Cybersecurity最新文献

筛选
英文 中文
Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs 基于贝叶斯攻击图的网络最优监控与攻击检测
IF 3.1 4区 计算机科学
Cybersecurity Pub Date : 2023-09-01 DOI: 10.1186/s42400-023-00155-y
Armita Kazeminajafabadi, Mahdi Imani
{"title":"Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs","authors":"Armita Kazeminajafabadi, Mahdi Imani","doi":"10.1186/s42400-023-00155-y","DOIUrl":"https://doi.org/10.1186/s42400-023-00155-y","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":"54 78 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80598470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FMSA: a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems FMSA:一种基于元学习框架的针对智能网络入侵检测系统的快速模型窃取攻击技术
IF 3.1 4区 计算机科学
Cybersecurity Pub Date : 2023-08-04 DOI: 10.1186/s42400-023-00171-y
Kaisheng Fan, Weizhe Zhang, Guangrui Liu, Hui He
{"title":"FMSA: a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems","authors":"Kaisheng Fan, Weizhe Zhang, Guangrui Liu, Hui He","doi":"10.1186/s42400-023-00171-y","DOIUrl":"https://doi.org/10.1186/s42400-023-00171-y","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":"46 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2023-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74371337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MRm-DLDet: a memory-resident malware detection framework based on memory forensics and deep neural network MRm-DLDet:基于内存取证和深度神经网络的内存驻留恶意软件检测框架
IF 3.1 4区 计算机科学
Cybersecurity Pub Date : 2023-08-03 DOI: 10.1186/s42400-023-00157-w
Jiaxi Liu, Yun Feng, Xinyu Liu, Jianjun Zhao, Qixu Liu
{"title":"MRm-DLDet: a memory-resident malware detection framework based on memory forensics and deep neural network","authors":"Jiaxi Liu, Yun Feng, Xinyu Liu, Jianjun Zhao, Qixu Liu","doi":"10.1186/s42400-023-00157-w","DOIUrl":"https://doi.org/10.1186/s42400-023-00157-w","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":"26 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87300801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AppChainer: investigating the chainability among payloads in android applications AppChainer:研究android应用中有效负载之间的链通性
IF 3.1 4区 计算机科学
Cybersecurity Pub Date : 2023-08-02 DOI: 10.1186/s42400-023-00151-2
Xiaobo Xiang, Yue Jiang, Qingli Guo, Xiu Zhang, Xiaorui Gong, Baoxu Liu
{"title":"AppChainer: investigating the chainability among payloads in android applications","authors":"Xiaobo Xiang, Yue Jiang, Qingli Guo, Xiu Zhang, Xiaorui Gong, Baoxu Liu","doi":"10.1186/s42400-023-00151-2","DOIUrl":"https://doi.org/10.1186/s42400-023-00151-2","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":"4 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2023-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88836935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing non-profiled side-channel attacks by time-frequency analysis 利用时频分析增强非侧信道攻击
IF 3.1 4区 计算机科学
Cybersecurity Pub Date : 2023-08-01 DOI: 10.1186/s42400-023-00149-w
Chengbin Jin, Yongbin Zhou
{"title":"Enhancing non-profiled side-channel attacks by time-frequency analysis","authors":"Chengbin Jin, Yongbin Zhou","doi":"10.1186/s42400-023-00149-w","DOIUrl":"https://doi.org/10.1186/s42400-023-00149-w","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":"2013 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86247888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient confidentiality protection solution for pub/sub system 一种高效的pub/sub系统机密保护解决方案
IF 3.1 4区 计算机科学
Cybersecurity Pub Date : 2023-07-04 DOI: 10.1186/s42400-023-00165-w
Jinglei Pei, Yuyang Shi, Qingling Feng, Ruisheng Shi, Lina Lan, Shui Yu, Jinqiao Shi, Zhaofeng Ma
{"title":"An efficient confidentiality protection solution for pub/sub system","authors":"Jinglei Pei, Yuyang Shi, Qingling Feng, Ruisheng Shi, Lina Lan, Shui Yu, Jinqiao Shi, Zhaofeng Ma","doi":"10.1186/s42400-023-00165-w","DOIUrl":"https://doi.org/10.1186/s42400-023-00165-w","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":"15 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76907886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
NBA: defensive distillation for backdoor removal via neural behavior alignment NBA:通过神经行为对齐进行后门清除的防御蒸馏
IF 3.1 4区 计算机科学
Cybersecurity Pub Date : 2023-07-03 DOI: 10.1186/s42400-023-00154-z
Zonghao Ying, Bin Wu
{"title":"NBA: defensive distillation for backdoor removal via neural behavior alignment","authors":"Zonghao Ying, Bin Wu","doi":"10.1186/s42400-023-00154-z","DOIUrl":"https://doi.org/10.1186/s42400-023-00154-z","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":"45 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73031348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Are our clone detectors good enough? An empirical study of code effects by obfuscation 我们的克隆探测器够好吗?混淆对代码效应的实证研究
IF 3.1 4区 计算机科学
Cybersecurity Pub Date : 2023-07-02 DOI: 10.1186/s42400-023-00148-x
Weihao Huang, Guozhu Meng, Chaoyang Lin, Qiucun Yan, Kai Chen, Zhuo Ma
{"title":"Are our clone detectors good enough? An empirical study of code effects by obfuscation","authors":"Weihao Huang, Guozhu Meng, Chaoyang Lin, Qiucun Yan, Kai Chen, Zhuo Ma","doi":"10.1186/s42400-023-00148-x","DOIUrl":"https://doi.org/10.1186/s42400-023-00148-x","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":"100 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2023-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85959972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SkillSim: voice apps similarity detection SkillSim:语音应用相似度检测
IF 3.1 4区 计算机科学
Cybersecurity Pub Date : 2023-07-01 DOI: 10.1186/s42400-023-00150-3
Zhixiu Guo, Ruigang Liang, Guozhu Meng, Kai Chen
{"title":"SkillSim: voice apps similarity detection","authors":"Zhixiu Guo, Ruigang Liang, Guozhu Meng, Kai Chen","doi":"10.1186/s42400-023-00150-3","DOIUrl":"https://doi.org/10.1186/s42400-023-00150-3","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":"22 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81958523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reversible data hiding based on histogram and prediction error for sharing secret data 基于直方图和预测误差的机密数据共享可逆隐藏
IF 3.1 4区 计算机科学
Cybersecurity Pub Date : 2023-06-02 DOI: 10.1186/s42400-023-00147-y
C. Islamy, T. Ahmad, R. Ijtihadie
{"title":"Reversible data hiding based on histogram and prediction error for sharing secret data","authors":"C. Islamy, T. Ahmad, R. Ijtihadie","doi":"10.1186/s42400-023-00147-y","DOIUrl":"https://doi.org/10.1186/s42400-023-00147-y","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":"40 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76475979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信