Mastering data privacy: leveraging K-anonymity for robust health data sharingSpringer Science and Business Media LLC - - 2024
Stylianos Karagiannis, Christoforos Ntantogian, Emmanouil Magkos, Aggeliki Tsohou, Luís Landeiro Ribeiro
In modern healthcare systems, data sources are highly integrated, and the privacy challenges are becoming a paramount concern. Despite the critical importance of privacy preservation in safeguarding sensitive and private information across various domains, there is a notable deficiency of learning and training material for privacy preservation. In this research, we present a k-anonymity algorithm ...... hiện toàn bộ
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycleSpringer Science and Business Media LLC - Tập 17 - Trang 135-151 - 2017
Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Youki Kadobayashi
A web user who falsely accesses a compromised website is usually redirected to an adversary’s website and is forced to download malware after being exploited. Additionally, the adversary steals the user’s credentials by using information-leaking malware. The adversary may also try to compromise public websites owned by individual users by impersonating the website administrator using the stolen cr...... hiện toàn bộ
CADS-ML/DL: efficient cloud-based multi-attack detection systemSpringer Science and Business Media LLC - - 2023
Saida Farhat, Manel Abdelkader, Amel Meddeb-Makhlouf, Faouzi Zarai
With the increasing adoption of cloud computing, securing cloud-based systems and applications has become a critical concern for almost every organization. Traditional security approaches such as signature-based and rule-based have limited detection capabilities toward new and sophisticated attacks. To address this issue, there has been an increasing focus on implementing Artificial Intelligence (...... hiện toàn bộ
Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologiesSpringer Science and Business Media LLC -
W. M. A. B. Wijesundara, Joong-Sun Lee, Dara Tith, Eleni Aloupogianni, Hiroki Suzuki, Takashi Obi
AbstractWith the increase of IoT devices generating large amounts of user-sensitive data, improper firmware harms users’ security and privacy. Latest home appliances are integrated with features to assure compatibility with smart home IoT. However, applying complex security mechanisms to IoT is limited by device hardware capabilities, making them vulnerable to atta...... hiện toàn bộ
A method for identifying Web applicationsSpringer Science and Business Media LLC - Tập 8 - Trang 455-467 - 2009
Mario Kozina, Marin Golub, Stjepan Groš
Web applications are ubiquitous in today’s businesses. The security of these applications is of utmost importance since security breaches might negatively impact good reputation, and even result in bankruptcy. There are different methods of assessing security of Web applications, mainly based on some automated method of scanning. One type of scan method feeds random data to the application and mon...... hiện toàn bộ
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malwareSpringer Science and Business Media LLC - - Trang 1-27 - 2023
Silviu Viţel, Marilena Lupaşcu, Dragoş Teodor Gavriluţ, Henri Luchian
This paper analyzes the efficiency of various machine learning models (artificial neural networks, random forest, decision tree, AdaBoost and XGBoost) against the evolution of VBA-based (Visual Basic for Applications) malware over a large period of time (1995–2021). The file set used in our research is comprehensive—approximately 1.9 million files (out of which 944,595 are malicious and the rest a...... hiện toàn bộ
A new strong security model for stateful authenticated group key exchangeSpringer Science and Business Media LLC - Tập 17 - Trang 423-440 - 2017
Zheng Yang, Chao Liu, Wanping Liu, Daigu Zhang, Song Luo
Stateful authenticated group key exchange (stAGKE) represents an important class of authenticated group key exchange (AGKE) such as tree-based AGKE. The computation of either ephemeral public key or session key in a new stAGKE session may be based on the ephemeral secret state from some previously established session. We notice that earlier AGKE models may be not able to provide appropriate securi...... hiện toàn bộ