Results for 'network intrusion'

980 found
Order:
  1. Network Intrusion Detection using Machine Learning.B. Ravinder Reddy - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (4):1-15.
    With the growing sophistication and frequency of cyberattacks, there is a critical need for effective systems that can detect and prevent breaches in real time. The AI/ML-based Network Intrusion Detection System (NIDS) addresses this need by analyzing traffic patterns to identify security breaches in firewalls, routers, and network infrastructures. By integrating machine learning algorithms—K-Nearest Neighbors (KNN), Support Vector Machine (SVM), and Random Forest—the system is able to detect both known cyber threats and previously unseen attack vectors. Unlike (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  22
    Network Intrusion Classification.O. Sri Nagesh - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (11):1-14.
    The rapid proliferation of interconnected devices and the increasing complexity of digital networks in the modern era have resulted in a surge of diverse and voluminous network traffic. This growth poses considerable challenges in effectively distinguishing between normal and malicious data flows. As cyber threats continue to evolve, traditional traffic classification methods struggle to keep pace with the dynamic and multifaceted security challenges of contemporary networks. In this context, ensuring robust network security has become an imperative. This research (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection.Tosin Ige & Christopher Kiekintveld - 2023 - Proceedings of the IEEE 1:5.
    Bayesian classifiers perform well when each of the features is completely independent of the other which is not always valid in real world applications. The aim of this study is to implement and compare the performances of each variant of the Bayesian classifier (Multinomial, Bernoulli, and Gaussian) on anomaly detection in network intrusion, and to investigate whether there is any association between each variant’s assumption and their performance. Our investigation showed that each variant of the Bayesian algorithm blindly (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  4.  46
    Averting Eavesdrop Intrusion in Industrial Wireless Sensor Networks.Arul Selvan M. - 2016 - International Journal of Innovative Research in Computer Science and Engineering (Ijircse) 2 (1):8-13.
    —Industrial networks are increasingly based on open protocols and platforms that are also employed in the IT industry and Internet background. Most of the industries use wireless networks for communicating information and data, due to high cable cost. Since, the wireless networks are insecure, it is essential to secure the critical information and data during transmission. The data that transmitted is intercepted by eavesdropper can be predicted by secrecy capacity. The secrecy capacity is the difference between channel capacity of main (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  5.  88
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. A Hybrid Approach for Intrusion Detection in IoT Using Machine Learning and Signature-Based Methods.Janet Yan - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) techniques with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  90
    An Integrated Framework for IoT Security: Combining Machine Learning and Signature-Based Approaches for Intrusion Detection.Yan Janet - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) techniques with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  27
    Enhancing Cloud Security with AI-Based Intrusion Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):658-664.
    Cloud computing has transformed data management by providing scalable and on-demand services, but its open and shared infrastructure makes it highly vulnerable to sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) struggle with dynamic and large-scale cloud environments due to high false positives, limited adaptability, and computational overhead. To address these challenges, this paper proposes an AI-driven Intrusion Detection System (AI-IDS) that leverages deep learning models, including Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks, to analyze (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. The Role of Network Engineers in Securing Cloud-based Applications and Data Storage.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (7):2894-2901.
    As organizations increasingly adopt cloud computing to enhance scalability, efficiency, and costeffectiveness, securing cloud-based applications and data storage has become a paramount concern. This shift has redefined the role of network engineers, who are now at the forefront of implementing and managing secure cloud infrastructures. This research paper examines the critical responsibilities of network engineers in safeguarding cloud environments, focusing on the challenges, strategies, and tools they employ to mitigate risks and ensure data integrity. The paper identifies key (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  57
    Advancements in AI-Driven Communication Systems: Enhancing Efficiency and Security in Next-Generation Networks (13th edition).Palakurti Naga Ramesh - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (1):28-36.
    The increasing complexity and demands of next-generation networks necessitate the integration of Artificial Intelligence (AI) to enhance their efficiency and security. This article explores advancements in AI-driven communication systems, focusing on optimizing network performance, ensuring robust security measures, and addressing the challenges of scalability and real-time adaptability. By analyzing case studies, emerging technologies, and recent research, this study highlights AI's transformative potential in redefining communication systems for future applications.
    Download  
     
    Export citation  
     
    Bookmark  
  11. Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (...)
    Download  
     
