Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
720 result(s) for "Deep learning (Machine learning) Security measures."
Sort by:
Applications of machine learning and deep learning for privacy and cybersecurity
\"This comprehensive and timely book provides an overview of the field of Machine and Deep Learning in the areas of cybersecurity and privacy, followed by an in-depth view of emerging research exploring the theoretical aspects of machine and deep learning, as well as real-world implementations\"-- Provided by publisher.
Novel deep reinforcement learning based collision avoidance approach for path planning of robots in unknown environment
Reinforcement learning is a remarkable aspect of the artificial intelligence field with many applications. Reinforcement learning facilitates learning new tasks based on action and reward principles. Motion planning addresses the navigation problem for robots. Current motion planning approaches lack support for automated, timely responses to the environment. The problem becomes worse in a complex environment cluttered with obstacles. Reinforcement learning can increase the capacity of robotic systems due to the reward system’s capability and feedback to the environment. This could help deal with a complex environment. Existing algorithms for path planning are slow, computationally expensive, and less responsive to the environment, which causes late convergence to a solution. Furthermore, they are less efficient for task learning due to post-processing requirements. Reinforcement learning can address these issues using its action feedback and reward policies. This research presents a novel Q-learning-based reinforcement algorithm with deep learning integration. The proposed approach is evaluated in a narrow and cluttered passage environment. Further, improvements in the convergence of reinforcement learning-based motion planning and collision avoidance are addressed. The proposed approach’s agent converged in 210 th episodes in a cluttered environment and 400 th episodes in a narrow passage environment. A state-of-the-art comparison shows that the proposed approach outperformed existing approaches based on the number of turns and convergence of the path by the planner.
Big data analytics in fog-enabled IoT networks : towards a privacy and security perspective
\"Integration of Fog computing with the resource limited IoT network, formulate the concept of Fog-enabled IoT system. Due to large number of deployments of IoT devices, a IoT is a main source of Big data and a very high volume of sensing data is generated by IoT system such as smart cities and smart grid applications. To provide a fast and efficient data analytics solution for Fog-enabled IoT system is a very fundamental research issue. This book focus on Big data Analytics in Fog-enabled-IoT system and provides a comprehensive collection of chapters that are touches different issues related to Healthcare system, Cyber threat detection, Malware detection, security and privacy of big IoT data and IoT network. This book emphasizes and facilitate a greater understanding of various security and privacy approaches using the advance AI and Big data technologies like machine/deep learning, federated learning, blockchain, edge computing and the countermeasures to overcome the vulnerabilities of the Fog-enabled IoT system\"-- Provided by publisher.
A Comprehensive Survey of Unmanned Aerial Vehicles Detection and Classification Using Machine Learning Approach: Challenges, Solutions, and Future Directions
Autonomous unmanned aerial vehicles (UAVs) have several advantages in various fields, including disaster relief, aerial photography and videography, mapping and surveying, farming, as well as defense and public usage. However, there is a growing probability that UAVs could be misused to breach vital locations such as airports and power plants without authorization, endangering public safety. Because of this, it is critical to accurately and swiftly identify different types of UAVs to prevent their misuse and prevent security issues arising from unauthorized access. In recent years, machine learning (ML) algorithms have shown promise in automatically addressing the aforementioned concerns and providing accurate detection and classification of UAVs across a broad range. This technology is considered highly promising for UAV systems. In this survey, we describe the recent use of various UAV detection and classification technologies based on ML and deep learning (DL) algorithms. Four types of UAV detection and classification technologies based on ML are considered in this survey: radio frequency-based UAV detection, visual data (images/video)-based UAV detection, acoustic/sound-based UAV detection, and radar-based UAV detection. Additionally, this survey report explores hybrid sensor- and reinforcement learning-based UAV detection and classification using ML. Furthermore, we consider method challenges, solutions, and possible future research directions for ML-based UAV detection. Moreover, the dataset information of UAV detection and classification technologies is extensively explored. This investigation holds potential as a study for current UAV detection and classification research, particularly for ML- and DL-based UAV detection approaches.
