-
1481
Research on distributed network intrusion detection system for IoT based on honeyfarm
Published 2024-01-01“…To solve the problems that the network intrusion detection system in the Internet of things couldn’t identify new attacks and has limited flexibility, a network intrusion detection system based on honeyfarm was proposed, which could effectively identify abnormal traffic and have continuous learning ability.Firstly, considering the characteristics of the convolutional block attention module, an abnormal traffic detection model was developed, focusing on both channel and spatial dimensions, to enhance the model’s recognition abilities.Secondly, a model training scheme utilizing federated learning was employed to enhance the model’s generalization capabilities.Finally, the abnormal traffic detection model at the edge nodes was continuously updated and iterated based on the honeyfarm, so as to improve the system’s accuracy in recognizing new attack traffic.The experimental results demonstrate that the proposed system not only effectively detects abnormal behavior in network traffic, but also continually enhances performance in detecting abnormal traffic.…”
Get full text
Article -
1482
Pediatric Migraine
Published 2009-01-01“…Indications for starting prophylaxis should be evaluated based on frequency of attacks and influence on quality of life. For management of acute attacks of migraine both acetaminophen and ibuprofen are recommended for use in children. …”
Get full text
Article -
1483
Eastern Cherry Fruit Fly, Rhagoletis cingulata (Loew) (Insecta: Diptera: Tephritidae)
Published 2004-07-01“… Larvae of two closely related species of fruit flies in central and eastern North America -- Rhagoletis cingulata (Loew), commonly called the cherry fruit fly or cherry maggot, and Rhagoletis fausta (Osten Sacken), the black cherry fruit fly -- attack cherry and cause wormy fruits. Only R. cingulata occurs in Florida, where it attacks wild cherries and is of little economic importance. …”
Get full text
Article -
1484
Research on federated learning approach based on local differential privacy
Published 2022-10-01“…As a type of collaborative machine learning framework, federated learning is capable of preserving private data from participants while training the data into useful models.Nevertheless, from a viewpoint of information theory, it is still vulnerable for a curious server to infer private information from the shared models uploaded by participants.To solve the inference attack problem in federated learning training, a local differential privacy federated learning (LDP-FL) approach was proposed.Firstly, to ensure the federated model training process was protected from inference attacks, a local differential privacy mechanism was designed for transmission of parameters in federated learning.Secondly, a performance loss constraint mechanism for federated learning was proposed and designed to reduce the performance loss of local differential privacy federated model by optimizing the constraint range of the loss function.Finally, the effectiveness of proposed LDP-FL approach was verified by comparative experiments on MNIST and Fashion MNIST datasets.…”
Get full text
Article -
1485
Three-party password authenticated key agreement protocol with user anonymity based on lattice
Published 2018-02-01“…With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two authentication key agreement protocols were proposed rely on ring-learning-with-error (RLWE) assumption including lattice-based implicit authentication key agreement scheme and lattice-based explicit authentication key agreement scheme and proved its security.The implicit authentication key agreement protocol is less to communicate and faster to authentication,the explicit authentication key agreement protocol is more to secure.At the same time,bidirectional authentication of users and servers can resist unpredictable online dictionary attacks.The new protocol has higher efficiency and shorter key length than other password authentication key agreement protocols.It can resist quantum attacks.Therefore,the protocol is efficient,secure,and suitable for large-scale network communication.…”
Get full text
Article -
1486
Research on knowledge graph construction technology for cyber threat intelligence based on large language models
Published 2024-11-01“…Through instruction prompts and context learning, AutoCTI2KG automatically generated cybersecurity and attack knowledge graphs from cyber threat intelligence and provided actionable defense recommendations. …”
Get full text
Article -
1487
AMTD:a way of adaptive moving target defense
Published 2018-01-01“…Moving target defense is a new way to change the asymmetry state between attack and defense,by dynamically moving target’s attacking surface.Frequency conversion of MTD is of great importance for the weighing between usability,security and defense cost.Nowadays,however,frequency conversion is usually determined by manager’s experience,which cannot create a balance between usability and security cost for the lack of theory basis.An adaptive moving target defense framework(AMTD)was proposed.AMTD can maximize system security at the lowest cost while ensuring that the system is available.The adaptability of AMTD has two modes.Firstly,the defense mode,it contains an adaptive conversion strategy to provide reacting defense triggered by security alerts and active defense triggered by timer expiration events.The other mode is the frequency conversion,which obtain the optimal conversion frequency by establishing mathematical models.Four series of simulation experiments were taken to verify the effectiveness of the solution.…”
Get full text
Article -
1488
Analysis of software defined security model and architecture
Published 2017-06-01“…Currently,most enterprises have deployed information security defense system based on policy access control.With cloud computing environment deployment and network attacking technology development,security has been regarded as one of the greatest problems in the cloud computing environment.The advanced persistent attacks including of bypassing the traditional firewall easily,breaking through the black and white list and feature matching of the security defense mechanism have included to the traditional security system new challenges.The problem in the traditional tightly coupled security defense system of combining the virtual with the true for construction of network environments was described,and a software defined security model and framework was provided.The decoupling scheme of access patterns and deployment position in combining the virtual with the true for construction of network environments was realized,which provided a beneficial exploration in the field of the adaptive active safety for enterprise cloud computing environment.…”