    Export citation  
     
    Bookmark   45 citations  
  12.  89
    SVM Model for Cyber Threat Detection: Known and Innovative Attacks.Prathap Jeyapandi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):201-209.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  18
    A Survey on an Attendance System based on the Principle of Facial Recognition.Bhashkar Anirudh K. Nayak - 2020 - International Journal of Innovative Research in Science, Engineering and Technology 9 (12):11347-11353.
    : In most educational institutions the student’s attendance is taken manually by using an attendance sheet, given by the faculty member in a class. The Current attendance marking methods are monotonous and time consuming. Manually recorded attendance can be easily tampered with. And it is also very difficult to actually verify the status of each student in a classroom environment with distributed branches whether the students are actually responding or not. Hence this paper is proposed to tackle these issues. Authentication (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  11
    CYBERSECURITY STRATEGIES FOR IOT DEVICES IN SMART CITIES.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-6.
    The rapid proliferation of Internet of Things (IoT) devices in smart cities has introduced numerous benefits, enhancing urban efficiency, sustainability, and automation. However, these interconnected systems also pose significant cybersecurity challenges, including data breaches, unauthorized access, and cyberattacks that can compromise critical infrastructure. This paper explores various cybersecurity strategies tailored for IoT environments in smart cities, focusing on encryption techniques, secure authentication mechanisms, network security protocols, and blockchain-based security models. Additionally, it discusses machine learningbased anomaly detection systems to identify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the lack of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Is depressive rumination rational?Timothy Lane & Georg Northoff - 2016 - In Timothy Joseph Lane & Tzu-Wei Hung, Rationality: Constraints and Contexts. London, U.K.: Elsevier Academic Press. pp. 121-145.
    Most mental disorders affect only a small segment of the population. On the reasonable assumption that minds or brains are prone to occasional malfunction, these disorders do not seem to pose distinctive explanatory problems. Depression, however, because it is so prevalent and costly, poses a conundrum that some try to explain by characterizing it as an adaptation—a trait that exists because it performed fitness-enhancing functions in ancestral populations. Heretofore, proposed evolutionary explanations of depression did not focus on thought processes; instead, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
    This paper offers a general theory of privacy, a theory that takes privacy to consist in being free from certain kinds of intrusions. On this understanding, privacy interests are distinct and distinguishable from those in solitude, anonymity, and property, for example, or from the fact that others possess, with neither consent nor permission, personal information about oneself. Privacy intrusions have both epistemic and psychological components, and can range in value from relatively trivial considerations to those of profound consequence for an (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  18. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  19. Network representation and complex systems.Charles Rathkopf - 2018 - Synthese (1).
    In this article, network science is discussed from a methodological perspective, and two central theses are defended. The first is that network science exploits the very properties that make a system complex. Rather than using idealization techniques to strip those properties away, as is standard practice in other areas of science, network science brings them to the fore, and uses them to furnish new forms of explanation. The second thesis is that network representations are particularly helpful (...)
    Download  
     
