-
781
VdaBSC: A Novel Vulnerability Detection Approach for Blockchain Smart Contract by Dynamic Analysis
Published 2023-01-01Get full text
Article -
782
Cancelable finger vein authentication using multidimensional scaling based on deep learning
Published 2025-06-01Get full text
Article -
783
Blockchain covert communication scheme based on the cover of normal transactions
Published 2022-08-01“…With the development of computer technology, the situation of modern network attack and defense is becoming increasingly severe, and the problem of secure transmission of secret information needs to be solved urgently.Covert communication technology embeds secret information into the carrier and transmits the information safely through the covert channel.However, the traditional covert channels face the challenges of data damaging, attack, detection and so on, which cannot meet the higher security requirements.As a public data platform, blockchain can embed secret information under the cover of a large number of transactions.With its tamper proof, anonymity, decentralization and other characteristics, blockchain can well solve the problems of traditional covert channels and achieve secure covert communication.However, the existing blockchain covert communication schemes are limited by low communication efficiency and poor security.How to improve safety and efficiency of covert communication is a research focus of blockchain covert communication.Motivated by this issue, a blockchain covert communication scheme based on the cover of normal transactions was proposed.The hash algorithm was used to build a transmission-free password table to embed secret information without changing any transaction data.Using the elliptic curve feature, transactions with hidden information can be quickly screened out from a large number of transactions, to extract secret information quickly.This scheme improves the security and efficiency of covert communication and has strong portability.Theoretical analysis shows that attackers cannot distinguish between ordinary transactions and special transactions.This scheme has high anti-detection and scalability.Besides, the experimental results of the bitcoin test network show the high efficiency of this scheme.…”
Get full text
Article -
784
Blockchain-Based Value-Added Tax System: A Systematic Review
Published 2024-06-01Get full text
Article -
785
Efficient Deep Learning-Based Cyber-Attack Detection for Internet of Medical Things Devices
Published 2023-12-01Get full text
Article -
786
Multidisciplinary Contributions and Research Trends in eHealth Scholarship (2000-2024): Bibliometric Analysis
Published 2025-06-01“…Different types of eHealth apps were supported by research on infrastructures: networks, data exchange, computing technologies, information systems, and platforms. …”
Get full text
Article -
787
A Novel Framework for Financial Cybersecurity and Fraud Detection Using XAI-RNN-SGRU
Published 2025-01-01“…Cyber threats involve unauthorized access, alteration, or deletion of private information, extortion, and disruption of business operations. Traditional network security methods need more scalability, data protection, and difficulty detecting advanced threats. …”
Get full text
Article -
788
Leveraging self attention driven gated recurrent unit with crocodile optimization algorithm for cyberattack detection using federated learning framework
Published 2025-07-01“…Cybersecurity includes decreasing the risk of mischievous computer, software, and network attacks. Novel techniques have been combined into emerging artificial intelligence (AI) that attains cybersecurity. …”
Get full text
Article -
789
Botnet Detection Using Support Vector Machines with Artificial Fish Swarm Algorithm
Published 2014-01-01“…The number of mobile devices used globally substantially increases daily; therefore, information security concerns are increasingly vital. The botnet virus is a major threat to both personal computers and mobile devices; therefore, a method of botnet feature characterization is proposed in this study. …”
Get full text
Article -
790
Sylph: An Unsupervised APT Detection System Based on the Provenance Graph
Published 2025-07-01Get full text
Article -
791
Review of malware detection and classification visualization techniques
Published 2023-10-01“…With the rapid advancement of technology, network security faces a significant challenge due to the proliferation of malicious software and its variants.These malicious software use various technical tactics to deceive or bypass traditional detection methods, rendering conventional non-visual detection techniques inadequate.In recent years, data visualization has gained considerable attention in the academic community as a powerful approach for detecting and classifying malicious software.By visually representing the key features of malicious software, these methods greatly enhance the accuracy of malware detection and classification, opening up extensive research opportunities in the field of cyber security.An overview of traditional non-visual detection techniques and visualization-based methods were provided in the realm of malicious software detection.Traditional non-visual approaches for malicious software detection, including static analysis, dynamic analysis, and hybrid techniques, were introduced.Subsequently, a comprehensive survey and evaluation of prominent contemporary visualization-based methods for detecting malicious software were undertaken.This primarily encompasses encompassed the integration of visualization with machine learning and visualization combined with deep learning, each of which exhibits distinct advantages and characteristics within the domain of malware detection and classification.Consequently, the holistic consideration of several factors, such as dataset size, computational resources, time constraints, model accuracy, and implementation complexity, is necessary for the selection of detection and classification methods.In conclusion, the challenges currently faced by detection technologies are summarized, and a forward-looking perspective on future research directions in the field is provided.…”
Get full text
Article -
792
-
793
-
794
Optimized Ensemble Deep Learning for Real-Time Intrusion Detection on Resource-Constrained Raspberry Pi Devices
Published 2025-01-01“…The rapid growth of Internet of Things (IoT) networks has increased security risks, making it essential to have effective Intrusion Detection Systems (IDS) for real-time threat detection. …”
Get full text
Article -
795
SwinTCS: A Swin Transformer Approach to Compressive Sensing with Non-Local Denoising
Published 2025-04-01Get full text
Article -
796
Developing and Implementing an Artificial Intelligence (AI)-Driven System For Electricity Theft Detection
Published 2024-09-01Get full text
Article -
797
CRYPTO-RESISTANT METHODS AND RANDOM NUMBER GENERATORS IN INTERNET OF THINGS (IOT) DEVICES
Published 2022-06-01“…The analysis of technologies and circuit solutions allowed to draw the following conclusions: protection of IoT solutions includes: security of IoT network nodes and their connection to the cloud using secure protocols, ensuring confidentiality, authenticity and integrity of IoT data by cryptographic methods, attack analysis and network cryptographic stability; the initial basis for the protection of IoT solutions is the true randomness of the formed RNG sequences and used in algorithms for cryptographic transformation of information to protect it; feature of IoT devices is their heterogeneity and geographical distribution, limited computing resources and power supply, small size; The most effective (reduce power consumption and increase the generation rate) for use in IoT devices are RNG exclusively on a digital basis, which implements a three-stage process: the initial digital circuit, normalizer and random number flow generator; Autonomous Boolean networks (ABN) allow to create RNG with unique characteristics: the received numbers are really random, high speed – the number can be received in one measure, the minimum power consumption, miniature, high (up to 3 GHz) throughput of Boolean chaos; a promising area of ABN development is the use of optical logic valves for the construction of optical ABN with a bandwidth of up to 14 GHz; the classification of known classes of RNG attacks includes: direct cryptanalytic attacks, attacks based on input data, attacks based on the disclosure of the internal state of RNG, correlation attacks and special attacks; statistical test packages to evaluate RNG sequences have some limitations or shortcomings and do not replace cryptanalysis; Comparison of cryptoaccelerators with cryptographic transformation software shows their significant advantages: for AES block encryption algorithm, speeds increase by 10-20 times in 8/16-bit cryptoaccelerators and 150 times in 32-bit, growth hashing of SHA-256 in 32-bit cryptoaccelerators more than 100 times, and for the NMAS algorithm - up to 500 times. …”
Get full text
Article -
798
YOLOv8 framework for COVID-19 and pneumonia detection using synthetic image augmentation
Published 2025-05-01Get full text
Article -
799
-
800
Advancing Corn Yield Mapping in Kenya Through Transfer Learning
Published 2025-05-01Get full text
Article