceedings of the 2nd International Conference on Networking, Information Systems & SecurityArticle No.: 58, Pages 1–7https://doi.org/10.1145/3320326.3320391Smart grid is an alternative solution of the conventional power grid which harnesses the power of the information technology to save the energy and meet todays' environment requirements. Due to the inherent vulnerabilities in the information technology, ...
- research-articleMarch 2019
Salient object detection via reliable boundary seeds and saliency refinement
IET Computer Vision (CVI2), Volume 13, Issue 3Pages 302–311https://doi.org/10.1049/iet-cvi.2018.5013Salient object detection can identify the most distinctive objects in a scene. In this study, a novel graph‐based approach is proposed to detect a salient object via reliable boundary seeds and saliency refinement. A natural image is firstly mapped to a ...
- articleJune 2017
Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences
Information Systems Research (INFORMS-ISR), Volume 28, Issue 2Pages 378–396https://doi.org/10.1287/isre.2016.0680This study investigates users' coping responses in the process of phishing email detection. Three common responses are identified based on the coping literature: task-focused coping, emotion-focused coping i.e., worry and self-criticism, and avoidance ...
- research-articleMay 2017
Distributed outlier detection algorithm based on credibility feedback in wireless sensor networks
IET Communications (CMU2), Volume 11, Issue 8Pages 1291–1296https://doi.org/10.1049/iet-com.2016.0986This study proposes a distributed outlier detection algorithm based on credibility feedback in wireless sensor networks. The algorithm consists of three stages, which are evaluating the initial credibility of sensor nodes, evaluating the final credibility ...
- tutorialOctober 2016
Program Anomaly Detection: Methodology and Practices
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 1853–1854https://doi.org/10.1145/2976749.2976750This tutorial will present an overview of program anomaly detection, which analyzes normal program behaviors and discovers aberrant executions caused by attacks, misconfigurations, program bugs, and unusual usage patterns. It was first introduced as an ...
- articleJuly 2016
Detecting JitterBug covert timing channel with sparse embedding
Security and Communication Networks (SACN), Volume 9, Issue 11Pages 1509–1519https://doi.org/10.1002/sec.1440As the detection methods of covert channels can provide a better way to detect the existence of advanced persistent threat, it has become a hot research topic in the field of network security. Although the existing methods can achieve feasible ...
- articleJanuary 2016
Fuzzy-based DDoS attack mitigation for reducing false positives in WLAN
International Journal of Mobile Network Design and Innovation (IJMNDI), Volume 6, Issue 3Pages 156–163https://doi.org/10.1504/IJMNDI.2016.079002In wireless local area network WLAN, accurately detecting the distributed denial of service DDoS attack is challenging. Hence in this paper, a fuzzy-based DDoS attacks mitigation technique is proposed to reduce the false positives. Initially the traffic ...
- articleDecember 2015
Steganalysis of perturbed quantization steganography based on the enhanced histogram features
Multimedia Tools and Applications (MTAA), Volume 74, Issue 24Pages 11045–11071https://doi.org/10.1007/s11042-014-2217-6In this paper, the enhanced histogram features are proposed for detecting perturbed quantization (PQ) steganography applied to double-compression JPEG image. Firstly, the principle of PQ steganography is analyzed and the special positions for feature ...
- ArticleJuly 2014
Bayesian Model Averaging of Bayesian Network Classifiers for Intrusion Detection
COMPSACW '14: Proceedings of the 2014 IEEE 38th International Computer Software and Applications Conference WorkshopsPages 128–133https://doi.org/10.1109/COMPSACW.2014.25Bayesian network (BN) classifiers with powerful reasoning capabilities have been increasingly utilized to detect intrusion with reasonable accuracy and efficiency. However, existing BN classifiers for intrusion detection suffer two problems. First, such ...
- posterSeptember 2013
An exploration with online complex activity recognition using cellphone accelerometer
UbiComp '13 Adjunct: Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publicationPages 199–202https://doi.org/10.1145/2494091.2494156We investigate the problem of online detection of complex activities (such as cooking, lunch, work at desk), i.e., recognizing them while the activities are being performed using parts of the sensor data. In contrast to prior work, where complex ...