    Export citation  
     
    Bookmark   35 citations  
  20. Belief reports and pragmatic intrusion: the case of null appositives.Alessandro Capone - 2008 - Journal of Pragmatics 40:2019-2040.
    In this paper, I explore Bach’s idea (Bach, 2000) that null appositives, intended as expanded qua-clauses, can resolve the puzzles of belief reports. These puzzles are crucial in understanding the semantics and pragmatics of belief reports and are presented in a section. I propose that Bach’s strategy is not only a way of dealing with puzzles, but also an ideal way of dealing with belief reports. I argue that even simple unproblematic cases of belief reports are cases of pragmatic (...), involving null appositives, or to use the words of Bach, ‘qua-clauses’. The main difference between my pragmatic approach and the one by Salmon (1986) is that this author uses the notion of conversational implicature, whereas I use the notion of pragmatic intrusion and explicature. From my point of view, statements such as ‘‘John believes that Cicero is clever’’ and ‘‘John believes that Tully is clever’’ have got distinct truth-values. In other words, I claim that belief reports in the default case illuminate the hearer on the mental life of the believer, that includes specific modes of presentation of the referents talked about. Furthermore, while in the other pragmatic approaches, it is mysterious how a mode of presentation is assumed to be the main filter of the believer’s mental life, here I provide an explanatory account in terms of relevance, cognitive effects, and processing efforts. The most important part of the paper is devoted to showing that null appositives are required, in the case of belief reports, to explain certain anaphoric effects, which would otherwise be mysterious. My examples show that null appositives are not necessitated at logical form, but only at the level of the explicature, in line with the standard assumptions by Carston and Recanati on pragmatic intrusion. I develop a potentially useful analysis of belief reports by exploiting syntactic and semantic considerations on presuppositional clitics in Romance. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  21. Intrusive Uncertainty in Obsessive Compulsive Disorder.Tom Cochrane & Keeley Heaton - 2017 - Mind and Language 32 (2):182-208.
    In this article we examine obsessive compulsive disorder (OCD). We examine and reject two existing models of this disorder: the Dysfunctional Belief Model and the Inference‐Based Approach. Instead, we propose that the main distinctive characteristic of OCD is a hyperactive sub‐personal signal of being in error, experienced by the individual as uncertainty about his or her intentional actions (including mental actions). This signalling interacts with the anxiety sensitivities of the individual to trigger conscious checking processes, including speculations about possible harms. (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  22. Neural Network-Based Water Quality Prediction.Mohammed Ashraf Al-Madhoun & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (9):25-31.
    Water quality assessment is critical for environmental sustainability and public health. This research employs neural networks to predict water quality, utilizing a dataset of 21 diverse features, including metals, chemicals, and biological indicators. With 8000 samples, our neural network model, consisting of four layers, achieved an impressive 94.22% accuracy with an average error of 0.031. Feature importance analysis revealed arsenic, perchlorate, cadmium, and others as pivotal factors in water quality prediction. This study offers a valuable contribution to enhancing water (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  23. Multi-Layer Intrusion Detection Framework for IoT Systems Using Ensemble Machine Learning.Janet Yan - manuscript
    The proliferation of Internet of Things (IoT) devices has introduced a range of opportunities for enhanced connectivity, automation, and efficiency. However, the vast array of interconnected devices has also raised concerns regarding cybersecurity, particularly due to the limited resources and diverse nature of IoT devices. Intrusion detection systems (IDS) have emerged as critical tools for identifying and mitigating security threats. This paper proposes a Multi-Layer Intrusion Detection Framework for IoT systems, leveraging Ensemble Machine Learning (EML) techniques to improve (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Knowing how and pragmatic intrusion.Alessandro Capone - 2011 - Intercultural Pragmatics 8 (4):543-570.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  25. Hierarchies, Networks, and Causality: The Applied Evolutionary Epistemological Approach.Nathalie Gontier - 2021 - Journal for General Philosophy of Science / Zeitschrift für Allgemeine Wissenschaftstheorie 52 (2):313-334.
    Applied Evolutionary Epistemology is a scientific-philosophical theory that defines evolution as the set of phenomena whereby units evolve at levels of ontological hierarchies by mechanisms and processes. This theory also provides a methodology to study evolution, namely, studying evolution involves identifying the units that evolve, the levels at which they evolve, and the mechanisms and processes whereby they evolve. Identifying units and levels of evolution in turn requires the development of ontological hierarchy theories, and examining mechanisms and processes necessitates theorizing (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  26. Networked Learning and Three Promises of Phenomenology.Lucy Osler - forthcoming - In Phenomenology in Action for Researching Networked Learning Experiences.
    In this chapter, I consider three ‘promises’ of bringing phenomenology into dialogue with networked learning. First, a ‘conceptual promise’, which draws attention to conceptual resources in phenomenology that can inspire and inform how we understand, conceive of, and uncover experiences of participants in networked learning activities and environments. Second, a ‘methodological promise’, which outlines a variety of ways that phenomenological methodologies and concepts can be put to use in empirical research in networked learning. And third, a ‘critical promise’, which suggests (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Bulk Collection, Intrusion and Domination.Tom Sorell - 2018 - In Andrew I. Cohen, Philosophy and Public Policy. New York, USA: Rowman & Littlefield International. pp. 39-61.
    Bulk collection involves the mining of large data sets containing personal data, often for a security purpose. In 2013, Edward Snowden exposed large scale bulk collection on the part of the US National Security Agency as part of a secret counter-terrorism effort. This effort has mainly been criticised for its invasion of privacy. I argue that the right moral argument against it is not so much to do with intrusion, as ineffectiveness for its official purpose and the lack of (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  29. Scientific Networks on Data Landscapes: Question Difficulty, Epistemic Success, and Convergence.Patrick Grim, Daniel J. Singer, Steven Fisher, Aaron Bramson, William J. Berger, Christopher Reade, Carissa Flocken & Adam Sales - 2013 - Episteme 10 (4):441-464.
    A scientific community can be modeled as a collection of epistemic agents attempting to answer questions, in part by communicating about their hypotheses and results. We can treat the pathways of scientific communication as a network. When we do, it becomes clear that the interaction between the structure of the network and the nature of the question under investigation affects epistemic desiderata, including accuracy and speed to community consensus. Here we build on previous work, both our own and (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  30. Natural Compatibilism, Indeterminism, and Intrusive Metaphysics.Thomas Nadelhoffer, David Rose, Wesley Buckwalter & Shaun Nichols - 2020 - Cognitive Science 44 (8):e12873.
    The claim that common sense regards free will and moral responsibility as compatible with determinism has played a central role in both analytic and experimental philosophy. In this paper, we show that evidence in favor of this “natural compatibilism” is undermined by the role that indeterministic metaphysical views play in how people construe deterministic scenarios. To demonstrate this, we re-examine two classic studies that have been used to support natural compatibilism. We find that although people give apparently compatibilist responses, this (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  31. Artificial Neural Network for Forecasting Car Mileage per Gallon in the City.Mohsen Afana, Jomana Ahmed, Bayan Harb, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2018 - International Journal of Advanced Science and Technology 124:51-59.
    In this paper an Artificial Neural Network (ANN) model was used to help cars dealers recognize the many characteristics of cars, including manufacturers, their location and classification of cars according to several categories including: Make, Model, Type, Origin, DriveTrain, MSRP, Invoice, EngineSize, Cylinders, Horsepower, MPG_Highway, Weight, Wheelbase, Length. ANN was used in prediction of the number of miles per gallon when the car is driven in the city(MPG_City). The results showed that ANN model was able to predict MPG_City with (...)
    Download  
     
