Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Shumian Yang"'
Autor:
Qiannan Shi, Shumian Yang, Na Wang, Shu-e Zhang, Yanping Wang, Bing Wu, Xinyuan Lu, Yining She, Zhihao Yue, Lei Gao, Zhong Zhang
Publikováno v:
BMC Geriatrics, Vol 23, Iss 1, Pp 1-15 (2023)
Abstract Background The competing interests of the government, smart senior care technology service providers, and older adults have led to a serious fragmentation of governance in China. This study aims to identify the collaboration mechanisms and e
Externí odkaz:
https://doaj.org/article/d435b6c3fdcb4fbb82a622c3af8cebf2
Publikováno v:
Applied Sciences, Vol 14, Iss 6, p 2409 (2024)
Network protocol syntax information plays a crucial role in grammar-based fuzzing. Current network protocol syntax extraction methods are less versatile, inefficient, and the extracted information is not comprehensive. This paper proposes a novel met
Externí odkaz:
https://doaj.org/article/682372adb8874deb847c9cc5f875d475
Publikováno v:
Applied Sciences, Vol 13, Iss 22, p 12528 (2023)
As the amount of malware has grown rapidly in recent years, it has become the most dominant attack method in network security. Learning execution behavior, especially Application Programming Interface (API) call sequences, has been shown to be effect
Externí odkaz:
https://doaj.org/article/a87c6078c23a4a638f97ce3bd5fcd139
Publikováno v:
Applied Sciences, Vol 13, Iss 4, p 2484 (2023)
With the continuous development and popularization of the Internet, there has been an increasing number of network security problems appearing. Among them, the rapid growth in the number of malware and the emergence of variants have seriously affecte
Externí odkaz:
https://doaj.org/article/96934d574dbf4f3dbc6447c90af8044b
Publikováno v:
Sensors, Vol 22, Iss 19, p 7413 (2022)
With the development of the Industrial Internet of Things (IIoT), industrial wireless sensors need to upload the collected private data to the cloud servers, resulting in a large amount of private data being exposed on the Internet. Private data are
Externí odkaz:
https://doaj.org/article/3aedd9c0aa5d41b4952a78e63c869885
Publikováno v:
Security and Communication Networks. 2023:1-15
In recent years, malware has experienced explosive growth and has become one of the most severe security threats. However, feature engineering easily restricts the traditional machine learning methods-based malware classification and is hard to deal
Publikováno v:
IEEE Transactions on Circuits and Systems II: Express Briefs. 67:2732-2736
The dismantling problem and minimum vertex cover (MVC) problem of network are two fundamental NP-hard problems where the former aims to find a minimal subset of nodes whose removal leaves the network broken in small components of sub-extensive size a
Publikováno v:
2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC).
Publikováno v:
2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC).
Publikováno v:
NaNA
Memory forensics technology is valuable for not only analyzing malicious code and system vulnerability but also generating evidence used in court. Hereby, this technology has been extensively used in many fields. However, few research is carried out