-
1101
A Hybrid Approach for Color Face Recognition Based on Image Quality Using Multiple Color Spaces
Published 2024-12-01“…Additionally, the proposed system is designed to serve as a secure anti-spoofing mechanism, tested against different attack scenarios, including print attacks, mobile attacks, and high-definition attacks. …”
Get full text
Article -
1102
Research on Windows memory protection mechanism
Published 2017-10-01“…Over the past three decades,attacks exploiting Windows memory holes have emerged in an endless stream,and the usual means is to attack control-data to hijack the execution flow of the program.To this end,Microsoft has added layers of protection mechanisms to Windows to prevent such attacks.But at this stage,the defensive mechanisms deployed on Windows cannot prevent attacks against non-control-data.In view of the published articles lacking comprehensive study of Windows memory protection mechanism,a detailed introduction to Windows memory protection mechanism and its breakthrough techniques,and non-control-data protection research status was conducted.On this basis,the challenges of Windows memory protection were analyzed and the future of memory protection was discussed.…”
Get full text
Article -
1103
Selfish mining detection scheme based on the characters of transactions
Published 2023-04-01“…Selfish mining is an attack strategy in Proof-of-Work based blockchains, where attackers withhold their mined blocks to intercept the awards of other honest miners, resulting in higher profitability.This attack undermines the incentive compatibility of Proof-of-Work.Although there are various studies from researchers in recent years, there is no effective detection scheme as the vulnerability of blockchain in propagation delay makes it challenging to distinguish the attackers from honest miners.A scheme for selfish mining detection was introduced.In this scheme, a state value was assigned to the new block based on transaction amount and the transaction fee of the block.By analyzing the relationship between state value and transaction characteristics, we can determine if the block was mined by a selfish miner.The scheme is verified by an experiment with an accuracy of 86.02%.…”
Get full text
Article -
1104
Cryptanalysis of a hybrid-structured onion routing scheme
Published 2013-04-01“…SHI Jin-qiao et al's hybrid-structured onion routing scheme was analysed and some security flaws were found in their design.The first flaw was derived from the malleability of its cryptographic message format which could be exploited by attackers to redirect an onion message or embed tags into it for tracing its routing path.The second flaw was the vulnerability of relay servers to chosen ciphertext attack.Three different attacks were presented that each broke the sender-receiver unlinkability entirely at a relatively low co To evade these attacks,a modified scheme was also proposed which could capture malicious nodes by using upstream investigation.…”
Get full text
Article -
1105
Research on models of network security evaluation and analysis
Published 2018-04-01“…Network security assessment helps to grasp the current and future risks of the network information system clearly,and gives corresponding security suggestions and countermeasures.Model of network security assessment and analysis is an important research direction and content,for which there is no review to give a comprehensive summary or analysis.A review of common network security evaluation and analysis model was given.The model that focus on attack was introduced,such as the attack tree,attack graph and kill chain,then the model that focus on network defense or offensive and defensive interaction was explained,such as attack surface,cyber epidemic model,Petri nets and automation machine,giving introduction to the basic concept,application field,modeling analysis process,advantages and disadvantages of the models.Then,typical examples were given to illustrate the application of the models in network defense technology evaluation and analysis.…”
Get full text
Article -
1106
Machine learning security and privacy:a survey
Published 2018-08-01“…As an important method to implement artificial intelligence,machine learning technology is widely used in data mining,computer vision,natural language processing and other fields.With the development of machine learning,it brings amount of security and privacy issues which are getting more and more attention.Firstly,the adversary model was described according to machine learning.Secondly,the common security threats in machine learning was summarized,such as poisoning attacks,adversarial attacks,oracle attacks,and major defense methods such as regularization,adversarial training,and defense distillation.Then,privacy issues such were summarized as stealing training data,reverse attacks,and membership tests,as well as privacy protection technologies such as differential privacy and homomorphic encryption.Finally,the urgent problems and development direction were given in this field.…”
Get full text
Article -
1107
Analysis and Improvement of a Robust User Authentication Framework for Ubiquitous Sensor Networks
Published 2014-03-01“…After a simple analysis, we have proved that the improved scheme can resist the collusion attack.…”
Get full text
Article -
1108