    Export citation  
     
    Bookmark   46 citations  
  32. Artificial Neural Network for Global Smoking Trend.Aya Mazen Alarayshi & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (9):55-61.
    Accurate assessment and comprehension of smoking behavior are pivotal for elucidating associated health risks and formulating effective public health strategies. In this study, we introduce an innovative approach to predict and analyze smoking prevalence using an artificial neural network (ANN) model. Leveraging a comprehensive dataset spanning multiple years and geographic regions, our model incorporates various features, including demographic data, economic indicators, and tobacco control policies. This research investigates smoking trends with a specific focus on gender-based analyses. These findings are (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  33. Neural Network-Based Audit Risk Prediction: A Comprehensive Study.Saif al-Din Yusuf Al-Hayik & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):43-51.
    Abstract: This research focuses on utilizing Artificial Neural Networks (ANNs) to predict Audit Risk accurately, a critical aspect of ensuring financial system integrity and preventing fraud. Our dataset, gathered from Kaggle, comprises 18 diverse features, including financial and historical parameters, offering a comprehensive view of audit-related factors. These features encompass 'Sector_score,' 'PARA_A,' 'SCORE_A,' 'PARA_B,' 'SCORE_B,' 'TOTAL,' 'numbers,' 'marks,' 'Money_Value,' 'District,' 'Loss,' 'Loss_SCORE,' 'History,' 'History_score,' 'score,' and 'Risk,' with a total of 774 samples. Our proposed neural network architecture, consisting of (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  34. Fuzzy Networks for Modeling Shared Semantic Knowledge.Farshad Badie & Luis M. Augusto - 2023 - Journal of Artificial General Intelligence 14 (1):1-14.
    Shared conceptualization, in the sense we take it here, is as recent a notion as the Semantic Web, but its relevance for a large variety of fields requires efficient methods of extraction and representation for both quantitative and qualitative data. This notion is particularly relevant for the investigation into, and construction of, semantic structures such as knowledge bases and taxonomies, but given the required large, often inaccurate, corpora available for search we can get only approximations. We see fuzzy description logic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. The Role of Social Network Structure in the Emergence of Linguistic Structure.Limor Raviv, Antje Meyer & Shiri Lev-Ari - 2020 - Cognitive Science 44 (8):e12876.
    Social network structure has been argued to shape the structure of languages, as well as affect the spread of innovations and the formation of conventions in the community. Specifically, theoretical and computational models of language change predict that sparsely connected communities develop more systematic languages, while tightly knit communities can maintain high levels of linguistic complexity and variability. However, the role of social network structure in the cultural evolution of languages has never been tested experimentally. Here, we present (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  36. Machine Learning-Based Intrusion Detection Framework for Detecting Security Attacks in Internet of Things.Jones Serena - manuscript
    The proliferation of the Internet of Things (IoT) has transformed various industries by enabling smart environments and improving operational efficiencies. However, this expansion has introduced numerous security vulnerabilities, making IoT systems prime targets for cyberattacks. This paper proposes a machine learning-based intrusion detection framework tailored to the unique characteristics of IoT environments. The framework leverages feature engineering, advanced machine learning algorithms, and real-time anomaly detection to identify and mitigate security threats effectively. Experimental results demonstrate the efficacy of the proposed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Nature as a Network of Morphological Infocomputational Processes for Cognitive Agents.Gordana Dodig Crnkovic - 2017 - Eur. Phys. J. Special Topics 226 (2):181-195.
    This paper presents a view of nature as a network of infocomputational agents organized in a dynamical hierarchy of levels. It provides a framework for unification of currently disparate understandings of natural, formal, technical, behavioral and social phenomena based on information as a structure, differences in one system that cause the differences in another system, and computation as its dynamics, i.e. physical process of morphological change in the informational structure. We address some of the frequent misunderstandings regarding the natural/morphological (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  38. Networks of Gene Regulation, Neural Development and the Evolution of General Capabilities, Such as Human Empathy.Alfred Gierer - 1998 - Zeitschrift Für Naturforschung C - A Journal of Bioscience 53:716-722.
    A network of gene regulation organized in a hierarchical and combinatorial manner is crucially involved in the development of the neural network, and has to be considered one of the main substrates of genetic change in its evolution. Though qualitative features may emerge by way of the accumulation of rather unspecific quantitative changes, it is reasonable to assume that at least in some cases specific combinations of regulatory parts of the genome initiated new directions of evolution, leading to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  39. Learning Networks and Connective Knowledge.Stephen Downes - 2010 - In Harrison Hao Yang & Steve Chi-Yin Yuen, Collective Intelligence and E-Learning 2.0: Implications of Web-Based Communities and Networking. IGI Global.
    The purpose of this chapter is to outline some of the thinking behind new e-learning technology, including e-portfolios and personal learning environments. Part of this thinking is centered around the theory of connectivism, which asserts that knowledge - and therefore the learning of knowledge - is distributive, that is, not located in any given place (and therefore not 'transferred' or 'transacted' per se) but rather consists of the network of connections formed from experience and interactions with a knowing community. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  40.  48
