Zobrazeno 1 - 10
of 49
pro vyhledávání: '"Lifa Wu"'
Publikováno v:
网络与信息安全学报, Vol 9, Pp 130-139 (2023)
In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, wi
Externí odkaz:
https://doaj.org/article/a6c79fec43e24217b053094ff653a6c6
Publikováno v:
网络与信息安全学报, Vol 8, Pp 119-130 (2022)
With the gradual development of traffic encryption and text obfuscation technologies, it is increasingly difficult to prevent complicated and malicious WebShell attack events in production environment using traditional detection methods based on text
Externí odkaz:
https://doaj.org/article/0f02736dc40c4d47aa29680ebdb28eb0
Publikováno v:
Sensors, Vol 22, Iss 24, p 9584 (2022)
In a typical mobile-sensing scenario, multiple autonomous vehicles cooperatively navigate to maximize the spatial–temporal coverage of the environment. However, as each vehicle can only make decentralized navigation decisions based on limited local
Externí odkaz:
https://doaj.org/article/82352f3d7c1540598ba1f5ee55cfe103
Publikováno v:
IEEE Access, Vol 7, Pp 147327-147344 (2019)
The second generation of blockchain represented by smart contracts has been developing vigorously in recent years. However, frequent smart contract vulnerability incidents pose a serious risk to blockchain ecosystem security. Since current symbol exe
Externí odkaz:
https://doaj.org/article/03c1d35a283c447ea501816bf17fdb72
Publikováno v:
IEEE Access, Vol 7, Pp 127495-127510 (2019)
Program tracing solutions (i.e., tracers) can faithfully record runtime information about a program's execution and enable flexible and powerful offline analysis. Therefore, they have become fundamental techniques extensively utilized in software ana
Externí odkaz:
https://doaj.org/article/40451694ea524fcc8524ddec7a533466
Publikováno v:
Tongxin xuebao, Vol 39, Pp 143-152 (2018)
Traditional cloud computing trust models mainly focused on the calculation of the trust of users’ behavior.In the process of classification and evaluation,there were some problems such as ignorance of content security and lack of trust division ver
Externí odkaz:
https://doaj.org/article/573c6fd2b5344bdbb3396fb44b30dd81
Publikováno v:
Dianxin kexue, Vol 33, Pp 119-125 (2017)
With the popularity of big data and cloud computing technology,data of telecom operators collected is increa-singly larger,and much more various.The data faces the risk of broken security management,hacker attacks,and imper-fection of risk assessment
Externí odkaz:
https://doaj.org/article/3429db77bf20478ba8e534db781726a4
Publikováno v:
IEEE Access, Vol 5, Pp 13478-13488 (2017)
Personality is an important psychological construct accounting for individual differences in people. To reliably, validly, and efficiently recognize an individual's personality is a worthwhile goal; however, the traditional ways of personality assess
Externí odkaz:
https://doaj.org/article/4e620fa3a7a44465b3d5d61ba0d406ee
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 13 (2017)
To improve the visual quality and the embedding rate of the existing reversible image watermarking algorithm, an improved reversible image watermarking algorithm based on difference expansion is proposed. First, the watermark information is divided i
Externí odkaz:
https://doaj.org/article/5b6575a7a4f1420fa34dbf2662efd25d
Attackers can use the domain name system (DNS), a crucial service of the network, to carry out harmful activity. The task of detecting malicious domain names has grown in importance in the fight against network crime. The increasing complexity of DNS
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e0c1a7e2ae1d14e97439143955c8a254
https://doi.org/10.21203/rs.3.rs-2103771/v1
https://doi.org/10.21203/rs.3.rs-2103771/v1