Cybersecurity最新文献

筛选
英文 中文
PosFuzz: augmenting greybox fuzzing with effective position distribution PosFuzz:增强灰盒模糊与有效的位置分布
IF 3.1 4区 计算机科学
Cybersecurity Pub Date : 2023-06-01 DOI: 10.1186/s42400-023-00143-2
Yanyan Zou, Wei Zou, JiaCheng Zhao, Nanyu Zhong, Yu Zhang, Ji Shi, Wei Huo
{"title":"PosFuzz: augmenting greybox fuzzing with effective position distribution","authors":"Yanyan Zou, Wei Zou, JiaCheng Zhao, Nanyu Zhong, Yu Zhang, Ji Shi, Wei Huo","doi":"10.1186/s42400-023-00143-2","DOIUrl":"https://doi.org/10.1186/s42400-023-00143-2","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90763300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Confidential computing and related technologies: a critical review 机密计算及相关技术:综述
IF 3.1 4区 计算机科学
Cybersecurity Pub Date : 2023-05-02 DOI: 10.1186/s42400-023-00144-1
Muhammad Usama Sardar, C. Fetzer
{"title":"Confidential computing and related technologies: a critical review","authors":"Muhammad Usama Sardar, C. Fetzer","doi":"10.1186/s42400-023-00144-1","DOIUrl":"https://doi.org/10.1186/s42400-023-00144-1","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77814766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DLP: towards active defense against backdoor attacks with decoupled learning process DLP:通过解耦学习过程主动防御后门攻击
IF 3.1 4区 计算机科学
Cybersecurity Pub Date : 2023-05-01 DOI: 10.1186/s42400-023-00141-4
Zonghao Ying, Bin Wu
{"title":"DLP: towards active defense against backdoor attacks with decoupled learning process","authors":"Zonghao Ying, Bin Wu","doi":"10.1186/s42400-023-00141-4","DOIUrl":"https://doi.org/10.1186/s42400-023-00141-4","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80667033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards the universal defense for query-based audio adversarial attacks on speech recognition system 基于查询的语音识别系统对抗性攻击通用防御研究
IF 3.1 4区 计算机科学
Cybersecurity Pub Date : 2023-04-20 DOI: 10.1186/s42400-023-00177-6
Feng Guo, Zhengyi Sun, Yuxuan Chen, Lei Ju
{"title":"Towards the universal defense for query-based audio adversarial attacks on speech recognition system","authors":"Feng Guo, Zhengyi Sun, Yuxuan Chen, Lei Ju","doi":"10.1186/s42400-023-00177-6","DOIUrl":"https://doi.org/10.1186/s42400-023-00177-6","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82705079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time sensitive networking security: issues of precision time protocol and its implementation 时间敏感网络安全:精确时间协议及其实现问题
IF 3.1 4区 计算机科学
Cybersecurity Pub Date : 2023-04-11 DOI: 10.1186/s42400-023-00140-5
D. Berardi, N. Tippenhauer, A. Melis, M. Prandini, F. Callegati
{"title":"Time sensitive networking security: issues of precision time protocol and its implementation","authors":"D. Berardi, N. Tippenhauer, A. Melis, M. Prandini, F. Callegati","doi":"10.1186/s42400-023-00140-5","DOIUrl":"https://doi.org/10.1186/s42400-023-00140-5","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88819466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Jeu de mots paronomasia: a StackOverflow-driven bug discovery approach Jeu de mots paronomasia:一个stackoverflow驱动的bug发现方法
IF 3.1 4区 计算机科学
Cybersecurity Pub Date : 2023-04-03 DOI: 10.1186/s42400-023-00153-0
Yi Yang, Ying Li, Kai Chen, Jinghua Liu
{"title":"Jeu de mots paronomasia: a StackOverflow-driven bug discovery approach","authors":"Yi Yang, Ying Li, Kai Chen, Jinghua Liu","doi":"10.1186/s42400-023-00153-0","DOIUrl":"https://doi.org/10.1186/s42400-023-00153-0","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81210027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android malware category detection using a novel feature vector-based machine learning model 基于特征向量的机器学习模型的Android恶意软件类别检测
IF 3.1 4区 计算机科学
Cybersecurity Pub Date : 2023-03-09 DOI: 10.1186/s42400-023-00139-y
Hashida Haidros Rahima Manzil, S. Manohar Naik
{"title":"Android malware category detection using a novel feature vector-based machine learning model","authors":"Hashida Haidros Rahima Manzil, S. Manohar Naik","doi":"10.1186/s42400-023-00139-y","DOIUrl":"https://doi.org/10.1186/s42400-023-00139-y","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75378001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An ensemble deep learning based IDS for IoT using Lambda architecture 使用Lambda架构的基于集成深度学习的物联网IDS
IF 3.1 4区 计算机科学
Cybersecurity Pub Date : 2023-03-02 DOI: 10.1186/s42400-022-00133-w
Rubayyi Alghamdi, M. Bellaiche
{"title":"An ensemble deep learning based IDS for IoT using Lambda architecture","authors":"Rubayyi Alghamdi, M. Bellaiche","doi":"10.1186/s42400-022-00133-w","DOIUrl":"https://doi.org/10.1186/s42400-022-00133-w","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91307737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cancelable biometric schemes for Euclidean metric and Cosine metric 欧几里得度规和余弦度规的可消去生物识别方案
IF 3.1 4区 计算机科学
Cybersecurity Pub Date : 2023-02-02 DOI: 10.1186/s42400-023-00137-0
Yubing Jiang, P. Shen, Li Zeng, Xiaojie Zhu, Di Jiang, Chi Chen
{"title":"Cancelable biometric schemes for Euclidean metric and Cosine metric","authors":"Yubing Jiang, P. Shen, Li Zeng, Xiaojie Zhu, Di Jiang, Chi Chen","doi":"10.1186/s42400-023-00137-0","DOIUrl":"https://doi.org/10.1186/s42400-023-00137-0","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76473471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RBFK cipher: a randomized butterfly architecture-based lightweight block cipher for IoT devices in the edge computing environment RBFK密码:一种基于随机蝴蝶架构的轻量级分组密码,适用于边缘计算环境中的物联网设备
IF 3.1 4区 计算机科学
Cybersecurity Pub Date : 2023-02-01 DOI: 10.1186/s42400-022-00136-7
Sohel Rana, M. Mondal, J. Kamruzzaman
{"title":"RBFK cipher: a randomized butterfly architecture-based lightweight block cipher for IoT devices in the edge computing environment","authors":"Sohel Rana, M. Mondal, J. Kamruzzaman","doi":"10.1186/s42400-022-00136-7","DOIUrl":"https://doi.org/10.1186/s42400-022-00136-7","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79167122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信