AI, machine learning and deep learning : a security perspective
\"Today Artificial Intelligence (AI) and Machine/Deep Learning (ML/DL) have become the hottest areas in the information technology. In our society, there are so many intelligent devices that rely on AI/ML/DL algorithms/tools for smart operations. Although AI/ML/DL algorithms/tools have used in many Internet applications and electronic devices, they are also vulnerable to various attacks and threats. The AI parameters may be distorted by the internal attacker; the DL input samples may be polluted by adversaries; the ML model may be misled by changing the classification boundary, and many other attacks/threats. Those attacks make the AI products dangerous to use. While the above discussion focuses on the security issues in AI/ML/DL-based systems (i.e., securing the intelligent systems themselves), AI/ML/DL models/algorithms can be used for cyber security (i.e., use AI to achieve security). Since the AI/ML/DL security is a new emergent field, many researchers and industry people cannot obtain detailed, comprehensive understanding of this area. This book aims to provide a complete picture on the challenges and solutions to the security issues in various applications. It explains how different attacks can occur in advanced AI tools and the challenges of overcoming those attacks. Then many sets of promising solutions are described to achieve AI security and privacy in this book. The features of this book consist of 7 aspects: This is the first book to explain various practical attacks and countermeasures to AI systems; Both quantitative math models and practical security implementations are provided; It covers both \"securing the AI system itself\" and \"use AI to achieve security\"; It covers all the advanced AI attacks and threats with detailed attack models; It provides the multiple solution spaces to the security and privacy issues in AI tools; The differences among ML and DL security/privacy issues are explained. Many practical security applications are covered\"-- Provided by publisher.
Machine Learning-Based Anomaly Detection in NFV: A Comprehensive Survey
Network function virtualization (NFV) is a rapidly growing technology that enables the virtualization of traditional network hardware components, offering benefits such as cost reduction, increased flexibility, and efficient resource utilization. Moreover, NFV plays a crucial role in sensor and IoT networks by ensuring optimal resource usage and effective network management. However, adopting NFV in these networks also brings security challenges that must promptly and effectively address. This survey paper focuses on exploring the security challenges associated with NFV. It proposes the utilization of anomaly detection techniques as a means to mitigate the potential risks of cyber attacks. The research evaluates the strengths and weaknesses of various machine learning-based algorithms for detecting network-based anomalies in NFV networks. By providing insights into the most efficient algorithm for timely and effective anomaly detection in NFV networks, this study aims to assist network administrators and security professionals in enhancing the security of NFV deployments, thus safeguarding the integrity and performance of sensors and IoT systems.
Deep reinforcement learning for decision making of autonomous vehicle in non-lane-based traffic environments
Existing research on decision-making of autonomous vehicles (AVs) has mainly focused on normal road sections, with limited exploration of decision-making in complex traffic environments without lane markings. Taking toll plaza diverging area as an example, this study proposes a lateral motion strategy for AVs based on deep reinforcement learning (DRL) algorithms. First, a microscopic simulation platform is developed to simulate the realistic diverging trajectories of human-driven vehicles (HVs), providing AVs with a high-fidelity training environment. Next, a DRL-based self-efficient lateral motion strategy for AVs is proposed, with state and reward functions tailored to the environmental features of the diverging area. Simulation results indicate that the strategy can significantly reduce the diverging time of single vehicles. In addition, considering the long-term coexistence of AVs and HVs, the study further explores how the varying penetration of AVs with self-efficient strategy impacts traffic flow in the diverging area. Findings reveal that a moderate increase in AV penetration can improve overall traffic efficiency and safety. But an excessive penetration of AVs with self-efficient strategy leads to intense competition for limited road resources, further deteriorating operational conditions in the diverging area.
