-
381
Mobile malware traffic detection approach based on value-derivative GRU
Published 2020-01-01“…For the dramatic increase in the number and variety of mobile malware had created enormous challenge for information security of mobile network users,a value-derivative GRU-based mobile malware traffic detection approach was proposed in order to solve the problem that it was difficult for a RNN-based mobile malware traffic detection approach to capture the dynamic changes and critical information of abnormal network traffic.The low-order and high-order dynamic change information of the malicious network traffic could be described by the value-derivative GRU approach at the same time by introducing the concept of “accumulated state change”.In addition,a pooling layer could ensure that the algorithm can capture key information of malicious traffic.Finally,simulation were performed to verify the effect of accumulated state changes,hidden layers,and pooling layers on the performance of the value-derivative GRU algorithm.Experiments show that the mobile malware traffic detection approach based on value-derivative GRU has high detection accuracy.…”
Get full text
Article -
382
Business process mining based insider threat detection system
Published 2016-10-01“…Current intrusion detection systems are mostly for detecting external attacks,but sometimes the internal staff may bring greater harm to organizations in information security.Traditional insider threat detection methods of-ten do not combine the behavior of people with business activities,making the threat detection rate to be improved.An insider threat detection system based on business process mining from two aspects was proposed,the implementation of insider threats and the impact of threats on system services.Firstly,the normal control flow model of business ac-tivities and the normal behavior profile of each operator were established by mining the training log.Then,the actual behavior of the operators was compared with the pre-established normal behavior contours during the operation of the system,which was supplemented by control flow anomaly detection and performance anomaly detection of business processes,in order to discover insider threats.A variety of anomalies were defined and the corresponding detection algorithms were given.Experiments were performed on the ProM platform.The results show the designed system is effective.…”
Get full text
Article -
383
-
384
Robust resource allocation algorithm for multicarrier NOMA security communication system
Published 2022-03-01“…To improve the spectrum efficiency and enhance the information security of wireless network, a sum secrecy rate maximization-based robust resource allocation algorithm was proposed for a downlink multicarrier NOMA security communication system.Firstly, the artificial noise (AN) precoding vector was designed to be orthogonal to the legitimate channel, so that the legitimate transmission would not be affected by the AN.Then, considering the constraints of rate requirement of each user and the maximum transmit power of base station, a joint AN precoding, downlink data precoding and subcarrier allocation optimization problem was formulated under eavesdropping channel uncertainties.To solve that non-convex problem, it was decomposed into two joint optimization subproblems: precoding optimization and subcarrier allocation.The former was solved based on S-procedure and block coordinate descent (BCD) algorithm, the latter was solved by dynamic matching theory.Simulation results demonstrate that the proposed algorithm has good robustness and can effectively improve the sum secrecy rate.…”
Get full text
Article -
385
Interference alignment based secure transmission scheme in multi-user interference networks
Published 2023-06-01“…Faced with the requirement of information security in internet of things, a scenario of multi-user interference networks with multiple eavesdroppers was considered, and an interference alignment (IA) scheme based physical layer secure transmission was proposed.Traditional IA security algorithm may result in secret signal cancellation.To overcome this threat, a modified alternating minimization (AM) method was proposed.The multi-user interference was eliminated by alternatively optimizing transceiver matrices, and artificial noise (AN) aided max-eigenmode beamforming was employed for secure transmission.To obtain a more accurate analysis of IA feasibility, the IA equation was divided into independent subsets and their combinations.By analyzing each case, a much tighter necessary condition for IA feasibility was established.Finally, the power allocation ratio between the secret signal and the AN signal was optimized to maximize the secrecy outage probability (SOP) constrained secrecy rate.Numerical results confirm that both the quality and security of the secret signal have been enhanced.Therefore, the proposed scheme is more suitable and reliable for security applications in interference networks.…”
Get full text
Article -
386
Design and implementation of spam filtering system based on topic model
