Advances in Engineering Innovation最新文献

筛选
英文 中文
Malware authorship attribution: Unmasking the culprits behind malicious software 恶意软件作者归属:揭露恶意软件背后的罪魁祸首
Advances in Engineering Innovation Pub Date : 2023-10-07 DOI: 10.54254/2977-3903/2/2023021
Harmon Lee Bruce Chia
{"title":"Malware authorship attribution: Unmasking the culprits behind malicious software","authors":"Harmon Lee Bruce Chia","doi":"10.54254/2977-3903/2/2023021","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023021","url":null,"abstract":"With the digital age ushering in an unprecedented proliferation of malware, accurately attributing these malicious software variants to their original authors or affiliated groups has emerged as a crucial endeavor in cybersecurity. This study delves into the intricacies of malware authorship attribution by combining traditional analytical techniques with advanced machine learning methodologies. An integrated approach, encompassing static and dynamic analyses, yielded promising results in the challenging realm of malware attribution. Despite the encouraging outcomes, the research highlighted the multifaceted complexities involved, especially considering the sophisticated obfuscation techniques frequently employed by attackers. This paper emphasizes the merits of a holistic attribution model and underscores the importance of continuous innovation in the face of an ever-evolving threat landscape.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135253767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Database security 数据库安全
Advances in Engineering Innovation Pub Date : 2023-10-07 DOI: 10.54254/2977-3903/2/2023013
Cameron Parisi, Samantha Renicker
{"title":"Database security","authors":"Cameron Parisi, Samantha Renicker","doi":"10.54254/2977-3903/2/2023013","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023013","url":null,"abstract":"In the modern technological tapestry, the security of database systems has burgeoned into a prominent concern for institutional frameworks. This urgency is invigorated by a dual confluence: the shifting industry paradigm which underscores the primacy of expansive data collections, coupled with the proliferation of legislative frameworks that zealously guard the sanctity of individual consumer data. The core aim of this discourse is to furnish a panoramic understanding of indispensable measures to bolster database security, with an amplified emphasis on countering SQL injection threats. The introductory segment delineates essential fortification strategies and succinctly touches upon optimal practices for shaping a database environments network topography and error mitigation methodologies. Subsequent to this panoramic insight, the discourse pivots to spotlight a diverse array of methodologies to discern and neutralize SQL injection forays.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135253773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Harnessing the power of federated learning to advance technology 利用联合学习的力量来推动技术进步
Advances in Engineering Innovation Pub Date : 2023-10-07 DOI: 10.54254/2977-3903/2/2023020
Harmon Lee Bruce Chia
{"title":"Harnessing the power of federated learning to advance technology","authors":"Harmon Lee Bruce Chia","doi":"10.54254/2977-3903/2/2023020","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023020","url":null,"abstract":"Federated Learning (FL) has emerged as a transformative paradigm in machine learning, advocating for decentralized, privacy-preserving model training. This study provides a comprehensive evaluation of contemporary FL frameworks TensorFlow Federated (TFF), PySyft, and FedJAX across three diverse datasets: CIFAR-10, IMDb reviews, and the UCI Heart Disease dataset. Our results demonstrate TFF's superior performance on image classification tasks, while PySyft excels in both efficiency and privacy for textual data. The study underscores the potential of FL in ensuring data privacy and model performance, yet emphasizes areas warranting improvement. As the volume of edge devices escalates and the need for data privacy intensifies, refining and expanding FL frameworks become essential for future machine learning deployments.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135253581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion detection in cybersecurity 网络安全中的入侵检测
Advances in Engineering Innovation Pub Date : 2023-10-07 DOI: 10.54254/2977-3903/2/2023014
Johnny Smithie
{"title":"Intrusion detection in cybersecurity","authors":"Johnny Smithie","doi":"10.54254/2977-3903/2/2023014","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023014","url":null,"abstract":"The ever-increasing complexity of cyber threats mandates advanced defense mechanisms. Intrusion Detection Systems (IDS) have emerged as fundamental tools in cybersecurity, incessantly monitoring networks for any suspicious activities. This paper offers an in-depth examination of IDS, tracing its evolution, methodologies, challenges, and future trajectories, substantiating the assertions with empirical studies and research.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135254946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social engineering 社会工程
Advances in Engineering Innovation Pub Date : 2023-10-07 DOI: 10.54254/2977-3903/2/2023016
Christine Potthas, Patrick Berry, Hamad Al-Naimi
{"title":"Social engineering","authors":"Christine Potthas, Patrick Berry, Hamad Al-Naimi","doi":"10.54254/2977-3903/2/2023016","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023016","url":null,"abstract":"The realm of cybersecurity is replete with challenges, not least among them being the art of social engineering. This form of attack leverages human tendencies such as trust, leading to potential breaches. Though more covert than brute force or technical hacks, social engineering can be insidiously effective. Within this exposition, we probe various manifestations of social engineering: from phishing to pretexting, baiting to tailgating, and the subtle act of shoulder surfing, concluding with mitigation strategies.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135253575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Router forensics: Navigating the digital crossroads 路由器取证:在数字十字路口导航
Advances in Engineering Innovation Pub Date : 2023-10-07 DOI: 10.54254/2977-3903/2/2023018
Maha Nawaf
