Data leakage analysis in wireless networks using Super-vised and Unsupervised Testing
Descripción del Articulo
Due to an increasing number of wireless spectrums, the multiple frequencies are tangling resource management process that results hindrance in operation. In addition, the previous data become vulnerable when reports are received for data leakage enigma. In this situation, it is indispensable to secu...
| Autores: | , |
|---|---|
| Formato: | artículo |
| Fecha de Publicación: | 2023 |
| Institución: | Universidad La Salle |
| Repositorio: | Revistas - Universidad La Salle |
| Lenguaje: | inglés |
| OAI Identifier: | oai:ojs.revistas.ulasalle.edu.pe:article/108 |
| Enlace del recurso: | https://revistas.ulasalle.edu.pe/innosoft/article/view/108 https://doi.org/10.48168/innosoft.s12.a108 https://purl.org/42411/s12/a108 https://n2t.net/ark:/42411/s12/a108 |
| Nivel de acceso: | acceso abierto |
| Materia: | Supervised testing unsupervised testing neural network wireless networks Pruebas supervisadas pruebas no supervisadas redes neuronales redes inalámbricas |
| id |
REVUSALLE_2f809c107bbf4fa4049fa798d36fb4f1 |
|---|---|
| oai_identifier_str |
oai:ojs.revistas.ulasalle.edu.pe:article/108 |
| network_acronym_str |
REVUSALLE |
| network_name_str |
Revistas - Universidad La Salle |
| repository_id_str |
|
| spelling |
Data leakage analysis in wireless networks using Super-vised and Unsupervised TestingAnálisis de fugas de datos en redes inalámbricas mediante pruebas supervisadas y no supervisadasAshraf, ShahzadAslam, ZeeshanSupervised testingunsupervised testingneural networkwireless networksPruebas supervisadaspruebas no supervisadasredes neuronalesredes inalámbricasDue to an increasing number of wireless spectrums, the multiple frequencies are tangling resource management process that results hindrance in operation. In addition, the previous data become vulnerable when reports are received for data leakage enigma. In this situation, it is indispensable to secure the data in the dataset and detect the actual amount of data during resource transformation mechanism in wireless networks. A system as been developed to detect the leaked data using supervised and unsupervised testing technique by conducting simulation in Python. The targeted and actual outcome is obtained which deduced through supervised and undersized testing, the outcome remained 96.03%, and 94.53% respectively.Debido al creciente número de espectros inalámbricos, las múltiples frecuencias están enredando el proceso de gestión de recursos, lo que dificulta el funcionamiento. Además, los datos anteriores se vuelven vulnerables cuando se reciben informes de enigma de fuga de datos. En esta situación, es indispensable asegurar los datos en el conjunto de datos y detectar la cantidad real de datos durante el mecanismo de transformación de recursos en redes inalámbricas. Se ha desarrollado un sistema para detectar la fuga de datos utilizando técnicas de prueba supervisadas y no supervisadas mediante simulación en Python. Se obtienen los resultados previstos y reales, que se reducen mediante pruebas supervisadas y no supervisadas, el resultado sigue siendo del 96,03% y 94,53% respectivamente.Universidad La Salle2023-09-30info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionJournal papertextArtículos originalesapplication/pdftext/htmlhttps://revistas.ulasalle.edu.pe/innosoft/article/view/108https://doi.org/10.48168/innosoft.s12.a108https://purl.org/42411/s12/a108https://n2t.net/ark:/42411/s12/a108Innovation and Software; Vol 4 No 2 (2023): September - February; 52-62Innovación y Software; Vol. 4 Núm. 2 (2023): Septiembre - Febrero; 52-622708-09352708-0927https://doi.org/10.48168/innosoft.s12https://purl.org/42411/s12https://n2t.net/ark:/42411/s12reponame:Revistas - Universidad La Salleinstname:Universidad La Salleinstacron:USALLEenghttps://revistas.ulasalle.edu.pe/innosoft/article/view/108/135https://revistas.ulasalle.edu.pe/innosoft/article/view/108/149https://purl.org/42411/s12/a108/g135https://purl.org/42411/s12/a108/g149https://n2t.net/ark:/42411/s12/a108/g135https://n2t.net/ark:/42411/s12/a108/g14920232023Derechos de autor 2023 Innovación y Softwarehttps://creativecommons.org/licenses/by/4.0info:eu-repo/semantics/openAccessoai:ojs.revistas.ulasalle.edu.pe:article/1082025-07-03T08:02:16Z |
| dc.title.none.fl_str_mv |
Data leakage analysis in wireless networks using Super-vised and Unsupervised Testing Análisis de fugas de datos en redes inalámbricas mediante pruebas supervisadas y no supervisadas |
