International journal of network security & its applications最新文献

筛选
英文 中文
A k-Anonymous Location Privacy Protection Method of Polygon Based on Density Distribution 基于密度分布的多边形k-匿名位置隐私保护方法
International journal of network security & its applications Pub Date : 2021-01-01 DOI: 10.6633/IJNS.202101_23(1).08
Yong-Bing Zhang, Qiu-yu Zhang, Yan Yan, Yiqiang Jiang, Mo-yi Zhang
{"title":"A k-Anonymous Location Privacy Protection Method of Polygon Based on Density Distribution","authors":"Yong-Bing Zhang, Qiu-yu Zhang, Yan Yan, Yiqiang Jiang, Mo-yi Zhang","doi":"10.6633/IJNS.202101_23(1).08","DOIUrl":"https://doi.org/10.6633/IJNS.202101_23(1).08","url":null,"abstract":"In order to solve the problem of out-off-balance caused by accuracy of location information between privacy protection security and query service quality, considering basic information comprehensively such as the environment and geographical features and so on, and adopting k- anonymous privacy protection mechanism, we present a k-anonymous location privacy protection method of polygon based on density distribution. Firstly, a k-anonymous irregular polygon region is structured in whole area. Then, according to the preset anonymous region and density threshold, the better effects of anonymous are obtained by expanding the region or adding the random dummy locations. Experimental results show that the proposed method improves the efficiency of anonymous and query accuracy. The balance between privacy protection security and query quality is achieved.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"42 1","pages":"57-66"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84518428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Locking the door: tackling credential abuse 锁门:解决证书滥用问题
International journal of network security & its applications Pub Date : 2021-01-01 DOI: 10.1016/S1353-4858(21)00030-1
Steve Mansfield-Devine
{"title":"Locking the door: tackling credential abuse","authors":"Steve Mansfield-Devine","doi":"10.1016/S1353-4858(21)00030-1","DOIUrl":"https://doi.org/10.1016/S1353-4858(21)00030-1","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"104 1","pages":"11-19"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74568344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Access Control Scheme Based on Access Tree Structure Pruning for Cloud Computing 基于访问树结构修剪的云计算访问控制方案
International journal of network security & its applications Pub Date : 2021-01-01 DOI: 10.6633/IJNS.202101_23(1).17
Zeyu Wang, Min-Xu Gao, Lu Chen, Shimin Sun
{"title":"An Access Control Scheme Based on Access Tree Structure Pruning for Cloud Computing","authors":"Zeyu Wang, Min-Xu Gao, Lu Chen, Shimin Sun","doi":"10.6633/IJNS.202101_23(1).17","DOIUrl":"https://doi.org/10.6633/IJNS.202101_23(1).17","url":null,"abstract":"In the era of rapid development of information, people are spreading and sharing information all the time. These resources bring us a lot of privacy challenges while bringing us convenience. Therefore, We propose an attribute based encryption access control scheme based on access tree structure pruning (ATSP-ABE). The scheme mainly prune the branch of the ID attribute of the right subtree user managed by the Data Owner (DO) and design the permission access attribute as the leaf node to replace the branch. For the left subtree of the access tree managed by the Attribute Authorization Center (AAC) the decision tree is generated by the data of the user feature attribute and the subtree with the best pruning performance is selected as the pruning result. Finally, pruning the reduced feature attributes in the decision tree in the access left subtree. The experimental results show that the ATSPABE scheme can improve the computational efficiency of attribute-based access control encryption, decryption and user attribute revocation in cloud computing. More than that makes the access tree structure more concise and strengthen the DO control attribute ability. Reducing Calculation overhead in the process of encryption and decryption of DO and AAC.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"27 1","pages":"143-156"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80730383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A threshold-based, real-time analysis in early detection of endpoint anomalies using SIEM expertise 基于阈值的实时分析,利用SIEM专业知识进行端点异常的早期检测
International journal of network security & its applications Pub Date : 2021-01-01 DOI: 10.1016/S1353-4858(21)00039-8
