5 research outputs found

    An adaptive approach for internet phishing detection based on log data

    Get PDF
    The Internet has become one of the most important daily socials, financial and other activities. the number of customers who use the Internet to conduct their business and purchases is very large. This results in billions of dollars being transferred every day online. Such a large amount of money attracts the attention of cybercriminals to carry out their illegal activities. ā€œFraudā€ is one of the most dangerous of these methods, especially phishing, where attackers try to steal user credentials using fraudulent emails, fake websites, or both. The proposed system for this paper includes efficient data extraction from the web file through data collection and preprocessing. and web usage mining procedure to extract features that demonstrate user behavior. and feature-extracting URL analysis to detect website phishing addresses. After that, the features from the above two parts are combined to make the number of features sixty-three. Finally, a classification algorithm (Random Forests) is applied to determine if website addresses are phishing or legitimate. Suggested algorithms performance is determined by using a confusion matrix and a number of metrics that shows the robustness of the proposed system

    Tele Alert System Based on ECG Signal Using Virtual Instruments Environment

    Get PDF
    This manuscript addresses the design and implementation of a portable PC-based ECG device. Three electrodes are often employed for ECG recording, with two of them being connected to the patient's chest via the ECG amplifiers' differential inputs. Therefore, every stage of the design takes into account factors like low cost, low power consumption, portability, and simplicity of usage. In this system, the ATMEL Company's ATMEGA 328 low-power microcontroller is investigated for signal processing and delivering digital format to a PC through a serial connection, where it is then displayed utilizing LabVIEWTM SP1 software ( The released version in Feb. 2022). A portable tool that can capture, amplify, filter, and analyze biological signals is this one ECG. The intended device's target beneficiary was the intensive care unit

    Exploring the potential of offline cryptography techniques for securing ECG signals in healthcare

    Get PDF
    In the research, a software for ECG signal based on Chaos encryption based on C#-programmed and Kit of Microsoft Visual Studio Development was implemented. A chaos logic map (ChLMp ) and its initial value are utilized to create Level-1 ECG signal based on Chaos encryption bit streams. A ChLMp, an initial value, a ChLMp bifurcation parameter, and two encryption level parameters are utilized to create level-2 ECG signal based on Chaos encryption bit streams. The level-3 ECG signal based on Chaos encryption software utilizes two parameters for the level of encryption, a permutation mechanism, an initial value, a bifurcation parameter of the level of encryption, and a ChLMp. We assess 16-channel ECG signals with great resolution utilizing encryption software. The level-3 ECG signal based on Chaos encryption program has the slowest and most reliable encryption speed. The encryption effect is superior, according to test findings, and when the right decoding parameter is utilized, the ECG signals may be completely recovered. The high resolution 16-channel ECG signals (HRMCECG) won't be recovered if an invalid input parameter occurred, such as a 0.00001% initial point error, which will result in chaotic encryption bit streams

    Sustainable electronic document security: a comprehensive framework integrating encryption, digital signature and watermarking algorithms

    Get PDF
    Protecting electronic documents, especially those containing sensitive data, is a major challenge in an open web. The data security industry has long struggled to manage the security of e-books, data shows that information security issues can cause significant economic losses after three years Although cryptographic methods have been proposed as a solution in of these challenges Focusing on speed and efficiency The shortcomings of traditional encryption methods have been thoroughly examined Although a number of network management techniques assure retention privacy and integrity though, when it comes to encryption. Digital signature algorithms, although effective in detecting unauthorized changes and limiting the scope for copyright protection, do not ensure the confidentiality of shared electronic documents When addressing research gaps addressing this issue, the paper proposes a security framework for electronic documents that combines three important security mechanisms: encryption, digital signatures, and watermark algorithms Dhishu By matching their strengths, constraints are overcome. The combination of encryption and digital signatures is explored as a promising approach to protecting electronic documents, ensuring authenticity and confidentiality Importantly, the need to explore security mechanisms such as digital is highlighted emphasis on handwriting, encryption, and watermarking systems in depth

    A Smart System for Health Caregiver Based on IoMT: Toward Tele-Health Caregiving

    No full text
    This manuscript introduces the designing and emulation of a wireless, intelligent health surveillance device based on the internet of medical things, with GSM alert technology by health caregivers. In hospitals or medical centers where the body temperature of the patient needs to be constantly checked or other vital signs have to be checked, this is normally achieved by a specialist or another paramedicine personnel by continuously checking the temperature, pulse rate and keeping records of these arguments. This approach is really repetitive and can be very tiring, especially in medical centers crowded with patients. The main system task is to surveillance the patient's body pulse rate and the patient's body temperature and sending the information to the specialists wirelessly via the liquid crystal display. The transmitting unit of this suggested system continuously surveillance the patient's body temperature, as well as the heart rate with digital sensors, and ultimately, displays the outcomes on the liquid crystal display transmitter to present to the specialists. The receiver device is placed in the specialist chamber for continuous wireless surveillanceĀ Ā  of the patient's body temperature and heart rate. At the receiver end where the specialist will be, an alarm is often triggered and triggered When the patient's heart rate or temperature is below/above the normal human threshold of 37 Ā° C and 70 beats/min (bpm), then, send an SMS to the specialist if he or she is absent as a means of continuous update. The suggested framework was implemented utilizing Proteus Tools and programs, composed in Embedded C. The obtained outcomes indicate an effective way to relay details on duty to the specialists for urgent patient care
    corecore