Yagya Rimal - Academia.edu (original) (raw)
Related Authors
King Fahd University of Petroleum and Minerals
Uploads
Papers by Yagya Rimal
Wireless Communications and Mobile Computing
In wireless sensor networks (WSNs), radio frequency identification (RFID) plays an important role... more In wireless sensor networks (WSNs), radio frequency identification (RFID) plays an important role due to its data characteristics which are data simplicity, low cost, simple deployment, and less energy consumption. It consists of a series of tags and readers which collect a huge number of redundant data. It increases system overhead and decreases overall network lifetime. Existing solutions like Time-Distance Bloom Filter (TDBF) algorithm are inapplicable to the large-scale environment. Received Signal Strength (RSS) used in this algorithm is highly dependent on quality of tag and application environment. In this paper, we propose an approach for data redundancy minimization for RFID surveillance data which is a modified version of TDBF. The proposed algorithm is formulated by using the observed time and calculated distance of RFID tags. To overcome these problems, we design our approach to relevantly reduce the spatiotemporal data redundancy in the source level by adding the Receiv...
International Journal of Information Technology and Web Engineering
Since 2014, Emotet has been using Man-in-the-Browsers (MITB) attacks to target companies in the f... more Since 2014, Emotet has been using Man-in-the-Browsers (MITB) attacks to target companies in the finance industry and their clients. Its key aim is to steal victims' online money-lending records and vital credentials as they go to their banks' websites. Without analyzing network packet payload computing (PPC), IP address labels, port number traces, or protocol knowledge, we have used Machine Learning (ML) modeling to detect Emotet malware infections and recognize Emotet related congestion flows in this work. To classify emotet associated flows and detect emotet infections, the output outcome values are compared by four separate popular ML algorithms: RF (Random Forest), MLP (Multi-Layer Perceptron), SMO (Sequential Minimal Optimization Technique), and the LRM (Logistic Regression Model). The suggested classifier is then improved by determining the right hyperparameter and attribute set range. Using network packet (computation) identifiers, the Random Forest classifier detects...
Wireless Communications and Mobile Computing
In wireless sensor networks (WSNs), radio frequency identification (RFID) plays an important role... more In wireless sensor networks (WSNs), radio frequency identification (RFID) plays an important role due to its data characteristics which are data simplicity, low cost, simple deployment, and less energy consumption. It consists of a series of tags and readers which collect a huge number of redundant data. It increases system overhead and decreases overall network lifetime. Existing solutions like Time-Distance Bloom Filter (TDBF) algorithm are inapplicable to the large-scale environment. Received Signal Strength (RSS) used in this algorithm is highly dependent on quality of tag and application environment. In this paper, we propose an approach for data redundancy minimization for RFID surveillance data which is a modified version of TDBF. The proposed algorithm is formulated by using the observed time and calculated distance of RFID tags. To overcome these problems, we design our approach to relevantly reduce the spatiotemporal data redundancy in the source level by adding the Receiv...
International Journal of Information Technology and Web Engineering
Since 2014, Emotet has been using Man-in-the-Browsers (MITB) attacks to target companies in the f... more Since 2014, Emotet has been using Man-in-the-Browsers (MITB) attacks to target companies in the finance industry and their clients. Its key aim is to steal victims' online money-lending records and vital credentials as they go to their banks' websites. Without analyzing network packet payload computing (PPC), IP address labels, port number traces, or protocol knowledge, we have used Machine Learning (ML) modeling to detect Emotet malware infections and recognize Emotet related congestion flows in this work. To classify emotet associated flows and detect emotet infections, the output outcome values are compared by four separate popular ML algorithms: RF (Random Forest), MLP (Multi-Layer Perceptron), SMO (Sequential Minimal Optimization Technique), and the LRM (Logistic Regression Model). The suggested classifier is then improved by determining the right hyperparameter and attribute set range. Using network packet (computation) identifiers, the Random Forest classifier detects...