Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
3,506
result(s) for
"IoT security"
Sort by:
Risk prediction in financial management of listed companies based on optimized BP neural network under digital economy
by
Li, Xuetao
,
Wang, Jia
,
Yang, Chengying
in
Accuracy
,
Artificial Intelligence
,
Artificial neural networks
2023
In the era of \"Internet plus,\" the world economy is becoming more and more globalized and informationalized. China's enterprises are facing unprecedented opportunities for their operation and development. However, it is also facing the financial uncertainties brought about by the fluctuations of the general economic environment, and the company is facing increasing financial risks. The reason why most enterprises encounter a serious financial crisis or even close down in the later stage is that they do not pay full attention to the initial financial problems and do not take effective measures to deal with the crisis in time. Financial risk warning has become an important part of modern enterprise financial management. This paper mainly puts forward the optimized BP neural system as the financial early warning model and ensures its high prediction accuracy. In the research, the operation principle and related reasoning process of the model are described, its shortcomings are analyzed, and solutions are put forward. Through the financial risk analysis of listed companies from 2017 to 2020, we find that the correct rate of the prediction results of the financial distress of normal companies in the selected companies based on the optimized BPNN has reached more than 80%, which proves the effectiveness of the optimized BPNN.
Journal Article
A Microservice and Serverless Architecture for Secure IoT System
by
Hefeng Xu
,
Ruiqi Ouyang
,
Shixiong Chen
in
Applications programming
,
Architecture
,
Chemical technology
2023
In cross-border transactions, the transmission and processing of logistics information directly affect the trading experience and efficiency. The use of Internet of Things (IoT) technology can make this process more intelligent, efficient, and secure. However, most traditional IoT logistics systems are provided by a single logistics company. These independent systems need to withstand high computing loads and network bandwidth when processing large-scale data. Additionally, due to the complex network environment of cross-border transactions, the platform’s information security and system security are difficult to guarantee. To address these challenges, this paper designs and implements an intelligent cross-border logistics system platform that combines serverless architecture and microservice technology. This system can uniformly distribute the services of all logistics companies and divide microservices based on actual business needs. It also studies and designs corresponding Application Programming Interface (API) gateways to solve the interface exposure problem of microservices, thereby ensuring the system’s security. Furthermore, asymmetric encryption technology is used in the serverless architecture to ensure the security of cross-border logistics data. The experiments show that this research solution validates the advantages of combining serverless architecture and microservices, which can significantly reduce the operating costs and system complexity of the platform in cross-border logistics scenarios. It allows for resource expansion and billing based on application program requirements at runtime. The platform can effectively improve the security of cross-border logistics service processes and meet cross-border transaction needs in terms of data security, throughput, and latency.
Journal Article
Multi-scale memory-enhanced method for predicting the remaining useful life of aircraft engines
2023
To guarantee the safe operation of machinery and reduce its maintenance costs, estimating its remaining useful life (RUL) is a crucial task. Hence, in this study, a multi-scale memory-enhanced prediction method is proposed to describe fully characteristics of the data. This method is based on a deep learning algorithm and is designed to estimate the RUL of aircraft engines. To handle the complex and multi-fault operating conditions with uncertain properties in RUL estimation, a hybrid model that combines a multi-scale deep convolutional neural network and long short-term memory is presented. Experimental verification was carried out with the Commercial Modular Aero-Propulsion System Simulation dataset from NASA. Compared with multi-scale deep convolutional and long short-term memory networks, the hybrid model performed more efficiently. Furthermore, compared with other state-of-the-art methods, the multi-scale memory-enhanced prediction method can achieve better prognostics, especially for equipment with multiple operating conditions and failure modes.
Journal Article
A novel federated learning approach for IoT botnet intrusion detection using SHAP-based knowledge distillation
by
Saif, Sadman
,
Hossain, Md. Alamgir
,
Islam, Md. Saiful
in
Accuracy
,
Adaptability
,
Botnet detection in IoT
2025
The exponential growth of the Internet of Things (IoT) has introduced new security vulnerabilities, particularly from botnet attacks that exploit the heterogeneity and limited processing capabilities of IoT devices. Traditional centralized intrusion detection models are ineffective in protecting distributed IoT environments due to data privacy concerns and the challenges posed by non-IID (non-independent and identically distributed) data. In response, we propose a novel, privacy-preserving federated learning framework tailored for IoT intrusion detection. Our framework leverages SHAP (Shapley Additive Explanations), a technique for computing feature importance, to provide interpretable insights while maintaining data privacy. Each IoT client trains locally on its unique, heterogeneous data, computes SHAP values to quantify feature relevance, and shares only distilled feature knowledge with the central server. This aggregated knowledge forms a global feature profile that enables the global model to accurately detect diverse botnet intrusions across non-IID client data. Experimental results demonstrate that our model achieves near-perfect accuracy (99.99%) across various botnet types, showcasing robustness in identifying botnet-specific attack patterns while preserving privacy. By addressing IoT data heterogeneity, non-IID data, and privacy concerns, our framework provides a scalable, interpretable, and privacy-compliant federated learning solution, advancing the security of IoT networks against botnet intrusions.
