Angles最新文献

筛选
英文 中文
Attacks on the simple substitution cipher with the calculation of their reliability 对简单替代密码进行攻击,并计算其可靠性
Angles Pub Date : 2023-02-04 DOI: 10.1007/s11416-023-00464-3
A. Babash
{"title":"Attacks on the simple substitution cipher with the calculation of their reliability","authors":"A. Babash","doi":"10.1007/s11416-023-00464-3","DOIUrl":"https://doi.org/10.1007/s11416-023-00464-3","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43682667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying bot infection using neural networks on DNS traffic 基于DNS流量的神经网络识别机器人感染
Angles Pub Date : 2023-01-24 DOI: 10.1007/s11416-023-00462-5
Manmeet Singh, Maninder Singh, Sanmeet Kaur
{"title":"Identifying bot infection using neural networks on DNS traffic","authors":"Manmeet Singh, Maninder Singh, Sanmeet Kaur","doi":"10.1007/s11416-023-00462-5","DOIUrl":"https://doi.org/10.1007/s11416-023-00462-5","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"549 - 563"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48803889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Risky model of mobile application presentation 移动应用程序呈现的风险模型
Angles Pub Date : 2023-01-14 DOI: 10.1007/s11416-023-00461-6
D. Izergin, M. Eremeev, S. Magomedov
{"title":"Risky model of mobile application presentation","authors":"D. Izergin, M. Eremeev, S. Magomedov","doi":"10.1007/s11416-023-00461-6","DOIUrl":"https://doi.org/10.1007/s11416-023-00461-6","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"419 - 441"},"PeriodicalIF":0.0,"publicationDate":"2023-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43489639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of learning models for intrusion detection system using feature selection 基于特征选择的入侵检测系统学习模型性能评估
Angles Pub Date : 2023-01-03 DOI: 10.1007/s11416-022-00460-z
B. Kaushik, Reya Sharma, Kulwant Dhama, Akshma Chadha, Surbhi Sharma
{"title":"Performance evaluation of learning models for intrusion detection system using feature selection","authors":"B. Kaushik, Reya Sharma, Kulwant Dhama, Akshma Chadha, Surbhi Sharma","doi":"10.1007/s11416-022-00460-z","DOIUrl":"https://doi.org/10.1007/s11416-022-00460-z","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"1 1","pages":"1-20"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42635826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detecting and bypassing frida dynamic function call tracing: exploitation and mitigation 检测和绕过frida动态函数调用跟踪:利用和缓解
Angles Pub Date : 2022-12-17 DOI: 10.1007/s11416-022-00458-7
Enrique Soriano-Salvador, Gorka Guardiola-Múzquiz
{"title":"Detecting and bypassing frida dynamic function call tracing: exploitation and mitigation","authors":"Enrique Soriano-Salvador, Gorka Guardiola-Múzquiz","doi":"10.1007/s11416-022-00458-7","DOIUrl":"https://doi.org/10.1007/s11416-022-00458-7","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"503 - 513"},"PeriodicalIF":0.0,"publicationDate":"2022-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43141472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forced continuation of malware execution beyond exceptions 除了异常之外,强制继续执行恶意软件
Angles Pub Date : 2022-12-15 DOI: 10.1007/s11416-022-00457-8
Y. Oyama, Hirotaka Kokubo
{"title":"Forced continuation of malware execution beyond exceptions","authors":"Y. Oyama, Hirotaka Kokubo","doi":"10.1007/s11416-022-00457-8","DOIUrl":"https://doi.org/10.1007/s11416-022-00457-8","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"483 - 501"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42419773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An effective intrusion detection approach based on ensemble learning for IIoT edge computing 一种有效的基于集成学习的IIoT边缘计算入侵检测方法
Angles Pub Date : 2022-12-14 DOI: 10.1007/s11416-022-00456-9
Mouaad Mohy-Eddine, Azidine Guezzaz, S. Benkirane, Mourade Azrour
{"title":"An effective intrusion detection approach based on ensemble learning for IIoT edge computing","authors":"Mouaad Mohy-Eddine, Azidine Guezzaz, S. Benkirane, Mourade Azrour","doi":"10.1007/s11416-022-00456-9","DOIUrl":"https://doi.org/10.1007/s11416-022-00456-9","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"469 - 481"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47563980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A practical approach to learning Linux vulnerabilities 学习Linux漏洞的实用方法
Angles Pub Date : 2022-11-02 DOI: 10.1007/s11416-022-00455-w
Nikolay Karapetyants, D. Efanov
{"title":"A practical approach to learning Linux vulnerabilities","authors":"Nikolay Karapetyants, D. Efanov","doi":"10.1007/s11416-022-00455-w","DOIUrl":"https://doi.org/10.1007/s11416-022-00455-w","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"1 1","pages":"1 - 10"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43759528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive review of the security flaws of hashing algorithms 对散列算法的安全缺陷进行了全面的回顾
Angles Pub Date : 2022-10-19 DOI: 10.1007/s11416-022-00447-w
A. Sadeghi-Nasab, V. Rafe
{"title":"A comprehensive review of the security flaws of hashing algorithms","authors":"A. Sadeghi-Nasab, V. Rafe","doi":"10.1007/s11416-022-00447-w","DOIUrl":"https://doi.org/10.1007/s11416-022-00447-w","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"287 - 302"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45343657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving binary diffing speed and accuracy using community detection and locality-sensitive hashing: an empirical study 使用社区检测和位置敏感哈希提高二进制查询的速度和准确性:一项实证研究
Angles Pub Date : 2022-10-18 DOI: 10.1007/s11416-022-00452-z
Chariton Karamitas, A. Kehagias
{"title":"Improving binary diffing speed and accuracy using community detection and locality-sensitive hashing: an empirical study","authors":"Chariton Karamitas, A. Kehagias","doi":"10.1007/s11416-022-00452-z","DOIUrl":"https://doi.org/10.1007/s11416-022-00452-z","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"319 - 337"},"PeriodicalIF":0.0,"publicationDate":"2022-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47099906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信