Zobrazeno 1 - 10
of 33
pro vyhledávání: '"Albert B. Jeng"'
Publikováno v:
Soft Computing. 23:11947-11965
Hackers usually discover and exploit vulnerabilities existing in the entry point before invading a corporate environment. The web server exploration and spams are two popular means used by hackers to gain access to the enterprise computer systems. In
Publikováno v:
2017 IEEE Conference on Application, Information and Network Security (AINS).
Data leakage threats to Android mobile devices by using covert channels are indeed a potentially serious issue. In this paper, we propose a system which is capable of detecting the intent-based covert storage channels as well as estimating their resp
Publikováno v:
DSC
Cyber-criminals use various malware technologies to bypass antivirus software. For example, drive-by downloads happen without a person's knowledge when visiting a website, viewing an email message, or clicking on a deceptive pop-up window. One way to
Publikováno v:
Security and Communication Networks. 8:1092-1107
JavaScript obfuscation is a deliberate act of making a script difficult to understand by concealing its purpose. The prevalent use of obfuscation techniques to hide malicious codes and to preserve copyrights of benign scripts resulted in i missing de
Publikováno v:
IEICE Transactions on Information and Systems. :1408-1415
There are many protocols proposed for protecting Radio Frequency Identification (RFID) system privacy and security. A number of these protocols are designed for protecting long-term security of RFID system using symmetric key or public key cryptosyst
Publikováno v:
ICITCS
In recent years, the privilege escalation attacks can be performed based on collusion attacks. However, a novel privilege escalation attack is Multiple Layer Collusion Attack, which can divide collusion applications into three parts: Spyware, Deputy
Publikováno v:
2015 IEEE Trustcom/BigDataSE/ISPA.
Autor:
Ismail Adel AL-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Cheng-Seen Ho, Kuo-Ping Wu, Shyi-Ming Chen
Publikováno v:
2015 IEEE Trustcom/BigDataSE/ISPA.
Autor:
Te-En Wei, Albert B. Jeng, Hong-Yuan Mark Liao, Hsiao-Rong Tyan, Hahn-Ming Lee, Jiunn-Chin Wang
Publikováno v:
2015 17th International Conference on Advanced Communication Technology (ICACT).
DroidExec is a novel root exploit recognition to reduce the influence of wide variability, which usually affects the Android malware detection rate, because of Android applications's various properties. In Android, a specific malware family (e.g., ro
Publikováno v:
Applied Mathematics and Computation. 170:666-672
This paper proposes a method to use one single private-key for all different DL-based public-key cryptographic systems and also explores a way to introduce certain key-checking mechanism for preventing from various potential security threats includin