2 resultados para Jihadist threat
em Abertay Research Collections - Abertay University’s repository
Resumo:
The Internet of things (IoT) is still in its infancy and has attracted much interest in many industrial sectors including medical fields, logistics tracking, smart cities and automobiles. However, as a paradigm, it is susceptible to a range of significant intrusion threats. This paper presents a threat analysis of the IoT and uses an Artificial Neural Network (ANN) to combat these threats. A multi-level perceptron, a type of supervised ANN, is trained using internet packet traces, then is assessed on its ability to thwart Distributed Denial of Service (DDoS/DoS) attacks. This paper focuses on the classification of normal and threat patterns on an IoT Network. The ANN procedure is validated against a simulated IoT network. The experimental results demonstrate 99.4% accuracy and can successfully detect various DDoS/DoS attacks.
Resumo:
This commentary links Humphrey and Sui’s proposed Self-attention Network (SAN) to the memory advantage associated with self-relevant information (i.e., the self-reference effect). Articulating this link elucidates the functional quality of the SAN in ensuring that information of potential importance to self is not lost. This adaptive system for self-processing mirrors the cognitive response to threat stimuli, which also elicit attentional biases and produce characteristically enhanced, episodic representations in memory. Understanding the link between the SAN and memory is key to comprehending more broadly the operation of the self in cognition.