Recent Challenges in Intelligent Information and Database Systems [electronic resource] : 16th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2024, Ras Al Khaimah, UAE, April 15-18, 2024, Proceedings. Part I / Ngoc Thanh Nguyen [and more], editors.
This book constitutes the proceedings of the 16th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2024, held in Ras Al Khaimah, UAE, during April 1518, 2024. The 58 full papers are presented in this book were carefully reviewed and selected from 251 submissions. They are org...
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Corporate Author: | |
Other Authors: | , , , , , , |
Other title: | ACIIDS 2024 |
Format: | Electronic Conference Proceeding eBook |
Language: | English |
Published: |
Singapore :
Springer,
2024.
|
Series: | Communications in computer and information science ;
2144. |
Subjects: |
Table of Contents:
- Intro
- Preface
- Organization
- Contents - Part I
- Contents - Part II
- AI-Driven Cybersecurity Solutions
- Security Aspects of Digital Identity
- 1 Introduction
- 2 Related Work
- 2.1 Trends in Digital Identity Protection
- 2.2 Authentication
- 2.3 Categories of Security Aspects
- 2.4 Analysis of Authentication Protocols
- 3 Material and Methods
- 3.1 Application Decomposition
- 3.2 Risk Analysis
- 3.3 Design of Mitigation Measures
- 4 Design of an Algorithm to Calculate the Optimal Protocol
- 4.1 Categorisation of Aspects
- 4.2 Analysis of Factors
- 4.3 Preparing WCS for Authentication Mechanisms
- 4.4 Expression of WCS and Aspect Dependence
- 4.5 Summary
- 4.6 OpenAI
- 5 Authentication Protocol Modelling Application
- 5.1 Technologies Used for Research
- 5.2 Functional Description of the Application
- 5.3 Strengths and Weaknesses of the Application
- 6 Discussion and Conclusion
- References
- Efficient Deep Learning Method for Detection of Malware Attacks in Internet of Things Networks
- 1 Introduction
- 2 Motivation
- 3 Related Work
- 4 Proposed Method
- 4.1 Trace in Packet
- 4.2 Deep Learning Model
- 4.3 Data Pre-processing
- 4.4 Deep Learning Architecture
- 5 Experimentation and Results
- 5.1 Development Environment
- 5.2 Datasets
- 5.3 Interpretation of Results
- 6 Conclusion
- References
- A Deep Neural Networks Approach for Speaker Verification on Embedded Devices
- 1 Introduction
- 2 Related Works
- 3 The Proposed System for Speaker Verification in Embedded Devices
- 3.1 The Three-Component Framework
- 3.2 The Wakeword Detector
- 3.3 The OTP Processing Subsystem
- 3.4 The Speaker Verification Subsystem
- 4 Experiments
- 4.1 Wakeword Detection
- 4.2 OTP Processing Block
- 4.3 Speaker Verification
- 4.4 Devices Temperature
- 5 Conclusion
- References
- Phishing Detection Using Ensemble of Classifiers
- 1 Introduction
- 2 Related Work
- 2.1 Phishing
- 2.2 Phishing Research
- 3 Objectives
- 4 Methodology
- 4.1 Dataset
- 4.2 Feature and Ensemble Selection
- 4.3 Performance Measures
- 4.4 Software Setup
- 5 Experimental Results
- 6 Analysis and Discussion of Results
- 6.1 Which Features Are Most Important for Ensembles?
- 6.2 External Features
- 6.3 Ensemble Performance
- 6.4 Future Work
- 7 Conclusion
- References
- An Effective Ensemble Classification Algorithm for Intrusion Detection System
- 1 Introduction
- 2 Related Work
- 2.1 Problem Definition of Intrusion Detection Systems
- 2.2 Intelligent Algorithms for the Intrusion Detection System
- 2.3 The Domain Adaptation Algorithm
- 3 The Proposed Method
- 3.1 Basic Idea
- 3.2 The Effective Ensemble Classification Algorithm
- 4 Experimental Results
- 4.1 Datasets
- 4.2 Experimental Environment and Parameter Settings
- 4.3 Simulation Results
- 5 Conclusion
- References