India has experienced significant Land-Use and Land-Cover Change (LULCC) over the past few decades. In this context, careful observation and mapping of LULCC using satellite data of high to medium spatial resolution is crucial for understanding the long-term usage patterns of natural resources and facilitating sustainable management to plan, monitor and evaluate development. The present study utilizes the satellite images to generate national level LULC maps at decadal intervals for 1985, 1995 and 2005 using onscreen visual interpretation techniques with minimum mapping unit of 2.5 hectares. These maps follow the classification scheme of the International Geosphere Biosphere Programme (IGBP) to ensure compatibility with other global/regional LULC datasets for Remote Sens. 2015, 7 2403 comparison and integration. Our LULC maps with more than 90% overall accuracy highlight the changes prominent at regional level, i.e., loss of forest cover in central and northeast India, increase of cropland area in Western India, growth of peri-urban area, and relative increase in plantations. We also found spatial correlation between the cropping area and precipitation, which in turn confirms the monsoon dependent agriculture system in the country. On comparison with the existing global LULC products (GlobCover and MODIS), it can be concluded that our dataset has captured the maximum cumulative patch diversity frequency indicating the detailed representation that can be attributed to the on-screen visual interpretation technique. Comparisons with global LULC products (GlobCover and MODIS) show that our dataset captures maximum landscape diversity, which is partly attributable to the on-screen visual interpretation techniques. We advocate the utility of this database for national and regional studies on land dynamics and climate change research. The database would be updated to 2015 as a continuing effort of this study.
Reinforcement learning (RL), in conjunction with attack graphs and cyber terrain, are used to develop reward and state associated with determination of optimal paths for exfiltration of data in enterprise networks. This work builds on previous crown jewels (CJ) identification that focused on the target goal of computing optimal paths that adversaries may traverse toward compromising CJs or hosts within their proximity. This work inverts the previous CJ approach based on the assumption that data has been stolen and now must be quietly exfiltrated from the network. RL is utilized to support the development of a reward function based on the identification of those paths where adversaries desire reduced detection. Results demonstrate promising performance for a sizable network environment.
Vehicular Ad-hoc network is new and emerging technology. Researchers are gaining interest in this technology. Due to its open nature it is vulnerable to various attacks. Sybil attack is one of them. Various defense techniques have been given by researchers. In this work we briefly explain those defense techniques, given recently. We categorize these techniques as trusted certificates base, resource testing based and social network based. We give an overview of some defense schemes based on first two categories. We also give a summary of the techniques given in this paper, which is based on some parameters used in those techniques.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.