Sivaraman Eswaran, Aruna Srinivasan, Prasad B. Honnavalli
{"title":"A threshold-based, real-time analysis in early detection of endpoint anomalies using SIEM expertise","authors":"Sivaraman Eswaran, Aruna Srinivasan, Prasad B. Honnavalli","doi":"10.1016/S1353-4858(21)00039-8","DOIUrl":"https://doi.org/10.1016/S1353-4858(21)00039-8","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"44 1","pages":"7-16"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89077296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Agile security testing 敏捷安全测试
International journal of network security & its applications Pub Date : 2021-01-01 DOI: 10.1016/S1353-4858(21)00042-8
D. Fox
{"title":"Agile security testing","authors":"D. Fox","doi":"10.1016/S1353-4858(21)00042-8","DOIUrl":"https://doi.org/10.1016/S1353-4858(21)00042-8","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"19 1","pages":"20"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82033084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Differentially Private K-means Clustering Scheme for Smart Grid 一种智能电网差分私有k均值聚类方案
International journal of network security & its applications Pub Date : 2021-01-01 DOI: 10.6633/IJNS.202101_23(1).15
Shuai Guo, Mi Wen, Xiao-Cong Liang
{"title":"A Differentially Private K-means Clustering Scheme for Smart Grid","authors":"Shuai Guo, Mi Wen, Xiao-Cong Liang","doi":"10.6633/IJNS.202101_23(1).15","DOIUrl":"https://doi.org/10.6633/IJNS.202101_23(1).15","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"29 1","pages":"126-134"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85542578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure Blockchain Decentralized Voting for Verified Users 为经过验证的用户提供安全的区块链分散投票
International journal of network security & its applications Pub Date : 2021-01-01 DOI: 10.5121/ijnsa.2021.13502
P. Pospiech, Aleksander Marianski, M. Kedziora
{"title":"Secure Blockchain Decentralized Voting for Verified Users","authors":"P. Pospiech, Aleksander Marianski, M. Kedziora","doi":"10.5121/ijnsa.2021.13502","DOIUrl":"https://doi.org/10.5121/ijnsa.2021.13502","url":null,"abstract":"The paper focuses onintroducing a decentralized e-voting scheme that uses blockchain to achieve security and anonymity. A blockchain network based on Ethereum was applied, to provide a decentralized and distributed database based on the Peer-to-Peer architecture. During the implementation, smart contractswere used. Thanks to this, it is possible to code the terms of the contract required to perform the transaction. The proof-of-conceptimplementation uses the blind signature protocol and encryption with the RSA algorithm. Presented in this paper scheme for blockchain decentralized voting is fully implemented and potential issues are analyzed and discussed.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"46 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87371029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Intrusion Detection Method Based on Hierarchical Self-convergence PCA-OCSVM Algorithm 基于层次自收敛PCA-OCSVM算法的入侵检测方法研究
International journal of network security & its applications Pub Date : 2020-11-01 DOI: 10.6633/IJNS.202011_22(6).04
Yanpeng Cui, Zichuan Jin, Jianwei Hu
{"title":"Research on Intrusion Detection Method Based on Hierarchical Self-convergence PCA-OCSVM Algorithm","authors":"Yanpeng Cui, Zichuan Jin, Jianwei Hu","doi":"10.6633/IJNS.202011_22(6).04","DOIUrl":"https://doi.org/10.6633/IJNS.202011_22(6).04","url":null,"abstract":"At present, traditional intrusion detection methods have some shortcomings, such as long detection time, low detection accuracy and poor classification effect. This paper will combine PCA and OCSVM algorithm to build a multi-level intrusion detection model, using attack feature analysis method to preprocess data, while data cleaning and data feature selection of training set. It highlights the characteristics of abnormal data and normal data, and weakens the influence of irrelevant features on training model. PCA algorithm is used to process data to improve detection rate and reduce noise. Different models are trained by different data features to detect four attack types, namely Probe, DDOS, R2L and U2R. The optimal dimension of PCA is automatically obtained by calculating the contribution rate M of feature, which improves the traditional method that requires frequent input of K value. The model is trained by using OCSVM algorithm based on RBF core, and the disadvantage of poor classification effect of OCSVM algorithm is eliminated through improved multi-layer detection mechanism. Finally, the KDDCUP99 data set is used for experimental verification. The results show that the proposed method has more advantages than the traditional detection method.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"26 1","pages":"916-924"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87466860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Blockchain Technologies in Bidding Systems 区块链技术在招标系统中的应用研究
