Secure information authentication protocol between patients and medical staff in a hospital environmentSpringer Science and Business Media LLC - Tập 13 - Trang 271-278 - 2017
Yoon-Su Jeong
Recently, it has become possible for the hospital environment to provide medical services to patients anywhere by integrating IT technology in medical devices. However, medical services in the current environment face a problem in that identifiable patient information cannot be safely transferred to the medical staff when the patient is receiving medical services. In this paper, we propose a manda...... hiện toàn bộ
Post-quantum security of messengers: secure group chats and continuous key distribution protocolsSpringer Science and Business Media LLC - Tập 19 - Trang 373-380 - 2022
Julia Bobrysheva, Sergey Zapechnikov
Secure group chats in messengers are usually created in two ways: using pairwise channels with continuous key agreement according to the Double Ratchet scheme or using special cryptographic protocols, for example, based on a tree-like scheme for group keys generating. In the first case, each pair of users generates a common key, and the group is formed by the system tools. In the second case, all ...... hiện toàn bộ
A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and managementSpringer Science and Business Media LLC - Tập 10 - Trang 29-51 - 2013
Julian L. Rrushi, Ali A. Ghorbani
The contribution of this paper is two-fold. Firstly, we propose a botnet detection approach that is sufficiently timely to enable a containment of the botnet outbreak in a supervised network. Secondly, we show that mathematical models of botnet propagation dynamics are a viable means of achieving that level of defense from bot infections in a supervised network. Our approach is built on the idea o...... hiện toàn bộ
Efficient botnet herding within the Tor networkSpringer Science and Business Media LLC - Tập 11 - Trang 19-26 - 2014
Lachlan Kang
During 2013 the Tor network had a massive spike in new users as a botnet started using Tor hidden services to hide its C&C (Command and Control) servers. This resulted in network congestion and reduced performance for all users. Tor hidden services are attractive to botnet herders because they provide anonymity for both the C&C servers and the bots. The aim of this paper is to present a superior w...... hiện toàn bộ
Faulty use of the CIC-IDS 2017 dataset in information security researchSpringer Science and Business Media LLC - - Trang 1-9 - 2023
Rohit Dube
The summarized traffic flow version of the Canadian Institute for Cybersecurity Intrusion Detection Evaluation dataset created at the University of New Brunswick in 2017 is popular in the information security data science research community. Typically, researchers use the summarized data to develop supervised machine learning models and test the classification performance of these models. In this ...... hiện toàn bộ
Trừu tượng hóa các hành vi liên quan đến an ninh tối thiểu phục vụ phân tích phần mềm độc hại Dịch bởi AI Springer Science and Business Media LLC - Tập 9 - Trang 193-204 - 2013
Ying Cao, Qiguang Miao, Jiachen Liu, Lin Gao
Phân tích và phát hiện phần mềm độc hại dựa trên hành vi động được coi là một trong những phương pháp triển vọng nhất để chống lại các phần mềm độc hại ẩn danh và chưa biết. Để thực hiện phân tích như vậy, việc trừu tượng hóa các đặc điểm hành vi đóng vai trò cơ bản, vì cách thức xác định chương trình một cách chính thức sẽ xác định lớn đến thuật toán nào có thể được sử dụng. Trong nghiên cứu hiện...... hiện toàn bộ
#phần mềm độc hại #phân tích hành vi #trừu tượng hóa #lệnh gọi API #thuật toán học thống kê
Picker Blinder: a framework for automatic injection of malicious inter-app communicationSpringer Science and Business Media LLC - - Trang 1-16 - 2024
Rosangela Casolare, Stefano Fagnano, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Malware writers, with the aim to elude the current detection mechanism implemented by commercial and free anti-malware, are finding new ways to develop new aggressive attack paradigms. Current anti-malware basically suffer about the following limitations: the first one is that they are not able to detect zero-day malware: as a matter of fact, to mark an application as malware they need to know the...... hiện toàn bộ
Systematization of knowledge: privacy methods and zero knowledge proofs in corporate blockchainsSpringer Science and Business Media LLC - - Trang 1-6 - 2023
Anatoly Konkin, Sergey Zapechnikov
Nowadays enterprises implement blockchain technology in various industries, including finance, logistics, and other sectors. While the core idea behind blockchain is to decentralize storage, enterprises need to address privacy issues of replicated data. One of the methods to solve privacy in the blockchain is to adjust zero-knowledge-proof protocols. We comprehensively review blockchain privacy te...... hiện toàn bộ
The security of databases: the Access caseSpringer Science and Business Media LLC - Tập 9 - Trang 95-107 - 2013
Baptiste David, Dorian Larget, Thibaut Scherrer
Nowadays, more and more companies have to use databases in which they store their essential or confidential data for the society like client lists, product specifications, stock situations, etc.. Such pieces of data are the heart of a company and have to be protected. In fact, in the context of economic intelligence, getting such information is quite interesting for competitors who want to know ho...... hiện toàn bộ