Baidu
map
筛选条件 共查询到252条结果
排序方式
BD-D1Sec: Protocol of security authentication for BeiDou D1 civil navigation message based on certificateless signature

期刊: COMPUTERS & SECURITY, 2021; 105 ()

The BeiDou navigation satellite system (BDS) lacks a security authentication mechanism for BeiDou civil navigation message (BD-CNAV), which faces the ......

A priority based path searching method for improving hybrid fuzzing

期刊: COMPUTERS & SECURITY, 2021; 105 ()

Hybrid fuzzing which combines classical fuzzing with concolic execution to produce effective test suites is an advanced software vulnerability detecti......

Network anomaly detection in a controlled environment based on an enhanced PSOGSARFC

期刊: COMPUTERS & SECURITY, 2021; 104 ()

Network anomalies detection is a complementary technology for systems that detect security threats in networks based on package signatures. Controlled......

A tripartite game model of trust cooperation in cloud service

期刊: COMPUTERS & SECURITY, 2021; 106 ()

Cloud computing is a very popular information technology, to obtain mutual trust and win-win cooperation between the users and the cloud service provi......

A fast network intrusion detection system using adaptive synthetic oversampling and LightGBM

期刊: COMPUTERS & SECURITY, 2021; 106 ()

Network intrusion detection systems play an important role in protecting the network from attacks. However, Existing network intrusion data is imbalan......

Phishing websites detection via CNN and multi-head self-attention on imbalanced datasets

期刊: COMPUTERS & SECURITY, 2021; 108 ()

Phishing websites belong to a social engineering attack where perpetrators fake legitimate websites to lure people to access so as to illegally acquir......

A novel few-shot malware classification approach for unknown family recognition with multi-prototype modeling

期刊: COMPUTERS & SECURITY, 2021; 106 ()

New malware variants appear rapidly and continuously increase the difficulty to classify malware into correct families. This brings two challenges for......

A novel framework for image-based malware detection with a deep neural network

期刊: COMPUTERS & SECURITY, 2021; 109 ()

The rapid growth in the number of malware and its variants has seriously affected the secu-rity of the Internet. In recent years, deep leaming combine......

An improved ShapeShifter method of generating adversarial examples for physical attacks on stop signs against Faster R-CNNs

期刊: COMPUTERS & SECURITY, 2021; 104 ()

Vehicles have increasingly deployed object detectors to perceive running conditions, and deep learning networks have been widely adopted by those dete......

Riemannian manifold on stream data: Fourier transform and entropy-based DDoS attacks detection method

期刊: COMPUTERS & SECURITY, 2021; 109 ()

The means to achieve DDoS (distributed denial of service) attacks are becoming increasingly automated and diverse. A problem that automated attack too......

FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique

期刊: COMPUTERS & SECURITY, 2021; 104 ()

Deep neural networks (DNNs) have various applications owing to their feature learning ability. However, recent studies have shown that DNNs are vulner......

Network-based multidimensional moving target defense against false data injection attack in power system

期刊: COMPUTERS & SECURITY, 2021; 107 ()

Attackers against power grids need to usually collect sufficient information regarding cyberphysical about the target system (CPS) resources from acce......

DNS covert channel detection method using the LSTM model

期刊: COMPUTERS & SECURITY, 2021; 104 ()

DNS is a kind of basic network protocol that is rarely blocked by firewalls; therefore, it is used to build covert channels. Malicious DNS covert chan......

Detecting multi-stage attacks using sequence-to-sequence model

期刊: COMPUTERS & SECURITY, 2021; 105 ()

Multi-stage attack is a kind of sophisticated intrusion strategy that has been widely used for penetrating the well protected network infrastructures.......

A Differentially private hybrid decomposition algorithm based on quad-tree

期刊: COMPUTERS & SECURITY, 2021; 109 ()

Nowadays, spatial data provides users with more convenient services because of its wide application scenarios and rich content. At the same time, the ......

共252条页码: 1/17页15条/页
Baidu
map
Baidu
map
Baidu
map