Combinatorial intrusion detection model based on deep recurrent neural network and improved SMOTE algorithm
Published 2018-07-01“…Existing intrusion detection models generally only analyze the static characteristics of network intrusion actions,resulting in low detection rate and high false positive rate,and cannot effectively detect low-frequency attacks.Therefore,a novel combinatorial intrusion detection model (DRRS) based on deep recurrent neural network (DRNN) and region adaptive synthetic minority oversampling technique algorithm (RA-SMOTE) was proposed.Firstly,RA-SMOTE divided the low frequency attack samples into different regions adaptively and improved the number of low-frequency attack samples with different methods from the data level.Secondly,the multi-stage classification features were learned by using the level feedback units in DRNN,at the same time,the multi-layer network structure achieved the optimal non-linear fitting of the original data distribution.Finally,the intrusion detection was completed by trained DRRS.The empirical results show that compared with the traditional intrusion detection models,DRRS significantly improves the detection rate of low-frequency attacks and overall detection efficiency.Besides,DRRS has a certain detection rate for unknown new attacks.So DRRS model is effective and suitable for the actual network environment.…”
Get full text
Article -
1109
MHSDN: A Hierarchical Software Defined Network Reliability Framework design
Published 2023-01-01“…Abstract At present, attacks based on the vulnerability of the controller and flooding attacks still constitute a principal threat for hierarchical Software Defined Network (SDN), such as flow table tampering, malicious Application attacks, Distributed Denial of Service (DDoS) etc., due to the limitation against attacks based on known or unknown vulnerabilities for traditional cyber defence technology. …”
Get full text
Article -
1110
GAYA ANGKAT DAN GAYA HAMBAT SAYAP PUNA MODEL NACA 0015 MENGGUNAKAN SIMULASI ANSYS FLUENT
Published 2024-12-01“…Herein, we performed a detailed computation of the lift and drag behaviors of NACA-0015 flying wing modelled through the surveillance speeds and difference angle of attack using Ansys. This study aims to determine and analyze the maximum angle of attack, lift force and drag force at speeds of 10 m/s, 30 m/s, and 50 m/s. …”
Get full text
Article -
1111
An Effective Node-To-Edge Interdependent Network and Vulnerability Analysis for Digital Coupled Power Grids
Published 2022-01-01“…In terms of attacking power nodes, the index proposed in this paper has the same rate as “degree.” …”
Get full text
Article -
1112
Cumulated Checksum and Dynamic Addresses for Secure Wireless Sensor Networks
Published 2016-07-01“…Due to the broadcast nature of wireless channel, attacks against wireless sensor networks are much easier to carry out as compared to wired networks. …”
Get full text
Article -
1113
CP-ABE based users collaborative privacy protection scheme for continuous query
Published 2017-09-01“…In location-based services (LBS),as the untrusted LBS server can be seen as an adversary,and it can utilize the attribute as background knowledge to correlate the real location of the user in the set of uncertain locations.Then the adversary can gain the location privacy when the user enjoys the snapshot and continuous query through the correlation inference attack.In order to cope with this attack,the main scheme in privacy protection is to generalize the attribute and achieve attribute anonymity.However,algorithms of this type usually assumes a trusted third party (TTP) which provides the service of similarity attribute finding and comparing,and it is unpractical in the real environment,as the TTP may become the point of attack or the bottleneck of service and it cannot be considered as the trusted one all the time.Thus,to cope with the correlation inference attack as well as the semi-trusted third party,ciphertext policy attribute based encryption (CP-ABE) and users collaboration based attribute anonymous scheme was proposed.In this scheme,the user coupled achieve location and attribute anonymity.Furthermore,this scheme could also provide security for attacks from the semi-trusted third party as well as semi-trusted collaborative users.At last,security analysis and the experiment results further verify the effectiveness of privacy protection and the efficiency of algorithm execution.…”
Get full text
Article -
1114
Dynamic hierarchical quantum secret sharing protocol based on high-dimensional GHZ state
Published 2024-10-01“…In addition, security analysis results showed that the proposed protocol could resist intercept-and-resend attack, measure-and-resend attack, entangle-and-measure attack, Trojan horse attack, as well as collusion attacks from internal participants.…”
Get full text
Article -
1115
Lightweight PUF-based anonymous authentication protocol in V2G
Published 2024-10-01“…The ROR model and Scyther formal validation tool proved the security of the proposed protocol, and the informal security analysis showed that the proposed protocol was resistant to a variety of security attacks, such as physical attacks, location forgery attacks and privileged insider attacks. …”
Get full text
Article -
1116
Honeypot defense and transmission strategy based on offensive and defensive games in vehicular networks