    Advanced Network Traffic Analysis Models for Detecting Sophisticated Cyber Espionage Campaigns.V. Jain Jayant - 2025 - International Journal of Advanced Research in Cyber Security 6 (1):6-10.
    Cyber espionage campaigns pose significant challenges to global security, exploiting vulnerabilities in network infrastructures. This research paper explores advanced network traffic analysis models tailored for detecting sophisticated cyber espionage operations. The study focuses on leveraging machine learning algorithms, anomaly detection systems, and hybrid threat detection frameworks to identify subtle yet malicious activities within network traffic. Through a review of research, this paper synthesizes key findings and outlines practical applications, offering a roadmap for enhancing cybersecurity frameworks. Findings highlight (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. (1 other version)Enforcement Rights Against Non‐Culpable Non‐Just Intrusion.Peter Vallentyne - 2011 - Ratio 24 (4):422-442.
    I articulate and defend a principle governing enforcement rights in response to a non‐culpable non‐just rights‐intrusion (e.g., wrongful bodily attack by someone who falsely, but with full epistemic justification, believes that he is acting permissibly). The account requires that the use of force reduce the harm from such intrusions and is sensitive to the extent to which the intruder is agent‐responsible for imposing intrusion‐harm.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  42. Actor Network, Ontic Structural Realism and the Ontological Status of Actants.Corrado Matta - 2014 - Proceedings of the 9th International Conference on Networked Learning 2014.
    In this paper I discuss the ontological status of actants. Actants are argued as being the basic constituting entities of networks in the framework of Actor Network Theory (Latour, 2007). I introduce two problems concerning actants that have been pointed out by Collin (2010). The first problem concerns the explanatory role of actants. According to Collin, actants cannot play the role of explanans of networks and products of the same newtork at the same time, at pain of circularity. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Network ethics: information and business ethics in a networked society.Luciano Floridi - 2009 - Journal of Business Ethics 90 (S4):649 - 659.
    This article brings together two research fields in applied ethics - namely, information ethics and business ethics- which deal with the ethical impact of information and communication technologies but that, so far, have remained largely independent. Its goal is to articulate and defend an informational approach to the conceptual foundation of business ethics, by using ideas and methods developed in information ethics, in view of the convergence of the two fields in an increasingly networked society.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  44. M2M Networking Architecture for Data Transmission and Routing.Soujanya Ambala - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):59-63.
    We propose a percolation based M2M networking architecture and its data transmission method. The proposed network architecture can be server free and router free, which allows us to operate routing efficiently with percolations based on six degrees of separation theory in small world network modeling. The data transmission can be divided into two phases routing and data transmission phase. In the routing phase, probe packets will be transmitted and forwarded in the network thus path selections are performed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Examining the Network Structure among Moral Functioning Components with Network Analysis.Hyemin Han - 2024 - Personality and Individual Differences 217:112435.
    I explored the association between components constituting the basis for moral and optimal human functioning, i.e., moral reasoning, moral identity, empathy, and purpose, via network analysis. I employed factor scores instead of composite scores that most previous studies used for better accuracy in score estimation in this study. Then, I estimated the network structure among collected variables and centrality indicators. For additional information, the structure and indicators were compared between two groups, participants who engaged in civic activities highly (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  46. Using Network Models in Person-Centered Care in Psychiatry: How Perspectivism Could Help To Draw Boundaries.Nina de Boer, Daniel Kostić, Marcos Ross, Leon de Bruin & Gerrit Glas - 2022 - Frontiers in Psychiatry, Section Psychopathology 13 (925187).
    In this paper, we explore the conceptual problems arising when using network analysis in person- centered care (PCC) in psychiatry. Personalized network models are potentially helpful tools for PCC, but we argue that using them in psychiatric practice raises boundary problems, i.e., problems in demarcating what should and should not be included in the model, which may limit their ability to provide clinically-relevant knowledge. Models can have explanatory and representational boundaries, among others. We argue that we can make (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Threshold Phenomena in Epistemic Networks.Patrick Grim - 2006 - In Proceedings, AAAI Fall Symposium on Complex Adaptive Systems and the Threshold Effect. AAAI Press.
    A small consortium of philosophers has begun work on the implications of epistemic networks (Zollman 2008 and forthcoming; Grim 2006, 2007; Weisberg and Muldoon forthcoming), building on theoretical work in economics, computer science, and engineering (Bala and Goyal 1998, Kleinberg 2001; Amaral et. al., 2004) and on some experimental work in social psychology (Mason, Jones, and Goldstone, 2008). This paper outlines core philosophical results and extends those results to the specific question of thresholds. Epistemic maximization of certain types does show (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  48. On Networks and Dialogues.Gabriel Furmuzachi - manuscript
    This essay inquires into the possibility of extending Randall Collins' analysis (as it is presented in The Sociology of Philosophies) of the process of innovation within intellectual networks.
    Download  
     