Get full text
Article -
1489
Role of Asthma Education in the Management of Adult Asthma
Published 1995-01-01“…They should he knowledgeable about the basic aspects of asthma, airway inflammation and bronchoconstriction, use or medication and early symptoms heralding an asthma attack. Environmental factors that may trigger an asthma attack should be explained. …”
Get full text
Article -
1490
Bloom filter-based lightweight private matching scheme
Published 2015-12-01“…With rapid developments of mobile devices and online social networks,users of proximity-based mobile social networks (PMSN) could easily discover and make new social interactions with others,but they enjoyed this kind of conveniences at the cost of user privacy and system overhead,etc.To address this problem,a third party free and lightweight scheme to privately match the similarity with potential friends in vicinity was proposed.Unlike most existing work,proposed scheme considered both the number of common attributes and the corresponding priorities on each of them individually.The Bloom filter-based common-attributes estimation and the lightweight confusion binary vector scalar product protocol reduce the system overhead significantly,and can resist against brute force attack and unlimited input attack.The correctness,security and performance of overhead of proposed scheme are then thoroughly analyzed and evaluated via detailed simulations.…”
Get full text
Article -
1491
A lightweight privacy-preserving truth discovery mechanism for IoT
Published 2021-05-01“…In order to solve diverse quality and privacy leakage of perceived data in fog-cloud integrated internet of things (IoT), a streaming encryption-based privacy-preserving truth discovery mechanism for IoT was proposed.Firstly, by utilizing shuffling and streaming encryption algorithms, the ground truths and the weights were anonymously updated on the cloud server and fog server, respectively, so that the collusion attacks between malicious attackers and cloud or fog servers could be resisted to defend against privacy leakage of IoT devices.Secondly, by adopting the Softmax function, the device weights were calculated on fog server, which reduces the error rate for calculating the ground truths.Finally, the theoretical analysis proved that the mechanism could protect privacy of the devices.And, the experimental results demonstrate that the proposed mechanism is an effective privacy-preserving trust discovery mechanism for large-scale IoT devices, which can outperform existing ones in computing efficiency.…”
Get full text
Article -
1492
L’expérience de l’infarctus du myocarde : tensions identitaires des malades et effets sur leur demande de soins
Published 2019-11-01“…These unadapted behaviors have been largely examinated, but the methods and results of the studies appear insufficient to understand what is being played intimately in patients who suffer a heart attack. We conducted a qualitative research in an epistemology of subjectivity and mobilizing the point of view in first person of patients, with the aim of exploring and understanding: (1) real-life experience of subjects during a heart attack, (2) the choices operated by victims of myocardial infarction during the crisis, (3) the mental phenomena that influence their decision to call for emergency services. …”
Get full text
Article -
1493
Statistical ineffective fault analysis of the lightweight authenticated cipher algorithm Saturnin-Short
Published 2023-04-01“…On the random single byte-oriented fault model and the assumption of ciphertext-only attack, a statistical ineffective fault analysis of the Saturnin-Short cipher was proposed.The analysis combined the statistical distribution with the ineffective analysis, and discussed the difference between intermediate states before and after fault injections.A variety of dual distinguishers was designed, such as the probabilistic symmetric Chi-square-maximum likelihood estimate, and harmonic mean-Hamming weight.It only required at least 1 097 ineffective faults to recover the 256 bit secret key with a success rate of at least 99%.The experimental results show that the proposed distinguishers can not only decrease fault injections, but also reduce the attacking time and complexities.Therefore, the Saturnin-Short cipher cannot resist against the statistical ineffective fault analysis.It provides an important reference for the security analysis of other lightweight authenticated ciphers.…”
Get full text
Article -
1494
Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems
Published 2022-04-01“…With the development of quantum computer technology, quantum attacks-resistant cryptographic schemes are gradually entering people’s horizons. …”
Get full text
Article -
1495
Trends in Inflammatory Bowel Disease Therapy: A Meta-Analytic Approach
Published 1995-01-01“…OBJECTIVE: To illustrate the current meta-analytic approach to extracting clinically useful information from the glut of randomized controlled trials (RCTs) of the treatment of acute attacks of Crohn's disease.…”
Get full text
Article -
1496
Study of influence of boron, aluminum, manganese, silicon and RZM on wear resistance of cast materials
Published 2003-08-01“…In the offered work there have been carried out the wear resistant tests of the cast materials experimental samples in conditions of friction at contact with steel and abrasive riders, conjugated with impingement attacks.…”
Get full text
Article -
1497
An Efficient Malware Detection Approach Based on Machine Learning Feature Influence Techniques for Resource-Constrained Devices
Published 2025-01-01“…Malicious attacks in the form of malware cause significant harm to systems with limited resources. …”
Get full text
Article -
1498
Susceptibility of European Agrilus beetle species to the biocontrol agents of Emerald Ash Borer in the laboratory
Published 2025-01-01“…Oobius agrili also attacked the eggs of A. convexicollis, but not A. sulcicollis. …”
Get full text
Article -
1499
TVD‐PB logic circuit based on camouflaging circuit for IoT security
Published 2022-01-01“…Compared with other state‐of‐the‐art techniques, the power dependency against power attacks is improved effectively.…”
Get full text
Article -
1500
Comparative responses of two congeneric larval parasitoids of emerald ash borer to ambient temperatures: Implications for biocontrol introduction
Published 2025-03-01“…In contrast, S. galinae did not attack any host larvae at 32.8 ℃ and caused the highest parasitism rate (∼92 %) at 25 ℃. …”
Get full text
Article