Published 2022-08-01“…With the rapid development of the Internet of Vehicles, service providers can efficiently provide caching services for vehicle users by deploying 5G base station-type RSUs adjacent to vehicles.However, due to the presence of malicious attackers, the controlled base station is turned to be malicious for the purpose of identity forgery attack.When messages are sent in the name of malicious base stations to interfere with the communication link between vehicles and the trusted base stations, it is easy to cause serious driving safety problems.To solve the above problem, an efficient transmission and honeypot defense strategy was proposed, which was based on the offensive and defensive game in the Internet of Vehicles to reduce the risk of identity forgery attacks and improve the security of data transmission.The interaction between trusted base stations and malicious base stations in the Internet of Vehicles scenario was modeled as an attack-defense game model.On this basis, trusted base stations and honeypot base stations were jointly used as defenders to defend against malicious attacks.Then, the trusted base station and the malicious base station, as the two sides of the offensive and defensive game, chose their respective strategies to construct a model of the benefit function of both sides.Combined with the vehicle delay feedback mechanism, the defender and the malicious base station dynamically adjusted their respective strategies.By adjusting the interaction between the honeypot base station and the vehicle, and also the degree of IP randomization, the overall benefit of the defender was effectively improved.Besides, the optimal solution was obtained by using the mixed strategy Nash equilibrium theory.Simulation experimental results show that the proposed strategy can improve the secure transmission performance of the Internet of Vehicles service in the presence of malicious attackers, and the defender’s expected benefit is improved by 48.9% and the data transmission delay is reduced by 57.1% compared to the no-honeypot defense scheme.…”
Get full text
Article -
1117
A Comparative Study Evaluated the Performance of Two-class Classification Algorithms in Machine Learning
Published 2024-10-01“… Worldwide, heart attacks, also called myocardial infarctions, are a leading cause of death. …”
Get full text
Article -
1118
Bell’s Palsy: A Prospective Study
Published 2020-01-01“…The objective of this work is to study the grade of the attack and the associated symptoms of Bell’s palsy in a group of Sudanese patients. …”
Get full text
Article -
1119
Adversarial example defense algorithm for MNIST based on image reconstruction
Published 2022-02-01“…With the popularization of deep learning, more and more attention has been paid to its security issues.The adversarial sample is to add a small disturbance to the original image, which can cause the deep learning model to misclassify the image, which seriously affects the performance of deep learning technology.To address this challenge, the attack form and harm of the existing adversarial samples were analyzed.An adversarial examples defense method based on image reconstruction was proposed to effectively detect adversarial examples.The defense method used MNIST as the test data set.The core idea was image reconstruction, including central variance minimization and image quilting optimization.The central variance minimization was only processed for the central area of the image.The image quilting optimization incorporated the overlapping area into the patch block selection.Considered and took half the size of the patch as the overlap area.Using FGSM, BIM, DeepFool and C&W attack methods to generate adversarial samples to test the defense performance of the two methods, and compare with the existing three image reconstruction defense methods (cropping and scaling, bit depth compression and JPEG compression).The experimental results show that the central variance minimization and image quilting optimization algorithms proposed have a satisfied defense effect against the attacks of existing common adversarial samples.Image quilting optimization achieves over 75% classification accuracy for samples generated by the four attack algorithms, and the defense effect of minimizing central variance is around 70%.The three image reconstruction algorithms used for comparison have unstable defense effects on different attack algorithms, and the overall classification accuracy rate is less than 60%.The central variance minimization and image quilting optimization proposed achieve the purpose of effectively defending against adversarial samples.The experiments illustrate the defense effect of the proposed defense algorithm in different adversarial sample attack algorithms.The comparison between the reconstruction algorithm and the algorithm shows that the proposed scheme has good defense performance.…”
Get full text
Article -
1120
July 22nd a window of opportunity for police reform?
Published 2022-12-01“…Abstract This article deals with questions concerning the relationship between the Norwegian police reform of 2016 and the terrorist attack at Utøya in 2011. The 2016 reform is often presented as an automatic response to the attack by media, politicians and the Police Director. …”
Get full text
Article