AIMC Topic: Computer Security

Clear Filters Showing 1 to 10 of 401 articles

Federated hierarchical MARL for zero-shot cyber defense.

PloS one
Cyber defense systems face increasingly sophisticated threats that rapidly evolve and exploit vulnerabilities in complex environments. Traditional approaches which often rely on centralized monitoring and static rule-based detection, struggle to adap...

Daily insider threat detection with hybrid TCN transformer architecture.

Scientific reports
Internal threats are becoming more common in today's cybersecurity landscape. This is mainly because internal personnel often have privileged access, which can be exploited for malicious purposes. Traditional detection methods frequently fail due to ...

A privacy preserving machine learning framework for medical image analysis using quantized fully connected neural networks with TFHE based inference.

Scientific reports
Medical image analysis using deep learning algorithms has become a basis of modern healthcare, enabling early detection, diagnosis, treatment planning, and disease monitoring. However, sharing sensitive raw medical data with third parties for analysi...

Blockchain framework with IoT device using federated learning for sustainable healthcare systems.

Scientific reports
The Internet of Medical Things (IoMT) sector has advanced rapidly in recent years, and security and privacy are essential considerations in the IoMT due to the extensive scope and implementation of IoMT networks. Machine learning (ML) and blockchain ...

Enhancing IoT cybersecurity through lean-based hybrid feature selection and ensemble learning: A visual analytics approach to intrusion detection.

PloS one
The dynamical growth of cyber threats in IoT setting requires smart and scalable intrusion detection systems. In this paper, a Lean-based hybrid Intrusion Detection framework using Particle Swarm Optimization and Genetic Algorithm (PSO-GA) to select ...

Enhanced SVM-based model for predicting cyberspace vulnerabilities: Analyzing the role of user group dynamics and capital influx.

PloS one
Amid substantial capital influx and the rapid evolution of online user groups, the increasing complexity of user behavior poses significant challenges to cybersecurity, particularly in the domain of vulnerability prediction. This study aims to enhanc...

A hybrid fog-edge computing architecture for real-time health monitoring in IoMT systems with optimized latency and threat resilience.

Scientific reports
The advancement of the Internet of Medical Things (IoMT) has transformed healthcare delivery by enabling real-time health monitoring. However, it introduces critical challenges related to latency and, more importantly, the secure handling of sensitiv...

Fused federated learning framework for secure and decentralized patient monitoring in healthcare 5.0 using IoMT.

Scientific reports
Federated Learning (FL) enables artificial intelligence frameworks to train on private information without compromising privacy, which is especially useful in the medical and healthcare industries where the knowledge or data at hand is never enough. ...

Double reinforcement learning for cluster synchronization of Boolean control networks under denial of service attacks.

PloS one
This paper investigates the asymptotic cluster synchronization of Boolean control networks (BCNs) under denial-of-service (DoS) attacks, where each state node in the network experiences random data loss following a Bernoulli distribution. First, the ...

False-positive tolerant model misconduct mitigation in distributed federated learning on electronic health record data across clinical institutions.

Scientific reports
As collaborative Machine Learning on cross-institutional, fully distributed networks become an important tool in predictive health modeling, its inherent security risks must be addressed. One among such risks is the lack of a mitigation strategy agai...