    Export citation  
     
    Bookmark  
  49. Artificial Neural Network for Predicting Car Performance Using JNN.Awni Ahmed Al-Mobayed, Youssef Mahmoud Al-Madhoun, Mohammed Nasser Al-Shuwaikh & Samy S. Abu-Naser - 2020 - International Journal of Engineering and Information Systems (IJEAIS) 4 (9):139-145.
    In this paper an Artificial Neural Network (ANN) model was used to help cars dealers recognize the many characteristics of cars, including manufacturers, their location and classification of cars according to several categories including: Buying, Maint, Doors, Persons, Lug_boot, Safety, and Overall. ANN was used in forecasting car acceptability. The results showed that ANN model was able to predict the car acceptability with 99.12 %. The factor of Safety has the most influence on car acceptability evaluation. Comparative study method (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  50. Self-Assembling Networks.Jeffrey A. Barrett, Brian Skyrms & Aydin Mohseni - 2019 - British Journal for the Philosophy of Science 70 (1):1-25.
    We consider how an epistemic network might self-assemble from the ritualization of the individual decisions of simple heterogeneous agents. In such evolved social networks, inquirers may be significantly more successful than they could be investigating nature on their own. The evolved network may also dramatically lower the epistemic risk faced by even the most talented inquirers. We consider networks that self-assemble in the context of both perfect and imperfect communication and compare the behaviour of inquirers in each. This (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
1 — 50 / 980