Journal Article
Enhancing Home Security with IoT Devices: A Vulnerability Analysis Using the IoT Security Test
by
Misailov, Andrey Yu
,
Mishra, Neeti
,
Lakhanpal, Sorabh
in
Cybersecurity
,
data privacy
,
Evaluation
2024
In order to carefully evaluate the susceptibility of common IoT devices found in smart homes, this research made use of the IoT Security Test framework. The findings showed a significant average drop in vulnerability ratings of 45% after evaluation, clearly indicating that improving IoT device security is feasible. The research classifies vulnerabilities found, highlighting the prevalence of Firmware Problems, Weak Passwords, and Network Vulnerabilities. Moreover, it examines the efficacy of remedial initiatives. These discoveries play a crucial role in enhancing the security of Internet of Things devices, providing a strong barrier for the protection of homeowners and the privacy of their data, especially in the constantly linked world of smart homes.
Journal Article
Vehicle detection and tracking based on video image processing in intelligent transportation system
2023
As an integral part of intelligent transportation system, vehicle detection and tracking system is of great research significance and practical application value. In this paper, based on the mixed Gaussian background model, the detection target is segmented by the different methods, and the most matching target track is found by using the location information and color information of the detection target, so as to realize the vehicle tracking. The experiment results show that for the same target, the centroid distance is less than 0.2, the color distance of HSV (hue saturation value) is less than 0.3, the centroid distance of different targets is less than 0.2, the HSV distance is less than 0.3, and the rest are distributed to some extent. When the centroid distance is 0.01, 0.02, 0.03, 0.04, 0.05 and 0.06, respectively, the matching results are 250, 150, 100, 50, 25 and 10, respectively; when the HSV color distance is 0.02, 0.06, 0.1, 0.14 and 0.18, respectively, the matching results are 160, 200, 100, 80 and 50, respectively. Therefore, for the normalized distance between the same targets, including the centroid distance and HSV color, in each possible matching area, the greater the distance is, the less the distribution of matching results. Experimental verification shows that when the vehicle is detected in the detection area, the effective contour is sequentially accessed and tracked through the memory pointer, and the relatively accurate contour of the moving vehicle can be obtained through the improved Gaussian mixture model. The vehicle detection algorithm based on regional method has high real-time accuracy and strong practical value, can meet the needs of intelligent transportation system, and has strong practical value.
Journal Article
Multi-Attack Intrusion Detection System for Software-Defined Internet of Things Network
by
Manene, Franklin
,
Abel Ajibesin, Adeyemi
,
Ferr鉶, Tarc韟io
in
Algorithms
,
Cybersecurity
,
Datasets
2023
Currently, the Internet of Things (IoT) is revolutionizing communication technology by facilitating the sharing of information between different physical devices connected to a network. To improve control, customization, flexibility, and reduce network maintenance costs, a new Software-Defined Network (SDN) technology must be used in this infrastructure. Despite the various advantages of combining SDN and IoT, this environment is more vulnerable to various attacks due to the centralization of control. Most methods to ensure IoT security are designed to detect Distributed Denial-of-Service (DDoS) attacks, but they often lack mechanisms to mitigate their severity. This paper proposes a Multi-Attack Intrusion Detection System (MAIDS) for Software-Defined IoT Networks (SDN-IoT). The proposed scheme uses two machine-learning algorithms to improve detection efficiency and provide a mechanism to prevent false alarms. First, a comparative analysis of the most commonly used machine-learning algorithms to secure the SDN was performed on two datasets: the Network Security Laboratory Knowledge Discovery in Databases (NSL-KDD) and the Canadian Institute for Cybersecurity Intrusion Detection Systems (CICIDS2017), to select the most suitable algorithms for the proposed scheme and for securing SDN-IoT systems. The algorithms evaluated include Extreme Gradient Boosting (XGBoost), K-Nearest Neighbor (KNN), Random Forest (RF), Support Vector Machine (SVM), and Logistic Regression (LR). Second, an algorithm for selecting the best dataset for machine learning in Intrusion Detection Systems (IDS) was developed to enable effective comparison between the datasets used in the development of the security scheme. The results showed that XGBoost and RF are the best algorithms to ensure the security of SDN-IoT and to be applied in the proposed security system, with average accuracies of 99.88% and 99.89%, respectively. Furthermore, the proposed security scheme reduced the false alarm rate by 33.23%, which is a significant improvement over prevalent schemes. Finally, tests of the algorithm for dataset selection showed that the rates of false positives and false negatives were reduced when the XGBoost and RF algorithms were trained on the CICIDS2017 dataset, making it the best for IDS compared to the NSL-KDD dataset.