International journal of network security & its applications Pub Date : 2020-11-01 DOI: 10.6633/IJNS.202011_22(6).01
Yi-Hui Chen, Li-Chin Huang, I. Lin, M. Hwang
{"title":"Research on Blockchain Technologies in Bidding Systems","authors":"Yi-Hui Chen, Li-Chin Huang, I. Lin, M. Hwang","doi":"10.6633/IJNS.202011_22(6).01","DOIUrl":"https://doi.org/10.6633/IJNS.202011_22(6).01","url":null,"abstract":"Due to the popularity of the Internet, people are increasingly accepting the integration of electronic service applications. Whether it is communication, trading, or transportation, these have gradually changed people's lifestyles. Electronic auctions have also become one of the popular e-commerce activities. Electronic auction systems usually include bidders, auctioneers, and third parties that allow bidders to bid via the Internet. It replaces the inconvenience and low efficiency of traditional tendering. Electronic auctions can be divided into two types: open bidding and sealed bidding. The public bidding method is to continuously increase the bidding price until no bidder is willing to pay a higher bid. The deadline has arrived. The highest bidder is the winner of the public tender. Since bidders can bid multiple times, this bidding method is also called multiple bidding. The bidding method for sealed bids is that the bidder can only send the bill once. Once the deadline arrives, the auctioneer will compare all bills. The bidder with the highest bid is the winner of the "sealed bid". Since bidders can only bid once, this bidding method is also called a single bid auction. Both bidding methods have their practicability. But no matter what kind of bidding. It should rely on intermediaries to allow buyers and sellers to conduct transactions. Lead to trust and transaction cost issues. In this regard, we will use blockchain technology to develop smart contracts for public bidding and sealed bidding. It uses the characteristics of blockchain decentralization and low transaction costs to improve the shortcomings of electronic auctions.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"153 1","pages":"897-904"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86209090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reversible Data Hiding with Contrast Enhancement Based on Laplacian Image Sharpening 基于拉普拉斯图像锐化对比度增强的可逆数据隐藏
International journal of network security & its applications Pub Date : 2020-11-01 DOI: 10.6633/IJNS.202011_22(6).10
Chen-Kuei Yang, Zhihong Li, Wenxia Cai, S. Weng, Li Liu, Anhong Wang
{"title":"Reversible Data Hiding with Contrast Enhancement Based on Laplacian Image Sharpening","authors":"Chen-Kuei Yang, Zhihong Li, Wenxia Cai, S. Weng, Li Liu, Anhong Wang","doi":"10.6633/IJNS.202011_22(6).10","DOIUrl":"https://doi.org/10.6633/IJNS.202011_22(6).10","url":null,"abstract":"In 2014, Wu et al. proposed a reversible data hiding method with contrast enhancement (RDH-CE) that emphasized that the visual quality of the image was more important than having a high peak signal-to-noise ratio (PSNR). But this method focused only on global enhancements and ignored the details. There were more obvious distortions of the visual image as the embedding level increased, and embedding capacity was relatively low when the embedding level was small. Therefore, in this paper, we proposed a new RDH method with contrast enhancement based on Laplacian sharpening. First, the details of the edges of images and the clarity of images were emphasized by Laplacian sharpening, and the visual distortions of the images were reduced by sharpening scale factor. Then, the embedding capacity was increased by combining the difference expansion and digital inverse transformation to apply the operator to all of the pixels in the image. The experimental results demonstrate the effectiveness of the proposed scheme.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"38 1","pages":"966-974"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73386537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信