Angles最新文献

筛选
英文 中文
Reversing Kia Motors Head Unit to discover and exploit software vulnerabilities 逆转起亚汽车总公司发现和利用软件漏洞
Angles Pub Date : 2022-05-25 DOI: 10.1007/s11416-022-00430-5
Gianpiero Costantino, I. Matteucci
{"title":"Reversing Kia Motors Head Unit to discover and exploit software vulnerabilities","authors":"Gianpiero Costantino, I. Matteucci","doi":"10.1007/s11416-022-00430-5","DOIUrl":"https://doi.org/10.1007/s11416-022-00430-5","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"33 - 49"},"PeriodicalIF":0.0,"publicationDate":"2022-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42449122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Malicious encrypted traffic features extraction model based on unsupervised feature adaptive learning 基于无监督特征自适应学习的恶意加密交通特征提取模型
Angles Pub Date : 2022-05-22 DOI: 10.1007/s11416-022-00429-y
Zhihong Zhou, Hu Bin, Jianhua Li, Ying Yin, Xiuzhen Chen, Jin Ma, Lihong Yao
{"title":"Malicious encrypted traffic features extraction model based on unsupervised feature adaptive learning","authors":"Zhihong Zhou, Hu Bin, Jianhua Li, Ying Yin, Xiuzhen Chen, Jin Ma, Lihong Yao","doi":"10.1007/s11416-022-00429-y","DOIUrl":"https://doi.org/10.1007/s11416-022-00429-y","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"453-463"},"PeriodicalIF":0.0,"publicationDate":"2022-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47258325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Covert channel limitation via special dummy traffic generating 通过特殊虚拟流量生成隐蔽信道限制
Angles Pub Date : 2022-05-16 DOI: 10.1007/s11416-022-00428-z
A. Epishkina, Nikolay Karapetyants, K. Kogos, Philipp V. Lebedev
{"title":"Covert channel limitation via special dummy traffic generating","authors":"A. Epishkina, Nikolay Karapetyants, K. Kogos, Philipp V. Lebedev","doi":"10.1007/s11416-022-00428-z","DOIUrl":"https://doi.org/10.1007/s11416-022-00428-z","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"341 - 349"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41746975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Facing emerging challenges in connected vehicles: a formally proven, legislation compliant, and post-quantum ready security protocol 网联汽车面临的新挑战:经过正式验证、符合法律法规的后量子安全协议
Angles Pub Date : 2022-05-05 DOI: 10.1007/s11416-022-00426-1
Rémi Adelin, C. Nugier, E. Alata, V. Nicomette, Vincent Migliore, M. Kaâniche
{"title":"Facing emerging challenges in connected vehicles: a formally proven, legislation compliant, and post-quantum ready security protocol","authors":"Rémi Adelin, C. Nugier, E. Alata, V. Nicomette, Vincent Migliore, M. Kaâniche","doi":"10.1007/s11416-022-00426-1","DOIUrl":"https://doi.org/10.1007/s11416-022-00426-1","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"425-452"},"PeriodicalIF":0.0,"publicationDate":"2022-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44164716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An effective ransomware detection approach in a cloud environment using volatile memory features 一种使用易失性内存功能的云环境中有效的勒索软件检测方法
Angles Pub Date : 2022-04-25 DOI: 10.1007/s11416-022-00425-2
Prachi, Sumit Kumar
{"title":"An effective ransomware detection approach in a cloud environment using volatile memory features","authors":"Prachi, Sumit Kumar","doi":"10.1007/s11416-022-00425-2","DOIUrl":"https://doi.org/10.1007/s11416-022-00425-2","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"407 - 424"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49251513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Malware classification with Word2Vec, HMM2Vec, BERT, and ELMo Word2Verc、HMM2Vec、BERT和ELMo的恶意软件分类
Angles Pub Date : 2022-04-22 DOI: 10.1007/s11416-022-00424-3
Aparna Sunil Kale, Vinay Pandya, Fabio Di Troia, M. Stamp
{"title":"Malware classification with Word2Vec, HMM2Vec, BERT, and ELMo","authors":"Aparna Sunil Kale, Vinay Pandya, Fabio Di Troia, M. Stamp","doi":"10.1007/s11416-022-00424-3","DOIUrl":"https://doi.org/10.1007/s11416-022-00424-3","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"1 - 16"},"PeriodicalIF":0.0,"publicationDate":"2022-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47103633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A hierarchical layer of atomic behavior for malicious behaviors prediction 用于恶意行为预测的原子行为的分层层
Angles Pub Date : 2022-04-07 DOI: 10.1007/s11416-022-00422-5
M. Alaeiyan, S. Parsa
{"title":"A hierarchical layer of atomic behavior for malicious behaviors prediction","authors":"M. Alaeiyan, S. Parsa","doi":"10.1007/s11416-022-00422-5","DOIUrl":"https://doi.org/10.1007/s11416-022-00422-5","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"367 - 382"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49200511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of suspicious internet traffic based on differential analysis and logical rules 基于差分分析和逻辑规则的可疑网络流量检测
Angles Pub Date : 2022-04-04 DOI: 10.1007/s11416-022-00421-6
Mohammed Ali Elsiddig, Mohammed Mejri
{"title":"Detection of suspicious internet traffic based on differential analysis and logical rules","authors":"Mohammed Ali Elsiddig, Mohammed Mejri","doi":"10.1007/s11416-022-00421-6","DOIUrl":"https://doi.org/10.1007/s11416-022-00421-6","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"347 - 365"},"PeriodicalIF":0.0,"publicationDate":"2022-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42216600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MinerAlert: an hybrid approach for web mining detection MinerAlert:一种用于web挖掘检测的混合方法
Angles Pub Date : 2022-03-12 DOI: 10.1007/s11416-022-00420-7
F. Tommasi, C. Catalano, Umberto Corvaglia, I. Taurino
{"title":"MinerAlert: an hybrid approach for web mining detection","authors":"F. Tommasi, C. Catalano, Umberto Corvaglia, I. Taurino","doi":"10.1007/s11416-022-00420-7","DOIUrl":"https://doi.org/10.1007/s11416-022-00420-7","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 5","pages":"333 - 346"},"PeriodicalIF":0.0,"publicationDate":"2022-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41268247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Partially identified Babassu cipher and attack on it 部分识别的Babassu密码及其攻击
Angles Pub Date : 2022-03-01 DOI: 10.1007/s11416-022-00418-1
A. Babash, E. Baranova
{"title":"Partially identified Babassu cipher and attack on it","authors":"A. Babash, E. Baranova","doi":"10.1007/s11416-022-00418-1","DOIUrl":"https://doi.org/10.1007/s11416-022-00418-1","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"271 - 274"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45347871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信