Cybersecurity

Công bố khoa học tiêu biểu

* Dữ liệu chỉ mang tính chất tham khảo

Sắp xếp:  
Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique
Cybersecurity - - 2022
Raisa Abedin Disha, Sajjad Waheed
AbstractTo protect the network, resources, and sensitive data, the intrusion detection system (IDS) has become a fundamental component of organizations that prevents cybercriminal activities. Several approaches have been introduced and implemented to thwart malicious activities so far. Due to the effectiveness of machine learning (ML) methods, the proposed approach...... hiện toàn bộ
A buffer overflow detection and defense method based on RISC-V instruction set extension
Cybersecurity - Tập 6 - Trang 1-16 - 2023
Chang Liu, Yan-Jun Wu, Jing-Zheng Wu, Chen Zhao
Buffer overflow poses a serious threat to the memory security of modern operating systems. It overwrites the contents of other memory areas by breaking through the buffer capacity limit, destroys the system execution environment, and provides implementation space for various system attacks such as program control flow hijacking. That makes it a wide range of harms. A variety of security technologi...... hiện toàn bộ
On building machine learning pipelines for Android malware detection: a procedural survey of practices, challenges and opportunities
Cybersecurity - Tập 5 - Trang 1-37 - 2022
Masoud Mehrabi Koushki, Ibrahim AbuAlhaol, Anandharaju Durai Raju, Yang Zhou, Ronnie Salvador Giagone, Huang Shengqiang
As the smartphone market leader, Android has been a prominent target for malware attacks. The number of malicious applications (apps) identified for it has increased continually over the past decade, creating an immense challenge for all parties involved. For market holders and researchers, in particular, the large number of samples has made manual malware detection unfeasible, leading to an influ...... hiện toàn bộ
Indexing structures for the PLS blockchain
Cybersecurity - Tập 4 - Trang 1-19 - 2021
Alex Shafarenko
This paper studies known indexing structures from a new point of view: minimisation of data exchange between an IoT device acting as a blockchain client and the blockchain server running a protocol suite that includes two Guy Fawkes protocols, PLS and SLVP. The PLS blockchain is not a cryptocurrency instrument; it is an immutable ledger offering guaranteed non-repudiation to low-power clients with...... hiện toàn bộ
Một hệ thống lai hiệu quả cho việc phát hiện bất thường trong mạng xã hội Dịch bởi AI
Cybersecurity - Tập 4 Số 1 - 2021
Md. Shafiur Rahman, Sajal Halder, Md. Ashraf Uddin, Uzzal Kumar Acharjee
Tóm tắtPhát hiện bất thường đã trở thành một lĩnh vực nghiên cứu thiết yếu và năng động trong khai thác dữ liệu. Nhiều ứng dụng khác nhau, bao gồm các mạng xã hội, đã áp dụng nhiều phương pháp hiện đại khác nhau để xác định bất thường nhằm đảm bảo an ninh và quyền riêng tư cho người dùng. Mạng xã hội đề cập đến một diễn đàn được sử dụng bởi các nhóm người khác nhau...... hiện toàn bộ
Transparency order versus confusion coefficient: a case study of NIST lightweight cryptography S-Boxes
Cybersecurity - Tập 4 - Trang 1-20 - 2021
Huizhong Li, Guang Yang, Jingdian Ming, Yongbin Zhou, Chengbin Jin
Side-channel resistance is nowadays widely accepted as a crucial factor in deciding the security assurance level of cryptographic implementations. In most cases, non-linear components (e.g. S-Boxes) of cryptographic algorithms will be chosen as primary targets of side-channel attacks (SCAs). In order to measure side-channel resistance of S-Boxes, three theoretical metrics are proposed and they are...... hiện toàn bộ
Correction to: Human-as-a-security-sensor for harvesting threat intelligence
Cybersecurity - Tập 2 - Trang 1-1 - 2019
Manfred Vielberth, Florian Menges, Günther Pernul
In the original publication of this article (Vielberth et al. 2019), the author list was not completed.
An ensemble deep learning based IDS for IoT using Lambda architecture
Cybersecurity - Tập 6 - Trang 1-17 - 2023
Rubayyi Alghamdi, Martine Bellaiche
The Internet of Things (IoT) has revolutionized our world today by providing greater levels of accessibility, connectivity and ease to our everyday lives. It enables massive amounts of data to be traversed across multiple heterogeneous devices that are all interconnected. This phenomenon makes IoT networks vulnerable to various network attacks and intrusions. Building an Intrusion Detection System...... hiện toàn bộ
An efficient permutation approach for SbPN-based symmetric block ciphers
Cybersecurity - Tập 6 - Trang 1-18 - 2023
Mir Nazish, M. Tariq Banday, Insha Syed, Sheena Banday
It is challenging to devise lightweight cryptographic primitives efficient in both hardware and software that can provide an optimum level of security to diverse Internet of Things applications running on low-end constrained devices. Therefore, an efficient hardware design approach that requires some specific hardware resource may not be efficient if implemented in software. Substitution bit Permu...... hiện toàn bộ
An efficient confidentiality protection solution for pub/sub system
Cybersecurity - Tập 6 - Trang 1-12 - 2023
Jinglei Pei, Yuyang Shi, Qingling Feng, Ruisheng Shi, Lina Lan, Shui Yu, Jinqiao Shi, Zhaofeng Ma
Publish/subscribe(pub/sub) systems are widely used in large-scale messaging systems due to their asynchronous and decoupled nature. With the population of pub/sub cloud services, the privacy protection problem of pub/sub systems has started to emerge, and events and subscriptions are exposed when executing event matching on untrustworthy cloud brokers. However, as the number of subscriptions incre...... hiện toàn bộ
Tổng số: 137   
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 10