Results 51 to 60 of about 147,630 (190)

A Superficial Analysis Approach for Identifying Malicious Domain Names Generated by DGA Malware

open access: yesIEEE Open Journal of the Communications Society, 2020
Some of the most serious security threats facing computer networks involve malware. To prevent malware-related damage, administrators must swiftly identify and remove the infected machines that may reside in their networks. However, many malware families
Akihiro Satoh   +3 more
doaj   +1 more source

Fuzzy Authentication using Rank Distance

open access: yes, 2017
Fuzzy authentication allows authentication based on the fuzzy matching of two objects, for example based on the similarity of two strings in the Hamming metric, or on the similiarity of two sets in the set difference metric.
A Cossidente   +8 more
core   +1 more source

Distributed PCP Theorems for Hardness of Approximation in P [PDF]

open access: yes, 1952
We present a new distributed model of probabilistically checkable proofs (PCP). A satisfying assignment $x \in \{0,1\}^n$ to a CNF formula $\varphi$ is shared between two parties, where Alice knows $x_1, \dots, x_{n/2}$, Bob knows $x_{n/2+1},\dots,x_n ...
Abboud, Amir   +2 more
core   +6 more sources

Software Library for Authorship Identification

open access: yesDigital Presentation and Preservation of Cultural and Scientific Heritage, 2015
The aim of this paper is to review some methods for text authorship attribution and to discuss the development of a software library with tools for automatic authorship attribution.
Ivan Ivanov   +4 more
doaj   +1 more source

Computability, Notation, and de re Knowledge of Numbers

open access: yesPhilosophies, 2022
Saul Kripke once noted that there is a tight connection between computation and de re knowledge of whatever the computation acts upon. For example, the Euclidean algorithm can produce knowledge of which number is the greatest common divisor of two ...
Stewart Shapiro   +2 more
doaj   +1 more source

An automated classification system based on the strings of trojan and virus families

open access: yes, 2009
Classifying malware correctly is an important research issue for anti-malware software producers. This paper presents an effective and efficient malware classification technique based on string information using several wellknown classification ...
Batten, Lynn   +3 more
core   +1 more source

A Novel String Distance Function based on Most Frequent K Characters [PDF]

open access: yes, 2014
This study aims to publish a novel similarity metric to increase the speed of comparison operations. Also the new metric is suitable for distance-based operations among strings.
Altun, Oguz   +3 more
core   +1 more source

Symmetric Keys for Lightweight Encryption Algorithms Using a Pre–Trained VGG16 Model

open access: yesTelecom
The main challenge within lightweight cryptographic symmetric key systems is striking a delicate balance between security and efficiency. Consequently, the key issue revolves around crafting symmetric key schemes that are both lightweight and robust ...
Ala’a Talib Khudhair   +2 more
doaj   +1 more source

A note on the shortest common superstring of NGS reads

open access: yes, 2016
The Shortest Superstring Problem (SSP) consists, for a set of strings S = {s_1,...,s_n}, to find a minimum length string that contains all s_i, 1
Braquelaire, Tristan   +3 more
core   +2 more sources

Random Generation Topology Coding Technique in Asymmetric Topology Encryption

open access: yesMathematics
The security of traditional public key cryptography algorithms depends on the difficulty of the underlying mathematical problems. Asymmetric topological encryption is a graph-dependent encryption algorithm produced to resist attacks by quantum computers ...
Jing Su, Bing Yao
doaj   +1 more source

Home - About - Disclaimer - Privacy