Enhanced Intrusion Detection Systems Performance with UNSW-NB15 Data Analysis
The rapid proliferation of new technologies such as Internet of Things (IoT), cloud computing, virtualization, and smart devices has led to a massive annual production of over 400 zettabytes of network traffic data. As a result, it is crucial for companies to implement robust cybersecurity measures to safeguard sensitive data from intrusion, which can lead to significant financial losses. Existing intrusion detection systems (IDS) require further enhancements to reduce false positives as well as enhance overall accuracy. To minimize security risks, data analytics and machine learning can be utilized to create data-driven recommendations and decisions based on the input data. This study focuses on developing machine learning models that can identify cyber-attacks and enhance IDS system performance. This paper employed logistic regression, support vector machine, decision tree, and random forest algorithms on the UNSW-NB15 network traffic dataset, utilizing in-depth exploratory data analysis, and feature selection using correlation analysis and random sampling to compare model accuracy and effectiveness. The performance and confusion matrix results indicate that the Random Forest model is the best option for identifying cyber-attacks, with a remarkable F1 score of 97.80%, accuracy of 98.63%, and low false alarm rate of 1.36%, and thus should be considered to improve IDS system security.
Employing Deep Reinforcement Learning to Cyber-Attack Simulation for Enhancing Cybersecurity
In the current landscape where cybersecurity threats are escalating in complexity and frequency, traditional defense mechanisms like rule-based firewalls and signature-based detection are proving inadequate. The dynamism and sophistication of modern cyber-attacks necessitate advanced solutions that can evolve and adapt in real-time. Enter the field of deep reinforcement learning (DRL), a branch of artificial intelligence that has been effectively tackling complex decision-making problems across various domains, including cybersecurity. In this study, we advance the field by implementing a DRL framework to simulate cyber-attacks, drawing on authentic scenarios to enhance the realism and applicability of the simulations. By meticulously adapting DRL algorithms to the nuanced requirements of cybersecurity contexts—such as custom reward structures and actions, adversarial training, and dynamic environments—we provide a tailored approach that significantly improves upon traditional methods. Our research undertakes a thorough comparative analysis of three sophisticated DRL algorithms—deep Q-network (DQN), actor–critic, and proximal policy optimization (PPO)—against the traditional RL algorithm Q-learning, within a controlled simulation environment reflective of real-world cyber threats. The findings are striking: the actor–critic algorithm not only outperformed its counterparts with a success rate of 0.78 but also demonstrated superior efficiency, requiring the fewest iterations (171) to complete an episode and achieving the highest average reward of 4.8. In comparison, DQN, PPO, and Q-learning lagged slightly behind. These results underscore the critical impact of selecting the most fitting algorithm for cybersecurity simulations, as the right choice leads to more effective learning and defense strategies. The impressive performance of the actor–critic algorithm in this study marks a significant stride towards the development of adaptive, intelligent cybersecurity systems capable of countering the increasingly sophisticated landscape of cyber threats. Our study not only contributes a robust model for simulating cyber threats but also provides a scalable framework that can be adapted to various cybersecurity challenges.
The Intersection of Machine Learning and Wireless Sensor Network Security for Cyber-Attack Detection: A Detailed Analysis
This study provides a thorough examination of the important intersection of Wireless Sensor Networks (WSNs) with machine learning (ML) for improving security. WSNs play critical roles in a wide range of applications, but their inherent constraints create unique security challenges. To address these problems, numerous ML algorithms have been used to improve WSN security, with a special emphasis on their advantages and disadvantages. Notable difficulties include localisation, coverage, anomaly detection, congestion control, and Quality of Service (QoS), emphasising the need for innovation. This study provides insights into the beneficial potential of ML in bolstering WSN security through a comprehensive review of existing experiments. This study emphasises the need to use ML’s potential while expertly resolving subtle nuances to preserve the integrity and dependability of WSNs in the increasingly interconnected environment.