Data leakage analysis in wireless networks using Super-vised and Unsupervised Testing

Descripción del Articulo

Due to an increasing number of wireless spectrums, the multiple frequencies are tangling resource management process that results hindrance in operation. In addition, the previous data become vulnerable when reports are received for data leakage enigma. In this situation, it is indispensable to secu...

Descripción completa

Detalles Bibliográficos
Autores: Ashraf, Shahzad, Aslam, Zeeshan
Formato: artículo
Fecha de Publicación:2023
Institución:Universidad La Salle
Repositorio:Revistas - Universidad La Salle
Lenguaje:inglés
OAI Identifier:oai:ojs.revistas.ulasalle.edu.pe:article/108
Enlace del recurso:https://revistas.ulasalle.edu.pe/innosoft/article/view/108
https://doi.org/10.48168/innosoft.s12.a108
https://purl.org/42411/s12/a108
https://n2t.net/ark:/42411/s12/a108
Nivel de acceso:acceso abierto
Materia:Supervised testing
unsupervised testing
neural network
wireless networks
Pruebas supervisadas
pruebas no supervisadas
redes neuronales
redes inalámbricas
id REVUSALLE_2f809c107bbf4fa4049fa798d36fb4f1
oai_identifier_str oai:ojs.revistas.ulasalle.edu.pe:article/108
network_acronym_str REVUSALLE
network_name_str Revistas - Universidad La Salle
repository_id_str
spelling Data leakage analysis in wireless networks using Super-vised and Unsupervised TestingAnálisis de fugas de datos en redes inalámbricas mediante pruebas supervisadas y no supervisadasAshraf, ShahzadAslam, ZeeshanSupervised testingunsupervised testingneural networkwireless networksPruebas supervisadaspruebas no supervisadasredes neuronalesredes inalámbricasDue to an increasing number of wireless spectrums, the multiple frequencies are tangling resource management process that results hindrance in operation. In addition, the previous data become vulnerable when reports are received for data leakage enigma. In this situation, it is indispensable to secure the data in the dataset and detect the actual amount of data during resource transformation mechanism in wireless networks. A system as been developed to detect the leaked data using supervised and unsupervised testing technique by conducting simulation in Python. The targeted and actual outcome is obtained which deduced through supervised and undersized testing, the outcome remained 96.03%, and 94.53% respectively.Debido al creciente número de espectros inalámbricos, las múltiples frecuencias están enredando el proceso de gestión de recursos, lo que dificulta el funcionamiento. Además, los datos anteriores se vuelven vulnerables cuando se reciben informes de enigma de fuga de datos. En esta situación, es indispensable asegurar los datos en el conjunto de datos y detectar la cantidad real de datos durante el mecanismo de transformación de recursos en redes inalámbricas. Se ha desarrollado un sistema para detectar la fuga de datos utilizando técnicas de prueba supervisadas y no supervisadas mediante simulación en Python. Se obtienen los resultados previstos y reales, que se reducen mediante pruebas supervisadas y no supervisadas, el resultado sigue siendo del 96,03% y 94,53% respectivamente.Universidad La Salle2023-09-30info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionJournal papertextArtículos originalesapplication/pdftext/htmlhttps://revistas.ulasalle.edu.pe/innosoft/article/view/108https://doi.org/10.48168/innosoft.s12.a108https://purl.org/42411/s12/a108https://n2t.net/ark:/42411/s12/a108Innovation and Software; Vol 4 No 2 (2023): September - February; 52-62Innovación y Software; Vol. 4 Núm. 2 (2023): Septiembre - Febrero; 52-622708-09352708-0927https://doi.org/10.48168/innosoft.s12https://purl.org/42411/s12https://n2t.net/ark:/42411/s12reponame:Revistas - Universidad La Salleinstname:Universidad La Salleinstacron:USALLEenghttps://revistas.ulasalle.edu.pe/innosoft/article/view/108/135https://revistas.ulasalle.edu.pe/innosoft/article/view/108/149https://purl.org/42411/s12/a108/g135https://purl.org/42411/s12/a108/g149https://n2t.net/ark:/42411/s12/a108/g135https://n2t.net/ark:/42411/s12/a108/g14920232023Derechos de autor 2023 Innovación y Softwarehttps://creativecommons.org/licenses/by/4.0info:eu-repo/semantics/openAccessoai:ojs.revistas.ulasalle.edu.pe:article/1082025-07-03T08:02:16Z
dc.title.none.fl_str_mv Data leakage analysis in wireless networks using Super-vised and Unsupervised Testing
