Springer Science and Business Media LLC

Công bố khoa học tiêu biểu

* Dữ liệu chỉ mang tính chất tham khảo

Sắp xếp:  
A study on scalable information matching system based on web service information
Springer Science and Business Media LLC - Tập 10 - Trang 81-88 - 2014
Sung-Ho Sim, Su-Jin Baek
As for search methods of web service, services are selected and utilized using a variety of search techniques. However, differentiation methods as to services become even more necessary since service quality is increasingly having a direct impact on the use of web service with the generation of various web services and an increase in the use of services. Currently, they state only with the descrip...... hiện toàn bộ
Recent trends in Mobile Communication Systems
Springer Science and Business Media LLC - Tập 10 - Trang 67-70 - 2014
Sang-Yeob Oh, Supratip Ghose, Hye-Jung Jang, Kyungyong Chung
Recognition of tor malware and onion services
Springer Science and Business Media LLC - - Trang 1-15 - 2023
Jesper Bergman, Oliver B. Popov
The transformation of the contemporary societies through digital technologies has had a profound effect on all human activities including those that are in the realm of illegal, unlawful, and criminal deeds. Moreover, the affordances provided by the anonymity creating techniques such as the Tor protocol which are beneficial for preserving civil liberties, appear to be highly profitable for various...... hiện toàn bộ
Creating valid adversarial examples of malware
Springer Science and Business Media LLC - - 2024
Matouš Kozák, Martin Jureček, Mark Stamp, Fabio Di Troia
Because of its world-class results, machine learning (ML) is becoming increasingly popular as a go-to solution for many tasks. As a result, antivirus developers are incorporating ML models into their toolchains. While these models improve malware detection capabilities, they also carry the disadvantage of being susceptible to adversarial attacks. Although this vulnerability has been demonstrated f...... hiện toàn bộ
Secure information authentication protocol between patients and medical staff in a hospital environment
Springer Science and Business Media LLC - Tập 13 - Trang 271-278 - 2017
Yoon-Su Jeong
Recently, it has become possible for the hospital environment to provide medical services to patients anywhere by integrating IT technology in medical devices. However, medical services in the current environment face a problem in that identifiable patient information cannot be safely transferred to the medical staff when the patient is receiving medical services. In this paper, we propose a manda...... hiện toàn bộ
Post-quantum security of messengers: secure group chats and continuous key distribution protocols
Springer Science and Business Media LLC - Tập 19 - Trang 373-380 - 2022
Julia Bobrysheva, Sergey Zapechnikov
Secure group chats in messengers are usually created in two ways: using pairwise channels with continuous key agreement according to the Double Ratchet scheme or using special cryptographic protocols, for example, based on a tree-like scheme for group keys generating. In the first case, each pair of users generates a common key, and the group is formed by the system tools. In the second case, all ...... hiện toàn bộ
A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and management
Springer Science and Business Media LLC - Tập 10 - Trang 29-51 - 2013
Julian L. Rrushi, Ali A. Ghorbani
The contribution of this paper is two-fold. Firstly, we propose a botnet detection approach that is sufficiently timely to enable a containment of the botnet outbreak in a supervised network. Secondly, we show that mathematical models of botnet propagation dynamics are a viable means of achieving that level of defense from bot infections in a supervised network. Our approach is built on the idea o...... hiện toàn bộ
Efficient botnet herding within the Tor network
Springer Science and Business Media LLC - Tập 11 - Trang 19-26 - 2014
Lachlan Kang
During 2013 the Tor network had a massive spike in new users as a botnet started using Tor hidden services to hide its C&C (Command and Control) servers. This resulted in network congestion and reduced performance for all users. Tor hidden services are attractive to botnet herders because they provide anonymity for both the C&C servers and the bots. The aim of this paper is to present a superior w...... hiện toàn bộ
Knowledge-based System and Security
Springer Science and Business Media LLC - Tập 12 - Trang 121-123 - 2016
Yu-Keum Jeong, Roy C. Park
Markhor: malware detection using fuzzy similarity of system call dependency sequences
Springer Science and Business Media LLC - Tập 18 - Trang 81-90 - 2021
Amir Mohammadzade Lajevardi, Saeed Parsa, Mohammad Javad Amiri
Static malware detection approaches are time-consuming and cannot deal with code obfuscation techniques. Dynamic malware detection approaches, on the other hand, address these two challenges, however, suffer from behavioral ambiguity, such as the system calls obfuscation. In this paper, we introduce Markhor, a dynamic and behavior-based malware detection approach. Markhor uses system call data dep...... hiện toàn bộ
Tổng số: 212   
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 10