Results 51 to 60 of about 147,630 (190)
A Superficial Analysis Approach for Identifying Malicious Domain Names Generated by DGA Malware
Some of the most serious security threats facing computer networks involve malware. To prevent malware-related damage, administrators must swiftly identify and remove the infected machines that may reside in their networks. However, many malware families
Akihiro Satoh +3 more
doaj +1 more source
Fuzzy Authentication using Rank Distance
Fuzzy authentication allows authentication based on the fuzzy matching of two objects, for example based on the similarity of two strings in the Hamming metric, or on the similiarity of two sets in the set difference metric.
A Cossidente +8 more
core +1 more source
Distributed PCP Theorems for Hardness of Approximation in P [PDF]
We present a new distributed model of probabilistically checkable proofs (PCP). A satisfying assignment $x \in \{0,1\}^n$ to a CNF formula $\varphi$ is shared between two parties, where Alice knows $x_1, \dots, x_{n/2}$, Bob knows $x_{n/2+1},\dots,x_n ...
Abboud, Amir +2 more
core +6 more sources
Software Library for Authorship Identification
The aim of this paper is to review some methods for text authorship attribution and to discuss the development of a software library with tools for automatic authorship attribution.
Ivan Ivanov +4 more
doaj +1 more source
Computability, Notation, and de re Knowledge of Numbers
Saul Kripke once noted that there is a tight connection between computation and de re knowledge of whatever the computation acts upon. For example, the Euclidean algorithm can produce knowledge of which number is the greatest common divisor of two ...
Stewart Shapiro +2 more
doaj +1 more source
An automated classification system based on the strings of trojan and virus families
Classifying malware correctly is an important research issue for anti-malware software producers. This paper presents an effective and efficient malware classification technique based on string information using several wellknown classification ...
Batten, Lynn +3 more
core +1 more source
A Novel String Distance Function based on Most Frequent K Characters [PDF]
This study aims to publish a novel similarity metric to increase the speed of comparison operations. Also the new metric is suitable for distance-based operations among strings.
Altun, Oguz +3 more
core +1 more source
Symmetric Keys for Lightweight Encryption Algorithms Using a Pre–Trained VGG16 Model
The main challenge within lightweight cryptographic symmetric key systems is striking a delicate balance between security and efficiency. Consequently, the key issue revolves around crafting symmetric key schemes that are both lightweight and robust ...
Ala’a Talib Khudhair +2 more
doaj +1 more source
A note on the shortest common superstring of NGS reads
The Shortest Superstring Problem (SSP) consists, for a set of strings S = {s_1,...,s_n}, to find a minimum length string that contains all s_i, 1
Braquelaire, Tristan +3 more
core +2 more sources
Random Generation Topology Coding Technique in Asymmetric Topology Encryption
The security of traditional public key cryptography algorithms depends on the difficulty of the underlying mathematical problems. Asymmetric topological encryption is a graph-dependent encryption algorithm produced to resist attacks by quantum computers ...
Jing Su, Bing Yao
doaj +1 more source