Journal Article
Ultra-Low-Power FinFETs-Based TPCA-PUF Circuit for Secure IoT Devices
2021
Low-power and secure crypto-devices are in crucial demand for the current emerging technology of the Internet of Things (IoT). In nanometer CMOS technology, the static and dynamic power consumptions are in a very critical challenge. Therefore, the FinFETs is an alternative technology due to its superior attributes of non-leakage power, intra-die variability, low-voltage operation, and lower retention voltage of SRAMs. In this study, our previous work on CMOS two-phase clocking adiabatic physical unclonable function (TPCA-PUF) is evaluated in a FinFET device with a 4-bits PUF circuit complexity. The TPCA-PUF-based shorted-gate (SG) and independent-gate (IG) modes of FinFETs are investigated under various ambient temperatures, process variations, and ±20% of supply voltage variations. To validate the proposed TPCA-PUF circuit, the QUALPFU-based Fin-FETs are compared in terms of cyclical energy dissipation, the security metrics of the uniqueness, the reliability, and the bit-error-rate (BER). The proposed TPCA-PUF is simulated using 45 nm process technology with a supply voltage of 1 V. The uniqueness, reliability, and the BER of the proposed TPCA-PUF are 50.13%, 99.57%, and 0.43%, respectively. In addition, it requires a start-up power of 18.32 nW and consumes energy of 2.3 fJ/bit/cycle at the reference temperature of 27 °C.
Journal Article
Ensemble learning based anomaly detection for IoT cybersecurity via Bayesian hyperparameters sensitivity analysis
by
Bello, Abubakar
,
Farid, Farnaz
,
Sabrina, Fariza
in
Anomalies
,
Anomalies detection
,
Bayesian analysis
2024
The Internet of Things (IoT) integrates more than billions of intelligent devices over the globe with the capability of communicating with other connected devices with little to no human intervention. IoT enables data aggregation and analysis on a large scale to improve life quality in many domains. In particular, data collected by IoT contain a tremendous amount of information for anomaly detection. The heterogeneous nature of IoT is both a challenge and an opportunity for cybersecurity. Traditional approaches in cybersecurity monitoring often require different kinds of data pre-processing and handling for various data types, which might be problematic for datasets that contain heterogeneous features. However, heterogeneous types of network devices can often capture a more diverse set of signals than a single type of device readings, which is particularly useful for anomaly detection. In this paper, we present a comprehensive study on using ensemble machine learning methods for enhancing IoT cybersecurity via anomaly detection. Rather than using one single machine learning model, ensemble learning combines the predictive power from multiple models, enhancing their predictive accuracy in heterogeneous datasets rather than using one single machine learning model. We propose a unified framework with ensemble learning that utilises Bayesian hyperparameter optimisation to adapt to a network environment that contains multiple IoT sensor readings. Experimentally, we illustrate their high predictive power when compared to traditional methods.
Journal Article
Exploration of intelligent housing price forecasting based on the anchoring effect
2024
The investigation of how to accurately predict the sale price of houses is the main objective of our work. Accurate secondhand housing price appraisal is critical in secondhand housing deals, mortgages, and risk assessment. Due to the complex composition of real estate prices, the difficulty of obtaining data and the lack of effective algorithms, the accurate appraisal of housing prices is still a challenge. Based on the hedonic model, the anchoring effect is added to the structure and location characteristics in this work. The 2SFCA algorithm is introduced into the location feature index to filter the influence of the accessibility index. Our model was trained using a variety of machine learning models, such as linear regression and random forest, and the results were evaluated to determine a suitable algorithm for building a secondhand housing transaction price forecasting model. The results showed that the prediction accuracy of the price prediction model could be improved by adding the facility accessibility index, and when the anchoring effect is added to the price prediction model, the prediction accuracy of the model could increase to 0.89. In comparing the results of various machine learning algorithms, we found that the ETR, RFR, and GBR models had better prediction results, and the accuracy rate could reach 0.9. In the end, a case study in Shenzhen was utilized to show that our proposed framework for predicting the price of secondhand houses, which integrated behavioral economics, hedonic price theory, and machine learning algorithms, was practical and efficient and can effectively improve the efficiency and accuracy of the evaluation.
Journal Article