Showing 381 - 400 results of 529 for search '"information security"', query time: 0.07s Refine Results
  1. 381

    Mobile malware traffic detection approach based on value-derivative GRU by Hanxun ZHOU, Chen CHEN, Runze FENG, Junkun XIONG, Hong PAN, Wei GUO

    Published 2020-01-01
    “…For the dramatic increase in the number and variety of mobile malware had created enormous challenge for information security of mobile network users,a value-derivative GRU-based mobile malware traffic detection approach was proposed in order to solve the problem that it was difficult for a RNN-based mobile malware traffic detection approach to capture the dynamic changes and critical information of abnormal network traffic.The low-order and high-order dynamic change information of the malicious network traffic could be described by the value-derivative GRU approach at the same time by introducing the concept of “accumulated state change”.In addition,a pooling layer could ensure that the algorithm can capture key information of malicious traffic.Finally,simulation were performed to verify the effect of accumulated state changes,hidden layers,and pooling layers on the performance of the value-derivative GRU algorithm.Experiments show that the mobile malware traffic detection approach based on value-derivative GRU has high detection accuracy.…”
    Get full text
    Article
  2. 382

    Business process mining based insider threat detection system by Tai-ming ZHU, Yuan-bo GUO, An-kang JU, Jun MA

    Published 2016-10-01
    “…Current intrusion detection systems are mostly for detecting external attacks,but sometimes the internal staff may bring greater harm to organizations in information security.Traditional insider threat detection methods of-ten do not combine the behavior of people with business activities,making the threat detection rate to be improved.An insider threat detection system based on business process mining from two aspects was proposed,the implementation of insider threats and the impact of threats on system services.Firstly,the normal control flow model of business ac-tivities and the normal behavior profile of each operator were established by mining the training log.Then,the actual behavior of the operators was compared with the pre-established normal behavior contours during the operation of the system,which was supplemented by control flow anomaly detection and performance anomaly detection of business processes,in order to discover insider threats.A variety of anomalies were defined and the corresponding detection algorithms were given.Experiments were performed on the ProM platform.The results show the designed system is effective.…”
    Get full text
    Article
  3. 383
  4. 384

    Robust resource allocation algorithm for multicarrier NOMA security communication system by Yu ZHANG, Xiongwen ZHAO, Xiaoqing WANG, Suiyan GENG, Peng QIN, Zhenyu ZHOU

    Published 2022-03-01
    “…To improve the spectrum efficiency and enhance the information security of wireless network, a sum secrecy rate maximization-based robust resource allocation algorithm was proposed for a downlink multicarrier NOMA security communication system.Firstly, the artificial noise (AN) precoding vector was designed to be orthogonal to the legitimate channel, so that the legitimate transmission would not be affected by the AN.Then, considering the constraints of rate requirement of each user and the maximum transmit power of base station, a joint AN precoding, downlink data precoding and subcarrier allocation optimization problem was formulated under eavesdropping channel uncertainties.To solve that non-convex problem, it was decomposed into two joint optimization subproblems: precoding optimization and subcarrier allocation.The former was solved based on S-procedure and block coordinate descent (BCD) algorithm, the latter was solved by dynamic matching theory.Simulation results demonstrate that the proposed algorithm has good robustness and can effectively improve the sum secrecy rate.…”
    Get full text
    Article
  5. 385

    Interference alignment based secure transmission scheme in multi-user interference networks by Lin HU, Jiabing FAN, Hong WEN, Jie TANG, Qianbin CHEN

    Published 2023-06-01
    “…Faced with the requirement of information security in internet of things, a scenario of multi-user interference networks with multiple eavesdroppers was considered, and an interference alignment (IA) scheme based physical layer secure transmission was proposed.Traditional IA security algorithm may result in secret signal cancellation.To overcome this threat, a modified alternating minimization (AM) method was proposed.The multi-user interference was eliminated by alternatively optimizing transceiver matrices, and artificial noise (AN) aided max-eigenmode beamforming was employed for secure transmission.To obtain a more accurate analysis of IA feasibility, the IA equation was divided into independent subsets and their combinations.By analyzing each case, a much tighter necessary condition for IA feasibility was established.Finally, the power allocation ratio between the secret signal and the AN signal was optimized to maximize the secrecy outage probability (SOP) constrained secrecy rate.Numerical results confirm that both the quality and security of the secret signal have been enhanced.Therefore, the proposed scheme is more suitable and reliable for security applications in interference networks.…”
    Get full text
    Article
  6. 386

    Design and implementation of spam filtering system based on topic model by Xiaohuai KOU, Hua CHENG