| title |
Data leakage analysis in wireless networks using Super-vised and Unsupervised Testing |
| spellingShingle |
Data leakage analysis in wireless networks using Super-vised and Unsupervised Testing Ashraf, Shahzad Supervised testing unsupervised testing neural network wireless networks Pruebas supervisadas pruebas no supervisadas redes neuronales redes inalámbricas |
| title_short |
Data leakage analysis in wireless networks using Super-vised and Unsupervised Testing |
| title_full |
Data leakage analysis in wireless networks using Super-vised and Unsupervised Testing |
| title_fullStr |
Data leakage analysis in wireless networks using Super-vised and Unsupervised Testing |
| title_full_unstemmed |
Data leakage analysis in wireless networks using Super-vised and Unsupervised Testing |
| title_sort |
Data leakage analysis in wireless networks using Super-vised and Unsupervised Testing |
| dc.creator.none.fl_str_mv |
Ashraf, Shahzad Aslam, Zeeshan |
| author |
Ashraf, Shahzad |
| author_facet |
Ashraf, Shahzad Aslam, Zeeshan |
| author_role |
author |
| author2 |
Aslam, Zeeshan |
| author2_role |
author |
| dc.subject.none.fl_str_mv |
Supervised testing unsupervised testing neural network wireless networks Pruebas supervisadas pruebas no supervisadas redes neuronales redes inalámbricas |
| topic |
Supervised testing unsupervised testing neural network wireless networks Pruebas supervisadas pruebas no supervisadas redes neuronales redes inalámbricas |
| description |
Due to an increasing number of wireless spectrums, the multiple frequencies are tangling resource management process that results hindrance in operation. In addition, the previous data become vulnerable when reports are received for data leakage enigma. In this situation, it is indispensable to secure the data in the dataset and detect the actual amount of data during resource transformation mechanism in wireless networks. A system as been developed to detect the leaked data using supervised and unsupervised testing technique by conducting simulation in Python. The targeted and actual outcome is obtained which deduced through supervised and undersized testing, the outcome remained 96.03%, and 94.53% respectively. |
| publishDate |
2023 |
| dc.date.none.fl_str_mv |
2023-09-30 |
| dc.type.none.fl_str_mv |
info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion Journal paper text Artículos originales |
| format |
article |
| status_str |
publishedVersion |
| dc.identifier.none.fl_str_mv |
https://revistas.ulasalle.edu.pe/innosoft/article/view/108 https://doi.org/10.48168/innosoft.s12.a108 https://purl.org/42411/s12/a108 https://n2t.net/ark:/42411/s12/a108 |
| url |
https://revistas.ulasalle.edu.pe/innosoft/article/view/108 https://doi.org/10.48168/innosoft.s12.a108 https://purl.org/42411/s12/a108 https://n2t.net/ark:/42411/s12/a108 |
| dc.language.none.fl_str_mv |
eng |
| language |
eng |
| dc.relation.none.fl_str_mv |
https://revistas.ulasalle.edu.pe/innosoft/article/view/108/135 https://revistas.ulasalle.edu.pe/innosoft/article/view/108/149 https://purl.org/42411/s12/a108/g135 https://purl.org/42411/s12/a108/g149 https://n2t.net/ark:/42411/s12/a108/g135 https://n2t.net/ark:/42411/s12/a108/g149 |
| dc.rights.none.fl_str_mv |
Derechos de autor 2023 Innovación y Software https://creativecommons.org/licenses/by/4.0 info:eu-repo/semantics/openAccess |
| rights_invalid_str_mv |
Derechos de autor 2023 Innovación y Software https://creativecommons.org/licenses/by/4.0 |
| eu_rights_str_mv |
openAccess |
| dc.format.none.fl_str_mv |
application/pdf text/html |
| dc.coverage.none.fl_str_mv |
2023 2023 |
| dc.publisher.none.fl_str_mv |
Universidad La Salle |
| publisher.none.fl_str_mv |
Universidad La Salle |
| dc.source.none.fl_str_mv |
Innovation and Software; Vol 4 No 2 (2023): September - February; 52-62 Innovación y Software; Vol. 4 Núm. 2 (2023): Septiembre - Febrero; 52-62 2708-0935 2708-0927 https://doi.org/10.48168/innosoft.s12 https://purl.org/42411/s12 https://n2t.net/ark:/42411/s12 reponame:Revistas - Universidad La Salle instname:Universidad La Salle instacron:USALLE |
| instname_str |
Universidad La Salle |
| instacron_str |
USALLE |
| institution |
USALLE |
| reponame_str |
Revistas - Universidad La Salle |
| collection |
Revistas - Universidad La Salle |
| repository.name.fl_str_mv |
|
| repository.mail.fl_str_mv |
|
| _version_ |
1852236791338237952 |
| score |
13.058852 |
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).