Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Pengdeng Li"'
Autor:
Pengdeng Li, Xiaofan Yang
Publikováno v:
IEEE Access, Vol 7, Pp 103556-103569 (2019)
Advanced persistent threat (APT) for data theft poses a severe threat to cloud storage systems (CSSs). An APT actor may steal valuable data from the target CSS even in a strategic fashion. To protect a CSS from APT, the cloud defender has to dynamica
Externí odkaz:
https://doaj.org/article/dcff80886a0d4f19b2ce503dedc92573
Publikováno v:
IEEE Access, Vol 6, Pp 58924-58938 (2018)
To fight against the evolving computer viruses, we must constantly inject new virus patches into the computer networks. This paper addresses the patch injection problem, i.e., the problem of developing a patch injection strategy to mitigate the negat
Externí odkaz:
https://doaj.org/article/1a45d36069e34d5a90195b0aa832f7c8
Publikováno v:
IEEE Access, Vol 5, Pp 20111-20123 (2017)
Advanced persistent threats (APTs) pose a grave threat to cyberspace, because they deactivate all the conventional cyber defense mechanisms. This paper addresses the issue of evaluating the security of the cyber networks under APTs. For this purpose,
Externí odkaz:
https://doaj.org/article/d96d5e75cb77422792e1fb2c9f1999c3
Publikováno v:
Sensors, Vol 19, Iss 2, p 262 (2019)
Wireless sensor networks (WSNs) are vulnerable to computer viruses. To protect WSNs from virus attack, the virus library associated with each sensor node must be updated in a timely way. This article is devoted to developing energy-efficient patching
Externí odkaz:
https://doaj.org/article/383bf810bf284cbbb1dc25dc940155f1
Publikováno v:
PLoS ONE, Vol 11, Iss 5, p e0155580 (2016)
The optimal link removal (OLR) problem aims at removing a given number of links of a network so that the spectral radius of the residue network obtained by removing the links from the network attains the minimum. Torus networks are a class of regular
Externí odkaz:
https://doaj.org/article/1b6b3d828c3c4af79b7bdba235ac2cf3
Publikováno v:
IEEE Systems Journal. 15:5034-5045
A rumor about an entity can spread rapidly through online social networks (OSNs), which may lead to serious consequences. This article focuses on developing a cost-effective rumor-refuting strategy in the situation where the rumormonger is strategic.
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 17:1163-1172
The advanced persistent threat (APT) as a new kind of cyber attack has posed a severe threat to modern organizations. When the APT has been detected, the organization has to deal with the APT response problem, i.e., to allocate the available response
Publikováno v:
Communications in Nonlinear Science and Numerical Simulation. 74:167-179
This paper addresses the issue of discount pricing in word-of-mouth (WOM) marketing. First, we propose a novel discount strategy we refer to as the Influence-Based Discount (IBD) strategy, in which each buyer would enjoy a discount that is linearly p
Publikováno v:
Security and Communication Networks, Vol 2019 (2019)
To restrain escalating computer viruses, new virus patches must be constantly injected into networks. In this scenario, the patch-developing cost should be balanced against the negative impact of virus. This article focuses on seeking best-balanced p
Autor:
Xiaofan Yang, Pengdeng Li
Publikováno v:
IEEE Access, Vol 7, Pp 103556-103569 (2019)
Advanced persistent threat (APT) for data theft poses a severe threat to cloud storage systems (CSSs). An APT actor may steal valuable data from the target CSS even in a strategic fashion. To protect a CSS from APT, the cloud defender has to dynamica