    Published 2017-11-01
    “…Spam filtering technology plays a key role in many areas including information security,transmission efficiency,and automatic information classification.However,the emergence of spam affects the user's sense of experience,and can cause unnecessary economic and time loss.The deficiency of spam filtering technology was researched,and a method of spam classification based on naive Bayesian was put forward based on multiple keywords.In the subject of mail,the theme model was used by LDA to get the related subject and keyword of the message,and Word2Vec was further used to search keyword synonyms and related words,extending the keyword collection.In the classification of mails,the transcendental probability of the words in the training dataset was obtained by statistical learning.Based on the extended keyword collection and its probability,the joint probability of a subject and a message was deduced by the Bayesian formula as a basis for the spam judgment.At the same time,the spam filtering system based on topic model was simple and easy to apply.By comparing experiments with other typical spam filtering method,it is proved that the method of spam classification based on theme model and the improved method based on Word2Vec can effectively improve the accuracy of spam filtering.…”
    Get full text
    Article
  7. 387
  8. 388
  9. 389
  10. 390

    Practical implementation of a full-stack information technology application innovation industry-compliant email system by HUANG Jianbo, SU Xuanrui, LIU Zhiquan

    Published 2024-11-01
    “…Amid the evolving international landscape and the ongoing development of information technology in China, coupled with the increasing challenges to information security, self-reliance and control have become critical indicators and directions for the development of information systems. …”
    Get full text
    Article
  11. 391

    Si Substrate Backside—An Emerging Physical Attack Surface for Secure ICs in Flip Chip Packaging by Makoto Nagata, Takuji Miki

    Published 2024-01-01
    “…Semiconductor integrated circuit (IC) chips are regularly exposed to physical attacks and faced to the compromise of information security. An attacker leverages Si substrate backside as the open surface of an IC chip in flip-chip packaging and explores the points of information leakage over the entire backside without being hampered by physical obstacles as well as applying invasive treatments. …”
    Get full text
    Article
  12. 392

    Safeguarding Mobile Users from Violation by Third-party Apps by Vusumuzi Malele, Kagiso Mphasane

    Published 2025-01-01
    “…Insecure third-party mobile applications (apps) can have a detrimental impact on mobile users in terms of information security and data privacy. Insufficient protection for third-party mobile apps platforms may result in harmful installations. …”
    Get full text
    Article
  13. 393

    Research on dynamic cooperative technology of manned and unmanned networked information system by Haijun YE, Guofeng WANG, Zhiyong FENG

    Published 2023-07-01
    “…To meet the needs of information security sharing and systematic dynamic cooperation of manned and unmanned formations and to build a dynamic communication network, firstly, a networked high-precision system time synchronization scheme was designed, using integrated network link management strategy and wireless channel on-demand preference algorithm, and the time synchronization accuracy could be up to 100 nanosecond level.Secondly, a data privacy protection and secure sharing solution for airborne networks was built, implementing communication data security of manned and unmanned formation, and analyzing and discussing the performance and security to prove that the proposed solution has a provable high security strength.Meanwhile, a dynamic cooperation model of manned and unmanned formation was designed to discover, authenticate and revoke each node in real time, perform legitimacy identity verification, optimize allocation scheme for multi-objective information acquisition through multi-machine collaborative construction, differentiated data was used to transmit synchronize data, save network resources, improve data transmission efficiency, and meet the demand of systematic cooperative operations.…”
    Get full text
    Article
  14. 394

    Multistage Encryption for Text Using Steganography and Cryptography by Mohammed Majid Msallam, Fayez Aldoghan

    Published 2023-03-01
    “…Thus, important data must be encrypted during passing over a network so that information can only access by an intended receiver and processed by it. As a result, information security has become even more critical than before. …”
    Get full text
    Article
  15. 395
  16. 396
  17. 397

    A Review of DNA Cryptography by Ling Chu, Yanqing Su, Xiangyu Yao, Peng Xu, Wenbin Liu

    Published 2025-01-01
    “…DNA cryptography is an emerging discipline focused on achieving information security within this new paradigm. In this paper, we first present the foundational concepts of cryptography and biological technologies involved in DNA cryptography. …”
    Get full text
    Article
  18. 398

    Multiple-Feature Extracting Modules Based Leak Mining System Design by Ying-Chiang Cho, Jen-Yi Pan

    Published 2013-01-01
    “…Thus, we make use of practical verification in order to focus on information security and privacy through black-box testing.…”
    Get full text
    Article
  19. 399

    Downlink and Uplink Cooperative Transmission for Primary Secrecy Based Cognitive Radio Sensor Networks by Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang

    Published 2015-10-01
    “…Aiming at allocating more licensed spectrum to wireless sensor nodes (SNs) under the constraint of the information security requirement of the primary system, in this paper, we propose a cooperative relaying and jamming secure transmission (CRJS) scheme in which SNs will relay primary message and jam primary eavesdrop concurrently with SN's downlink and uplink information transmission in cognitive radio sensor networks (CRSNs). …”
    Get full text
    Article
  20. 400