Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 4 de 4
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
PLoS One ; 19(1): e0296912, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38252633

RESUMO

Breast cancer is a prevalent and life-threatening disease that affects women globally. Early detection and access to top-notch treatment are crucial in preventing fatalities from this condition. However, manual breast histopathology image analysis is time-consuming and prone to errors. This study proposed a hybrid deep learning model (CNN+EfficientNetV2B3). The proposed approach utilizes convolutional neural networks (CNNs) for the identification of positive invasive ductal carcinoma (IDC) and negative (non-IDC) tissue using whole slide images (WSIs), which use pre-trained models to classify breast cancer in images, supporting pathologists in making more accurate diagnoses. The proposed model demonstrates outstanding performance with an accuracy of 96.3%, precision of 93.4%, recall of 86.4%, F1-score of 89.7%, Matthew's correlation coefficient (MCC) of 87.6%, the Area Under the Curve (AUC) of a Receiver Operating Characteristic (ROC) curve of 97.5%, and the Area Under the Curve of the Precision-Recall Curve (AUPRC) of 96.8%, which outperforms the accuracy achieved by other models. The proposed model was also tested against MobileNet+DenseNet121, MobileNetV2+EfficientNetV2B0, and other deep learning models, proving more powerful than contemporary machine learning and deep learning approaches.


Assuntos
Neoplasias da Mama , Carcinoma in Situ , Humanos , Feminino , Neoplasias da Mama/diagnóstico por imagem , Área Sob a Curva , Mama , Processamento de Imagem Assistida por Computador
2.
Sensors (Basel) ; 22(10)2022 May 19.
Artigo em Inglês | MEDLINE | ID: mdl-35632252

RESUMO

Cryptography protects privacy and confidentiality. So, it is necessary to guarantee that the ciphers used are secure and cryptanalysis-resistant. In this paper, a new state recovery attack against the RC4 stream cipher is revealed. A plaintext attack is used in which the attacker has both the plaintext and the ciphertext, so they can calculate the keystream and reveal the cipher's internal state. To increase the quality of answers to practical and recent real-world global optimization difficulties, researchers are increasingly combining two or more variations. PSO and EO are combined in a hybrid PSOEO in an uncertain environment. We may also convert this method to its binary form to cryptanalyze the internal state of the RC4 cipher. When solving the cryptanalysis issue with HBPSOEO, we discover that it is more accurate and quicker than utilizing both PSO and EO independently. Experiments reveal that our proposed fitness function, in combination with HBPSOEO, requires checking 104 possible internal states; however, brute force attacks require checking 2128 states.


Assuntos
Algoritmos , Confidencialidade , Privacidade
3.
Sensors (Basel) ; 20(20)2020 Oct 17.
Artigo em Inglês | MEDLINE | ID: mdl-33080829

RESUMO

Many companies have transformed their telephone systems into Voice over IP (VoIP) systems. Although implementation is simple, VoIP is vulnerable to different types of attacks. The Session Initiation Protocol (SIP) is a widely used protocol for handling VoIP signaling functions. SIP is unprotected against attacks because it is a text-based protocol and lacks defense against the growing security threats. The Distributed Denial of Service (DDoS) attack is a harmful attack, because it drains resources, and prevents legitimate users from using the available services. In this paper, we formulate detection of DDoS attacks as a classification problem and propose an approach using token embedding to enhance extracted features from SIP messages. We discuss a deep learning model based on Recurrent Neural Networks (RNNs) developed to detect DDoS attacks with low and high-rate intensity. For validation, a balanced real traffic dataset was built containing three attack scenarios with different attack durations and intensities. Experiments show that the system has a high detection accuracy and low detection time. The detection accuracy was higher for low-rate attacks than that of traditional machine learning.

4.
J Adv Res ; 6(4): 609-19, 2015 Jul.
Artigo em Inglês | MEDLINE | ID: mdl-26199752

RESUMO

Network intrusion detection based on anomaly detection techniques has a significant role in protecting networks and systems against harmful activities. Different metaheuristic techniques have been used for anomaly detector generation. Yet, reported literature has not studied the use of the multi-start metaheuristic method for detector generation. This paper proposes a hybrid approach for anomaly detection in large scale datasets using detectors generated based on multi-start metaheuristic method and genetic algorithms. The proposed approach has taken some inspiration of negative selection-based detector generation. The evaluation of this approach is performed using NSL-KDD dataset which is a modified version of the widely used KDD CUP 99 dataset. The results show its effectiveness in generating a suitable number of detectors with an accuracy of 96.1% compared to other competitors of machine learning algorithms.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...