scholarly journals Mitigation of Malware Effect using Cyber Threat Analysis using Ensemble Deep Belief Networks

Author(s):  
K. Janani ◽  

Cybersecurity is a technique that entails security models development techniques to the illegal access, modification, or destruction of computing resources, networks, program, and data. Due to tremendous developments in information and communication technologies, new dangers to cyber security have arisen and are rapidly changing. The creation of a Deep Learning system requires a substantial number of input samples and it can take a great deal of time and resources to gather and process the samples. Building and maintaining the basic system requires a huge number of resources, including memory, data and computational power. In this paper, we develop an Ensemble Deep Belief Networks to classify the cybersecurity threats in large scale network. An extensive simulation is conducted to test the efficacy of model under different security attacks. The results show that the proposed method achieves higher level of security than the other methods.

MIS Quarterly ◽  
2016 ◽  
Vol 40 (4) ◽  
pp. 849-868 ◽  
Author(s):  
Kunpeng Zhang ◽  
◽  
Siddhartha Bhattacharyya ◽  
Sudha Ram ◽  
◽  
...  

2020 ◽  
pp. 75-117
Author(s):  
A.N. Shvetsov

The article compares the processes of dissemination of modern information and communication technologies in government bodies in Russia and abroad. It is stated that Russia began the transition to «electronic government» later than the developed countries, in which this process was launched within the framework of large-scale and comprehensive programs for reforming public administration in the 1980s and 1990s. However, to date, there is an alignment in the pace and content of digitalization tasks. At a new stage in this process, the concept of «electronic government» under the influence of such newest phenomena of the emerging information society as methods of analysis of «big data», «artificial intelligence», «Internet of things», «blockchain» is being transformed into the category of «digital government». Achievements and prospects of public administration digitalization are considered on the example of countries with the highest ratings — Denmark, Australia, Republic of Korea, Great Britain, USA and Russia.


2014 ◽  
Vol 26 (7) ◽  
pp. 1377-1389 ◽  
Author(s):  
Bo-Cheng Kuo ◽  
Mark G. Stokes ◽  
Alexandra M. Murray ◽  
Anna Christina Nobre

In the current study, we tested whether representations in visual STM (VSTM) can be biased via top–down attentional modulation of visual activity in retinotopically specific locations. We manipulated attention using retrospective cues presented during the retention interval of a VSTM task. Retrospective cues triggered activity in a large-scale network implicated in attentional control and led to retinotopically specific modulation of activity in early visual areas V1–V4. Importantly, shifts of attention during VSTM maintenance were associated with changes in functional connectivity between pFC and retinotopic regions within V4. Our findings provide new insights into top–down control mechanisms that modulate VSTM representations for flexible and goal-directed maintenance of the most relevant memoranda.


Sign in / Sign up

Export Citation Format

Share Document