Published 2017-11-01“…Spam filtering technology plays a key role in many areas including information security,transmission efficiency,and automatic information classification.However,the emergence of spam affects the user's sense of experience,and can cause unnecessary economic and time loss.The deficiency of spam filtering technology was researched,and a method of spam classification based on naive Bayesian was put forward based on multiple keywords.In the subject of mail,the theme model was used by LDA to get the related subject and keyword of the message,and Word2Vec was further used to search keyword synonyms and related words,extending the keyword collection.In the classification of mails,the transcendental probability of the words in the training dataset was obtained by statistical learning.Based on the extended keyword collection and its probability,the joint probability of a subject and a message was deduced by the Bayesian formula as a basis for the spam judgment.At the same time,the spam filtering system based on topic model was simple and easy to apply.By comparing experiments with other typical spam filtering method,it is proved that the method of spam classification based on theme model and the improved method based on Word2Vec can effectively improve the accuracy of spam filtering.…”
Get full text
Article -
387
Throughput-Optimal Scheduling for Cooperative Communications in Wireless Ad Hoc Networks
Published 2013-09-01Get full text
Article -
388
Nearly Quadratic n-Derivations on Non-Archimedean Banach Algebras
Published 2012-01-01Get full text
Article -
389
Advancement of Nanofibrous Mats and Common Useful Drug Delivery Applications
Published 2022-01-01Get full text
Article -
390
Practical implementation of a full-stack information technology application innovation industry-compliant email system
Published 2024-11-01“…Amid the evolving international landscape and the ongoing development of information technology in China, coupled with the increasing challenges to information security, self-reliance and control have become critical indicators and directions for the development of information systems. …”
Get full text
Article -
391
Si Substrate Backside—An Emerging Physical Attack Surface for Secure ICs in Flip Chip Packaging
Published 2024-01-01“…Semiconductor integrated circuit (IC) chips are regularly exposed to physical attacks and faced to the compromise of information security. An attacker leverages Si substrate backside as the open surface of an IC chip in flip-chip packaging and explores the points of information leakage over the entire backside without being hampered by physical obstacles as well as applying invasive treatments. …”
Get full text
Article -
392
Safeguarding Mobile Users from Violation by Third-party Apps
Published 2025-01-01“…Insecure third-party mobile applications (apps) can have a detrimental impact on mobile users in terms of information security and data privacy. Insufficient protection for third-party mobile apps platforms may result in harmful installations. …”
Get full text
Article -
393
Research on dynamic cooperative technology of manned and unmanned networked information system
Published 2023-07-01“…To meet the needs of information security sharing and systematic dynamic cooperation of manned and unmanned formations and to build a dynamic communication network, firstly, a networked high-precision system time synchronization scheme was designed, using integrated network link management strategy and wireless channel on-demand preference algorithm, and the time synchronization accuracy could be up to 100 nanosecond level.Secondly, a data privacy protection and secure sharing solution for airborne networks was built, implementing communication data security of manned and unmanned formation, and analyzing and discussing the performance and security to prove that the proposed solution has a provable high security strength.Meanwhile, a dynamic cooperation model of manned and unmanned formation was designed to discover, authenticate and revoke each node in real time, perform legitimacy identity verification, optimize allocation scheme for multi-objective information acquisition through multi-machine collaborative construction, differentiated data was used to transmit synchronize data, save network resources, improve data transmission efficiency, and meet the demand of systematic cooperative operations.…”
Get full text
Article -
394
Multistage Encryption for Text Using Steganography and Cryptography
Published 2023-03-01“…Thus, important data must be encrypted during passing over a network so that information can only access by an intended receiver and processed by it. As a result, information security has become even more critical than before. …”
Get full text
Article -
395
An Efficient Data Analysis Framework for Online Security Processing
Published 2021-01-01Get full text
Article -
396
Theoretical and Experimental Demonstration on Grating Lobes of Liquid Crystal Optical Phased Array
Published 2016-01-01Get full text
Article -
397
A Review of DNA Cryptography
Published 2025-01-01“…DNA cryptography is an emerging discipline focused on achieving information security within this new paradigm. In this paper, we first present the foundational concepts of cryptography and biological technologies involved in DNA cryptography. …”
Get full text
Article -
398
Multiple-Feature Extracting Modules Based Leak Mining System Design
Published 2013-01-01“…Thus, we make use of practical verification in order to focus on information security and privacy through black-box testing.…”
Get full text
Article -
399
Downlink and Uplink Cooperative Transmission for Primary Secrecy Based Cognitive Radio Sensor Networks
Published 2015-10-01“…Aiming at allocating more licensed spectrum to wireless sensor nodes (SNs) under the constraint of the information security requirement of the primary system, in this paper, we propose a cooperative relaying and jamming secure transmission (CRJS) scheme in which SNs will relay primary message and jam primary eavesdrop concurrently with SN's downlink and uplink information transmission in cognitive radio sensor networks (CRSNs). …”
Get full text
Article -
400