Zobrazeno 1 - 10
of 88
pro vyhledávání: '"Lu-Xing Yang"'
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 9, Pp 102195- (2024)
Cybercrime statistics highlight the severe and growing impact of digital threats on individuals and organizations, with financial losses escalating rapidly. As cybersecurity becomes a central challenge, several modern cyber defense strategies prove i
Externí odkaz:
https://doaj.org/article/82f2ec888be74969b8d5b3a4d64fe4a3
Publikováno v:
IET Blockchain, Vol 3, Iss 4, Pp 222-237 (2023)
Abstract The indiscriminate distribution of a large number of unlicensed images through the Internet seriously harms the benefits of image owners, which prompts the study of image copyright protection solutions. Existing blockchain‐free solutions a
Externí odkaz:
https://doaj.org/article/56058cc3dcc94fbf914f4fd398e5d644
Publikováno v:
Sensors, Vol 24, Iss 5, p 1643 (2024)
False data injection attacks (FDIAs) on sensor networks involve injecting deceptive or malicious data into the sensor readings that cause decision-makers to make incorrect decisions, leading to serious consequences. With the ever-increasing volume of
Externí odkaz:
https://doaj.org/article/c6edaaf89c53499baeda48cee99964f3
Publikováno v:
IEEE Access, Vol 8, Pp 126496-126503 (2020)
After-sale service is an integrable part of marketing activities. The after-sale service experience of a consumer can be measured by the dynamic maintenance (DM) strategy used by the merchant, i.e., the instantaneous fractions of the maintenance cost
Externí odkaz:
https://doaj.org/article/f0fc3e60bc3e43fabbb4c54c708e3358
Publikováno v:
IEEE Access, Vol 8, Pp 42111-42119 (2020)
With the advent of Internet-of-Things (IoT) age, IoT-based distributed denial-of-service (DDoS) attacks have become the mainstream of DDoS attacks. This paper is devoted to exploring the possibility of launching an IoT-based DDoS attack at an extreme
Externí odkaz:
https://doaj.org/article/9cdc29b97c74492f9e39fd5660196e5c
Publikováno v:
IEEE Access, Vol 7, Pp 145340-145347 (2019)
Discount is a frequently used marketing tool. This paper is devoted to designing an effective dynamic discount pricing (DDP) strategy in competitive marketing. First, we introduce a competitive word-of-mouth (WOM) propagation model with DDP mechanism
Externí odkaz:
https://doaj.org/article/c71161f4117f44c0b59e89e303b0e02b
Publikováno v:
Complexity, Vol 2020 (2020)
To cope with evolving computer viruses, antivirus programs must be periodically updated. Due to the limited network bandwidth, new virus patches are typically injected into a small subset of network nodes and then forwarded to the remaining nodes. A
Externí odkaz:
https://doaj.org/article/36441b1ac82440bab244b1025f1543cf
Publikováno v:
Discrete Dynamics in Nature and Society, Vol 2020 (2020)
Rumors have been widely spread in online social networks and they become a major concern in modern society. This paper is devoted to the design of a cost-effective rumor-containing scheme in online social networks through an optimal control approach.
Externí odkaz:
https://doaj.org/article/6370e30c313c4823b5599466ec141d58
Publikováno v:
IEEE Access, Vol 6, Pp 58924-58938 (2018)
To fight against the evolving computer viruses, we must constantly inject new virus patches into the computer networks. This paper addresses the patch injection problem, i.e., the problem of developing a patch injection strategy to mitigate the negat
Externí odkaz:
https://doaj.org/article/1a45d36069e34d5a90195b0aa832f7c8
Publikováno v:
IEEE Access, Vol 5, Pp 20111-20123 (2017)
Advanced persistent threats (APTs) pose a grave threat to cyberspace, because they deactivate all the conventional cyber defense mechanisms. This paper addresses the issue of evaluating the security of the cyber networks under APTs. For this purpose,
Externí odkaz:
https://doaj.org/article/d96d5e75cb77422792e1fb2c9f1999c3