Cybersecurity

Công bố khoa học tiêu biểu

* Dữ liệu chỉ mang tính chất tham khảo

Sắp xếp:  
Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains
Cybersecurity - Tập 3 - Trang 1-21 - 2020
Petar Radanliev, David De Roure, Kevin Page, Jason R. C. Nurse, Rafael Mantilla Montalvo, Omar Santos, La’Treall Maddox, Pete Burnap
Digital technologies have changed the way supply chain operations are structured. In this article, we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks. A taxonomic/cladistic approach is used for the evaluations of progress in the area of supply chain integration in the Industrial Internet of Things and Industry 4.0, with a sp...... hiện toàn bộ
Bin2vec: learning representations of binary executable programs for security tasks
Cybersecurity - Tập 4 - Trang 1-14 - 2021
Shushan Arakelyan, Sima Arasteh, Christophe Hauser, Erik Kline, Aram Galstyan
Tackling binary program analysis problems has traditionally implied manually defining rules and heuristics, a tedious and time consuming task for human analysts. In order to improve automation and scalability, we propose an alternative direction based on distributed representations of binary programs with applicability to a number of downstream tasks. We introduce Bin2vec, a new approach leveragin...... hiện toàn bộ
Detecting fake reviewers in heterogeneous networks of buyers and sellers: a collaborative training-based spammer group algorithm
Cybersecurity - Tập 6 Số 1
Qi Zhang, Zhenlin Liang, Shujuan Ji, Baocai Xing, Dickson K.W. Chiu
AbstractIt is not uncommon for malicious sellers to collude with fake reviewers (also called spammers) to write fake reviews for multiple products to either demote competitors or promote their products’ reputations, forming a gray industry chain. To detect spammer groups in a heterogeneous network with rich semantic information from both buyers and sellers, researc...... hiện toàn bộ
Towards IP geolocation with intermediate routers based on topology discovery
Cybersecurity - Tập 2 - Trang 1-14 - 2019
Zhihao Wang, Hong Li, Qiang Li, Wei Li, Hongsong Zhu, Limin Sun
IP geolocation determines geographical location by the IP address of Internet hosts. IP geolocation is widely used by target advertising, online fraud detection, cyber-attacks attribution and so on. It has gained much more attentions in these years since more and more physical devices are connected to cyberspace. Most geolocation methods cannot resolve the geolocation accuracy for those devices wi...... hiện toàn bộ
A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
Cybersecurity - Tập 4 - Trang 1-27 - 2021
Ansam Khraisat, Ammar Alazab
The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made IoT a target of malicious activities, opening the door to a possible attack on the end nodes. To this end, Numerous IoT intrusion detection Systems (IDS) have been proposed in the literature t...... hiện toàn bộ
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
Cybersecurity - Tập 3 - Trang 1-19 - 2020
Lili Xu, Mingjie Xu, Feng Li, Wei Huo
The Integer-Overflow-to-Buffer-Overflow (IO2BO) vulnerability has been widely exploited by attackers to cause severe damages to computer systems. Automatically identifying this kind of vulnerability is critical for software security. Despite many works have been done to mitigate integer overflow, existing tools either report large number of false positives or introduce unacceptable time consumptio...... hiện toàn bộ
Practical pairing-Free sensor cooperation scheme for cloud-Assisted wireless body area networks
Cybersecurity - Tập 3 - Trang 1-9 - 2020
Yuanzhao Song, Haowen Tan
Nowadays, the design and construction of efficient internet of things (IoTs) has become a new strategies for improving living quality of all aspects. Emerging as one of the most significant extension of medical IoTs, wireless body area networks (WBANs) is capable of monitoring crucial physiological and behavioral information through wearable sensors, offering a new paradigm for the next-generation...... hiện toàn bộ
Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities
Cybersecurity - Tập 6 - Trang 1-15 - 2023
Peng Liu, Wenzhe Ye, Haiying Duan, Xianxian Li, Shuyi Zhang, Chuanjian Yao, Yongnan Li
Vulnerability reports are essential for improving software security since they record key information on vulnerabilities. In a report, CWE denotes the weakness of the vulnerability and thus helps quickly understand the cause of the vulnerability. Therefore, CWE assignment is useful for categorizing newly discovered vulnerabilities. In this paper, we propose an automatic CWE assignment method with ...... hiện toàn bộ
Time sensitive networking security: issues of precision time protocol and its implementation
Cybersecurity - Tập 6 - Trang 1-13 - 2023
Davide Berardi, Nils O. Tippenhauer, Andrea Melis, Marco Prandini, Franco Callegati
Time Sensitive Networking (TSN) will be an integral component of industrial networking. Time synchronization in TSN is provided by the IEEE-1588, Precision Time Protocol (PTP) protocol. The standard, dating back to 2008, marginally addresses security aspects, notably not encompassing the frames designed for management purposes (Type Length Values or TLVs). In this work we show that the TLVs can be...... hiện toàn bộ
Identifying high-risk over-entitlement in access control policies using fuzzy logic
Cybersecurity - Tập 5 Số 1 - Trang 1-17 - 2022
Parkinson, Simon, Khana, Saad
Analysing access control policies is an essential process for ensuring over-prescribed permissions are identified and removed. This is a time-consuming and knowledge-intensive process, largely because there is a wealth of policy information that needs to be manually examined. Furthermore, there is no standard definition of what constitutes an over-entitled permission within an organisation’s acces...... hiện toàn bộ
Tổng số: 137   
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 10