Análisis de fugas de datos en redes inalámbricas mediante pruebas supervisadas y no supervisadas
title Data leakage analysis in wireless networks using Super-vised and Unsupervised Testing
spellingShingle Data leakage analysis in wireless networks using Super-vised and Unsupervised Testing
Ashraf, Shahzad
Supervised testing
unsupervised testing
neural network
wireless networks
Pruebas supervisadas
pruebas no supervisadas
redes neuronales
redes inalámbricas
title_short Data leakage analysis in wireless networks using Super-vised and Unsupervised Testing
title_full Data leakage analysis in wireless networks using Super-vised and Unsupervised Testing
title_fullStr Data leakage analysis in wireless networks using Super-vised and Unsupervised Testing
title_full_unstemmed Data leakage analysis in wireless networks using Super-vised and Unsupervised Testing
title_sort Data leakage analysis in wireless networks using Super-vised and Unsupervised Testing
dc.creator.none.fl_str_mv Ashraf, Shahzad
Aslam, Zeeshan
author Ashraf, Shahzad
author_facet Ashraf, Shahzad
Aslam, Zeeshan
author_role author
author2 Aslam, Zeeshan
author2_role author
dc.subject.none.fl_str_mv Supervised testing
unsupervised testing
neural network
wireless networks
Pruebas supervisadas
pruebas no supervisadas
redes neuronales
redes inalámbricas
topic Supervised testing
unsupervised testing
neural network
wireless networks
Pruebas supervisadas
pruebas no supervisadas
redes neuronales
redes inalámbricas
description Due to an increasing number of wireless spectrums, the multiple frequencies are tangling resource management process that results hindrance in operation. In addition, the previous data become vulnerable when reports are received for data leakage enigma. In this situation, it is indispensable to secure the data in the dataset and detect the actual amount of data during resource transformation mechanism in wireless networks. A system as been developed to detect the leaked data using supervised and unsupervised testing technique by conducting simulation in Python. The targeted and actual outcome is obtained which deduced through supervised and undersized testing, the outcome remained 96.03%, and 94.53% respectively.
publishDate 2023
dc.date.none.fl_str_mv 2023-09-30
dc.type.none.fl_str_mv info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Journal paper
text
Artículos originales
format article
status_str publishedVersion
dc.identifier.none.fl_str_mv https://revistas.ulasalle.edu.pe/innosoft/article/view/108
https://doi.org/10.48168/innosoft.s12.a108
https://purl.org/42411/s12/a108
https://n2t.net/ark:/42411/s12/a108
url https://revistas.ulasalle.edu.pe/innosoft/article/view/108
https://doi.org/10.48168/innosoft.s12.a108
https://purl.org/42411/s12/a108
https://n2t.net/ark:/42411/s12/a108
dc.language.none.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv https://revistas.ulasalle.edu.pe/innosoft/article/view/108/135
https://revistas.ulasalle.edu.pe/innosoft/article/view/108/149
https://purl.org/42411/s12/a108/g135
https://purl.org/42411/s12/a108/g149
https://n2t.net/ark:/42411/s12/a108/g135
https://n2t.net/ark:/42411/s12/a108/g149
dc.rights.none.fl_str_mv Derechos de autor 2023 Innovación y Software
https://creativecommons.org/licenses/by/4.0
info:eu-repo/semantics/openAccess
rights_invalid_str_mv Derechos de autor 2023 Innovación y Software
https://creativecommons.org/licenses/by/4.0
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
text/html
dc.coverage.none.fl_str_mv 2023
2023
dc.publisher.none.fl_str_mv Universidad La Salle
publisher.none.fl_str_mv Universidad La Salle
dc.source.none.fl_str_mv Innovation and Software; Vol 4 No 2 (2023): September - February; 52-62
Innovación y Software; Vol. 4 Núm. 2 (2023): Septiembre - Febrero; 52-62
2708-0935
2708-0927
https://doi.org/10.48168/innosoft.s12
https://purl.org/42411/s12
https://n2t.net/ark:/42411/s12
reponame:Revistas - Universidad La Salle
instname:Universidad La Salle
instacron:USALLE
instname_str Universidad La Salle
instacron_str USALLE
institution USALLE
reponame_str Revistas - Universidad La Salle
collection Revistas - Universidad La Salle
repository.name.fl_str_mv
repository.mail.fl_str_mv
_version_ 1852236791338237952
score 13.058852
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).