Zobrazeno 1 - 10
of 123
pro vyhledávání: '"Guojun Peng"'
Publikováno v:
网络与信息安全学报, Vol 10, Iss 3, Pp 66-80 (2024)
In recent years, a surge has been witnessed in cyber-attacks that leverage malicious Excel 4.0 macros (XLM) within documents. Malicious XLM codes often undergo complex obfuscation, posing a substantial challenge for conventional analysis methods and
Externí odkaz:
https://doaj.org/article/aa5642c89d4e4ad7a86ab0756de27507
Publikováno v:
网络与信息安全学报, Vol 9, Pp 90-101 (2023)
Email plays an important role in people’s daily communications, while also attracts the attention of hackers.Email is frequently used in phishing attacks, with email sender spoofing being a key step.To prevent sender-spoofing attacks, email vendors
Externí odkaz:
https://doaj.org/article/1edd7609ae8348289aaf7b803f350cb0
Publikováno v:
Tongxin xuebao, Vol 43, Pp 58-70 (2022)
Objectives: In the face of the complex and changing network security environment, how to fight against Advanced Persistent Threat (APT) attacks has become an urgent problem for the entire security community. The massive APT attack analysis reports an
Externí odkaz:
https://doaj.org/article/b11d85c454074b8d8a91a8fc2a396126
Publikováno v:
IEEE Access, Vol 8, Pp 199733-199746 (2020)
To avoid the inconvenience of retyping a user's ID and password, most mobile apps now provide the automatic login feature for a better user experience. To this end, auto-login credential is stored locally on the smartphone. However, such sensitive cr
Externí odkaz:
https://doaj.org/article/b30507b399fe4719af056e52003c495b
Autor:
Guojun Peng, Mohammad Solgi, Alan Murray, Zhixiang Fang, Weilong Zhang, Jingxian Liu, Hongchu Yu
Publikováno v:
IEEE Transactions on Intelligent Transportation Systems. 23:5765-5776
Maritime ports face challenges associated with navigation safety, operational efficiency, and management. With the development of the Internet of Things, artificial intelligence simulation technologies, geographical information systems, and cloud com
Publikováno v:
Security and Communication Networks. 2022:1-12
The Android system cannot perform fine-grained permission management for TPLs (third-party libraries) in applications. TPLs can use all permissions of the host application, which poses a threat to users and system security. In order to solve this pro
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. :1-18
Publikováno v:
China Communications. 18:192-209
Cyber-physical systems (CPS) have been widely deployed in critical infrastructures and are vulnerable to various attacks. Data integrity attacks manipulate sensor measurements and cause control systems to fail, which are one of the prominent threats
Publikováno v:
IEEE Internet of Things Journal. 8:2736-2750
Emerging Internet of Things (IoT) systems leverage connected devices to enable intelligent and automated functionalities. Despite the benefits, there exist privacy risks of network traffic, which have been studied by the previous research. However, w
Publikováno v:
IEEE Transactions on Intelligent Transportation Systems. 22:131-141
Maritime collision risk prediction is crucial for the safety management of ocean transportation. Previous studies have primarily focused on near-miss collision risk of ship pairs, yet the risk due to congestion caused by multiple ships is significant