Zobrazeno 1 - 10
of 186
pro vyhledávání: '"Baojiang Cui"'
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-17 (2024)
Abstract Abnormal traffic detection is a crucial topic in the field of network security. However, existing methods face many challenges when processing complex high-dimensional traffic data. Especially in dealing with redundant features, data sparsit
Externí odkaz:
https://doaj.org/article/531d1ad1be554196b28286d9c9b9a3c8
Autor:
Juntao He, Haoran Dai, Runqi Sui, Xuejing Yuan, Dun Liu, Hao Feng, Xinyue Liu, Wenchuan Yang, Baojiang Cui, Kedan Li
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-20 (2024)
Abstract Text-to-image (TTI) models provide huge innovation ability for many industries, while the content security triggered by them has also attracted wide attention. Considerable research has focused on content security threats of large language m
Externí odkaz:
https://doaj.org/article/e2d0e0c5f3a44886bad68251f57ff09b
Publikováno v:
Applied Sciences, Vol 14, Iss 5, p 1855 (2024)
The algorithmic complexity vulnerability (ACV) that may lead to denial of service attacks greatly disrupts the security and availability of applications, and due to the widespread use of third-party libraries, its impact may be amplified through the
Externí odkaz:
https://doaj.org/article/3656a30b4486482385949d777fa88d6e
Publikováno v:
Sensors, Vol 23, Iss 11, p 5075 (2023)
Satellite–ground integrated networks (SGIN) are in line with 6th generation wireless network technology (6G) requirements. However, security and privacy issues are challenging with heterogeneous networks. Specifically, although 5G authentication an
Externí odkaz:
https://doaj.org/article/59b8db742cfa490ab2ae9e8da95fda68
Publikováno v:
Applied Sciences, Vol 13, Iss 5, p 3244 (2023)
Anomaly detection has been proven to be an efficient way to detect malicious behaviour and cyberattacks in industrial cyber–physical systems (ICPSs). However, most detection models are not entirely adapted to the real world as they require intensiv
Externí odkaz:
https://doaj.org/article/57affa2872024d968ba1d5e6c0de2ffb
Publikováno v:
IEEE Access, Vol 8, Pp 92153-92161 (2020)
In recent years, an increasing number of Internet of Things (IoT) devices have been employed in various fields, which has caused an increased demand for IoT device testing and analysis. However, due to the strictly limited software interfaces and har
Externí odkaz:
https://doaj.org/article/22ca7cdf39bb4d7d89c8cdd5c230dcd4
Publikováno v:
Applied Sciences, Vol 13, Iss 4, p 2482 (2023)
Cross-site scripting (XSS) vulnerabilities are significant threats to web applications. The number of XSS vulnerabilities reported has increased annually for the past three years, posing a considerable challenge to web application maintainers. Black-
Externí odkaz:
https://doaj.org/article/8a33dadfbbe64987a001c309b3c75fb6
Publikováno v:
IEEE Access, Vol 7, Pp 29891-29900 (2019)
With the continuous development of Web attacks, many web applications have been suffering from various forms of security threats and network attacks. The security detection of URLs has always been the focus of Web security. Many web application resou
Externí odkaz:
https://doaj.org/article/60e1a35caa7e4f0b8a624eccb9476fe5
Publikováno v:
网络与信息安全学报, Vol 4, Pp 21-30 (2018)
With the development of Internet technology,malicious programs have risen explosively.In the face of executable files without source,the current mainstream malware detection uses feature detection based on similarity,with lack of analysis of maliciou
Externí odkaz:
https://doaj.org/article/e26206980f4344bd9da458e45732545e
Publikováno v:
Applied Sciences, Vol 11, Iss 3, p 1095 (2021)
Coverage-oriented and target-oriented fuzzing are widely used in vulnerability detection. Compared with coverage-oriented fuzzing, target-oriented fuzzing concentrates more computing resources on suspected vulnerable points to improve the testing eff
Externí odkaz:
https://doaj.org/article/2474db213eb14cd08a4f25c85019fac0