threat detection
Recently Published Documents


TOTAL DOCUMENTS

811
(FIVE YEARS 298)

H-INDEX

28
(FIVE YEARS 5)

Author(s):  
Shubham Agarwal ◽  
Arjun Sable ◽  
Devesh Sawant ◽  
Sunil Kahalekar ◽  
Manjesh K. Hanawal
Keyword(s):  

2022 ◽  
Vol 82 ◽  
Author(s):  
R. H. Khattak ◽  
L. Zhensheng ◽  
T. Liwei ◽  
P. Pairah ◽  
Z. Zhirong ◽  
...  

Abstract The Punjab urial (Ovis vignei punjabiensis) is a globally threatened wild sheep species. In Pakistan the species is legally protected and bred in captivity to release into natural habitats to reinforce wild populations. Vigilance and feeding are critical to survival, though the degree to which captive-bred animals exhibit these behaviours post-release has rarely been investigated. We monitored the daily behaviours of five adult urial after release and classifying behaviours from 0600 hrs to 1800 hrs, replicating each one-hour period twice and recording four observations of each animal per hour. At the herd level, vigilance and feeding behaviours were exhibited equally. Males and females invested equal time in feeding, males were more vigilant (p = 0.001) and more aggressive (p = 0.010), and females were more restful (p = 0.019) or engaged in grooming (p = 0.044) or locomotion (p = 0.002). Females spent more time feeding than being vigilant (p = 0.002). Males maintained high levels of vigilance throughout the day. Patterns of resting 1300 hrs to 1500 hrs and feeding in early morning and late afternoon were common for both sexes. Behaviours classified as ‘other’ were exhibited equally between sexes. Our results reveal positive indications of captive-bred urial balancing threat detection and energy acquisition post-release and exhibiting natural behaviours and activity patterns. We encourage assessment of survivorship to evaluate long-term effectiveness of captive breeding and release as a candidate restoration programme.


2022 ◽  
pp. 253-269
Author(s):  
Kassidy Marsh ◽  
Hamed Haddadpajouh

2022 ◽  
Vol 33 (1) ◽  
pp. 619-635
Author(s):  
Mohd Anul Haq ◽  
Mohd Abdul Rahim Khan ◽  
Mohammed Alshehri

Author(s):  
Bohdan Nikolaienko ◽  
Serhii Vasylenko

With the development of information technology, the need to solve the problem of information security has increased, as it has become the most important strategic resource. At the same time, the vulnerability of the modern information society to unreliable information, untimely receipt of information, industrial espionage, computer crime, etc. is increasing. In this case, the speed of threat detection, in the context of obtaining systemic information about attackers and possible techniques and tools for cyberattacks in order to describe them and respond to them quickly is one of the urgent tasks. In particular, there is a challenge in the application of new systems for collecting information about cyberevents, responding to them, storing and exchanging this information, as well as on its basis methods and means of finding attackers using integrated systems or platforms. To solve this type of problem, the promising direction of Threat Intelligence as a new mechanism for acquiring knowledge about cyberattacks is studied. Threat Intelligence in cybersecurity tasks is defined. The analysis of cyberattack indicators and tools for obtaining them is carried out. The standards of description of compromise indicators and platforms of their processing are compared. The technique of Threat Intelligence in tasks of operative detection and blocking of cyberthreats to the state information resources is developed. This technique makes it possible to improve the productivity of cybersecurity analysts and increase the security of resources and information systems.


2021 ◽  
Vol 11 (6) ◽  
pp. 7757-7762
Author(s):  
K. Aldriwish

Internet of Things (IoT) -based systems need to be up to date on cybersecurity threats. The security of IoT networks is challenged by software piracy and malware attacks, and much important information can be stolen and used for cybercrimes. This paper attempts to improve IoT cybersecurity by proposing a combined model based on deep learning to detect malware and software piracy across the IoT network. The malware’s model is based on Deep Convolutional Neural Networks (DCNNs). Apart from this, TensorFlow Deep Neural Networks (TFDNNs) are introduced to detect software piracy threats according to source code plagiarism. The investigation is conducted on the Google Code Jam (GCJ) dataset. The conducted experiments prove that the classification performance achieves high accuracy of about 98%.


Sign in / Sign up

Export Citation Format

Share Document