Zobrazeno 1 - 10
of 51
pro vyhledávání: '"Chaowen CHANG"'
Publikováno v:
PeerJ Computer Science, Vol 10, p e2193 (2024)
The combination of memory forensics and deep learning for malware detection has achieved certain progress, but most existing methods convert process dump to images for classification, which is still based on process byte feature classification. After
Externí odkaz:
https://doaj.org/article/99419a78d8d24a7c9e03249c524f5ce3
Publikováno v:
Mathematical Biosciences and Engineering, Vol 21, Iss 2, Pp 3335-3363 (2024)
In the realm of the Internet of Things (IoT), ensuring the security of communication links and evaluating the safety of nodes within these links remains a significant challenge. The continuous threat of anomalous links, harboring malicious switch nod
Externí odkaz:
https://doaj.org/article/d40a6c16de4d4814ae3df13e305de59c
Publikováno v:
PeerJ Computer Science, Vol 9, p e1747 (2023)
As Internet of Things (IoT) applications continue to proliferate, traditional cloud computing is increasingly unable to meet the low-latency demands of these applications. The IoT fog architecture solves this limitation by introducing fog servers in
Externí odkaz:
https://doaj.org/article/984979ea26bf43bca790f90be79ab412
Publikováno v:
Tongxin xuebao, Vol 43, Pp 88-100 (2022)
Aiming at the problem that the most existing forwarding verification mechanisms in software-defined network (SDN) verified packets hop-by-hop by incorporating new secure communication protocols, which incurred significant computation and communicatio
Externí odkaz:
https://doaj.org/article/fb3b79f4fc5b4d1b9669825d0ce3f8d2
Publikováno v:
网络与信息安全学报, Vol 7, Pp 154-163 (2021)
In order to auto detect the underlying malicious code fragments in complex,heterogeneous and massive evidence data about digital forensic investigation, a framework for malicious code fragment detecting algorithm based on TensorFlow was proposed by
Externí odkaz:
https://doaj.org/article/f250506b0fee4dea947701befe3fbd0c
Publikováno v:
Tongxin xuebao, Vol 42, Pp 70-83 (2021)
Aiming at the problem that the existing forwarding verification mechanisms in software-defined networking (SDN) incur significant communication overhead caused by embedding additional packet fields, a packet forwarding verification mechanism based on
Externí odkaz:
https://doaj.org/article/cce53b9a2a734c01b8a48683a9c2ab52
Publikováno v:
Tongxin xuebao, Vol 42, Pp 117-127 (2021)
To address the extraction of document evidence for doc, pdf, and other common file types in the memory image, the model of fragment file carving based on memory image was proposed.Then, on the basis of the model, the fragment file carving algorithm b
Externí odkaz:
https://doaj.org/article/aaaebdd117f74f33bb06e3a6b4730f46
Publikováno v:
Tongxin xuebao, Vol 42, Pp 131-144 (2021)
Aiming at the lack of effective forwarding verification mechanism for packet in software defined network (SDN), a data packet forwarding verification scheme based on attributed-based signatures identification was proposed.First, the attribute signatu
Externí odkaz:
https://doaj.org/article/30a70dd4335d45ec96fa25cf50f362ad
Publikováno v:
Applied Sciences, Vol 13, Iss 4, p 2478 (2023)
The new DLL injection method and its variants can prevent the injected process from calling the common system API to load the injected DLL module so that the malicious module is invisible to the LDR linked list of the process. Traditional injection d
Externí odkaz:
https://doaj.org/article/221354411708416eb180c8e61b36a394
Publikováno v:
Tongxin xuebao, Vol 40, Pp 1-18 (2019)
Due to the lack of effective data source authentication mechanism and the limited matching fields in software defined networking (SDN),an SDN security control and forwarding method based on identity attribute was proposed.Attribute identification and
Externí odkaz:
https://doaj.org/article/240a9116dc604be585975a4dac416386