Springer Science and Business Media LLC

Công bố khoa học tiêu biểu

* Dữ liệu chỉ mang tính chất tham khảo

Sắp xếp:  
Implementation of a web-based smart electronic needle system
Springer Science and Business Media LLC - Tập 10 - Trang 101-108 - 2014
Man Ki Kim, You Sik Hong
A great advantage of oriental clinic is its ability to dispense with high-tech medical appliances and identify symptoms of diseases by simply analyzing pulse waves of patients. If the technology of remote controlled electronic needle can be utilized, it can be applied anywhere anytime by a web-based system and the data of pulse and tongue diagnosis can be sent to doctors and patients, for example,...... hiện toàn bộ
Malware clustering using suffix trees
Springer Science and Business Media LLC - - 2016
Ciprian Oprișa, C. F. George, Gheorghe Sebestyen Pal
Efficient and secure DNS cyber shelter on DDoS attacks
Springer Science and Business Media LLC - Tập 11 - Trang 129-136 - 2014
Sunghyuck Hong
DDoS (distributed denial of service) attack is one of the most effective cyber-attack on the Internet. Many researchers focus on DDoS countermeasures. Many countermeasures of DDoS have been developed. However, there is no perfect solution for DDoS because DDoS attacks use normal requests which are hardly detected. DDoS attacks typically exhaust bandwidth, processing capacity, or memory of a target...... hiện toàn bộ
A completely covert audio channel in Android
Springer Science and Business Media LLC - Tập 13 - Trang 141-152 - 2016
Sukanya Thakur, Mark Stamp
Exfiltration of private data from mobile devices is a potential security threat. Previous research concerning such threats has generally focused on techniques that are only valid over short distances (e.g., NFC, Bluetooth, electromagnetic emanations) or fail to be entirely covert. In this research, we develop and analyze an exfiltration attack that has no distance limitation and is completely cove...... hiện toàn bộ
Android botnets for multi-targeted attacks
Springer Science and Business Media LLC - Tập 11 - Trang 193-202 - 2014
Valentin Hamon
Today, mobile Botnets are well known in the IT security field. Whenever we talk about Botnets on mobile phones, we mostly deal with denial of service attacks (Kifayat and Wilson http://www.cms.livjm.ac.uk/pgnet2012/Proceedings/Papers/1569607737.pdf...... hiện toàn bộ
Phân tích thực nghiệm phát hiện phần mềm độc hại trên Android dựa trên sự kết hợp của quyền truy cập và gọi API Dịch bởi AI
Springer Science and Business Media LLC - Tập 15 - Trang 209-218 - 2019
Abhishek Kumar Singh, C. D. Jaidhar, M. A. Ajay Kumara
Các điện thoại thông minh chạy hệ điều hành Android đang ngày càng trở nên phổ biến do tính hiệu quả về chi phí và nhiều ứng dụng khác nhau. Những điện thoại thông minh này cung cấp trải nghiệm đầy đủ của một thiết bị máy tính cho người dùng của mình, và thường được sử dụng như một máy tính cá nhân. Do hệ điều hành Android là phần mềm mã nguồn mở, nhiều nhà phát triển đã đóng góp vào việc phát tri...... hiện toàn bộ
Zero knowledge proof and ZK-SNARK for private blockchains
Springer Science and Business Media LLC - Tập 19 - Trang 443-449 - 2023
Anatoly Konkin, Sergey Zapechnikov
Comprehensive adoption of distributed ledger technology and blockchain in enterprises might disrupt financial and other sectors. At the same time, there are some barriers to rolling out the technology in practice. One of the significant issues concerns information security and privacy in the blockchain. Some methods for private transactions such as mixed networks, ring signatures, and off-chain pr...... hiện toàn bộ
I know your MAC address: targeted tracking of individual using Wi-Fi
Springer Science and Business Media LLC - Tập 10 - Trang 219-227 - 2013
Mathieu Cunche
This work is about wireless communications technologies embedded in portable devices, namely Wi-Fi, Bluetooth and GSM. Focusing on Wi-Fi, we study the privacy issues and potential missuses that can affect the owners of wireless-enabled portable devices. Wi-Fi enable-devices periodically broadcast in plain-text their unique identifier along with other sensitive information. As a consequence, their ...... hiện toàn bộ
A novel approach for ransomware detection based on PE header using graph embedding
Springer Science and Business Media LLC - Tập 18 - Trang 285-296 - 2022
Farnoush Manavi, Ali Hamzeh
The development of cryptocurrency has led to an increase in a type of malware called ransomware. Ransomware is a family of malware that uses malicious techniques to prevent users from accessing their systems or data. Ransomware threatens all industries, from health and hospitals to banks, training centers, and manufacturers of goods. Therefore, early ransomware detection is critical. Most research...... hiện toàn bộ
Role based access control using identity and broadcast based encryption for securing cloud data
Springer Science and Business Media LLC - Tập 18 - Trang 171-182 - 2021
Urvashi Rahul Saxena, Taj Alam
Since integrity of data on cloud cannot be assured, several clients and users hesitate to upload their crucial data to the cloud, which eventually hinders cloud storage development. One of the biggest challenges with respect to cloud security is to ensure data confidentiality and one of the solutions to this issue can be by restricting unauthorized access to user data stored on cloud. In due cours...... hiện toàn bộ
Tổng số: 212   
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 10