{"title":"Router forensics: Navigating the digital crossroads","authors":"Maha Nawaf","doi":"10.54254/2977-3903/2/2023018","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023018","url":null,"abstract":"As the digital landscape continues to evolve, routers have become central gatekeepers, governing the flow of information in networks. This study delves deep into the realm of router forensics, focusing on the methodologies and techniques employed to extract and analyze forensic data from these pivotal devices. Drawing upon both traditional and contemporary approaches, our research underscores the significance of router logs, volatile data, and the challenges that arise in their forensic analysis. We highlight the pressing need for standardized forensic protocols, especially in the face of diverse router architectures and rapidly emerging cyber threats. Our study also emphasizes the potential of leveraging advanced technologies, such as machine learning, in enhancing forensic capabilities. By providing a comprehensive overview of the current state of router forensics and shedding light on potential future trajectories, this research aims to fortify the cybersecurity community's arsenal against escalating cyber threats, ensuring a more secure and resilient digital ecosystem.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135254939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SQL injection attacks SQL注入攻击
Advances in Engineering Innovation Pub Date : 2023-10-07 DOI: 10.54254/2977-3903/2/2023017
Jene Wrightes
{"title":"SQL injection attacks","authors":"Jene Wrightes","doi":"10.54254/2977-3903/2/2023017","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023017","url":null,"abstract":"SQL Injection (SQLi) attacks continue to pose significant threats to modern web applications, compromising data integrity and confidentiality. This research delves into the development and evaluation of methodologies designed to detect and mitigate these malicious attacks. Employing a diverse set of web applications, the study unfolds in a controlled environment, simulating real-world conditions to assess the effectiveness of current defense mechanisms against SQLi. Building upon this baseline, the research introduces a two-pronged defense mechanism: a Static Analysis Tool to pre-emptively identify vulnerabilities in application code and a Runtime Query Sanitizer that employs rule-based patterns and machine learning models to scrutinize and sanitize SQL queries in real-time. Performance evaluation metrics, encompassing detection rate, false positives, response time, and machine learning efficiency, are meticulously documented. Further robustness of these mechanisms is ascertained through real-world simulations involving unsuspecting users and ethical hackers. Initial results indicate promising potential for the introduced methodologies in safeguarding web applications against SQLi attacks. The study's findings serve as a critical step towards fortifying web applications, emphasizing the amalgamation of static analysis and real-time query sanitization as an effective countermeasure against SQLi threats.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135253760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud computing- Benefits, challenges, and promises 云计算——好处、挑战和承诺
Advances in Engineering Innovation Pub Date : 2023-10-07 DOI: 10.54254/2977-3903/2/2023019
Harmon Lee Bruce Chia
{"title":"Cloud computing- Benefits, challenges, and promises","authors":"Harmon Lee Bruce Chia","doi":"10.54254/2977-3903/2/2023019","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023019","url":null,"abstract":"The era of cloud computing has ushered in a transformative approach to information technology, redefining the operational modalities for businesses and individuals alike. With an overwhelming shift towards Software-as-a-Service (SaaS) models, the cloud landscape is proving to be both promising and challenging. This study undertook a mixed-methods approach, surveying IT professionals and interviewing organizational leaders, to gauge the current state of cloud adoption. Our findings underscore the dominance of SaaS, with security emerging as a paramount concern. Comparative evaluations of major cloud providers further elucidate the nuances in offerings and pricing strategies. As cloud computing continues its upward trajectory, the onus is on understanding and addressing its multifaceted challenges while leveraging its myriad benefits. This paper concludes by highlighting pivotal areas for future research, encompassing hybrid cloud strategies, the amalgamation of emerging technologies, and cloud's role in Industry 4.0.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135253766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linux security Linux安全
Advances in Engineering Innovation Pub Date : 2023-10-07 DOI: 10.54254/2977-3903/2/2023015
Gustavo Amarchand, Patrick Brown, Thomas Mahoney
{"title":"Linux security","authors":"Gustavo Amarchand, Patrick Brown, Thomas Mahoney","doi":"10.54254/2977-3903/2/2023015","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023015","url":null,"abstract":"Linux is an open source Operating system that is for the most part freely available to the public. Due to its customizability and cost to performance benefits Linux has quickly been adopted by users and companies alike for use in applications such as servers and workstation. As the spread of Linux continues it is important for security specialists to understand the platform and the security issues that affect the platform as well. This paper seeks to first educate the users on what the Linux platforms is and what it offers to the user or company. And it then will expand upon some common or recent vulnerabilities that Linux faces due to the way it functions. After explaining some exploits, the paper will then seek to explain some hardening solutions that are available on the platform.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135254945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study of issues of impact dynamics based on the SPH method 基于SPH方法的碰撞动力学问题研究
Advances in Engineering Innovation Pub Date : 2023-09-20 DOI: 10.54254/2977-3903/1/2023001
Jiawei Guo
{"title":"A study of issues of impact dynamics based on the SPH method","authors":"Jiawei Guo","doi":"10.54254/2977-3903/1/2023001","DOIUrl":"https://doi.org/10.54254/2977-3903/1/2023001","url":null,"abstract":"Based on the SPH method, this paper investigates a number of key issues in shock dynamics, including the nonlinear phenomenon and its influencing factors in the propagation process of shock waves, and the process and mechanism of the interaction between shock waves and the surface of an object. Through the design of the experiments and the analysis of the results, the main conclusions and contributions of this study are drawn. At the same time, deficiencies and directions for further improvement are also pointed out, and prospects and suggestions for future research on impact dynamics are presented. This study is of great significance in promoting the research of impact dynamics.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136379100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信