Results 11 to 20 of about 20,005 (219)

Flow Context and Host Behavior Based Shadowsocks’s Traffic Identification

open access: yesIEEE Access, 2019
Cloud Virtual Private Server (VPS) services provide the chance of rapid deployment of anonymous proxy services, becoming an important part of many anonymous proxy solutions.
Xuemei Zeng   +6 more
doaj   +1 more source

Multi-Wavelength Quantum Key Distribution Emulation with Physical Unclonable Function

open access: yesCryptography, 2022
This work details the theory and implementation of a multi-wavelength quantum key distribution (QKD) emulation system with a physical unclonable function (PUF).
Brit Riggs   +6 more
doaj   +1 more source

Malware Classification Based on Shallow Neural Network

open access: yesFuture Internet, 2020
The emergence of a large number of new malicious code poses a serious threat to network security, and most of them are derivative versions of existing malicious code.
Pin Yang   +4 more
doaj   +1 more source

Android Malware Familial Classification Based on DEX File Section Features

open access: yesIEEE Access, 2020
The rapid proliferation of Android malware is challenging the classification of the Android malware family. The traditional static method for classification is easily affected by the confusion and reinforcement, while the dynamic method is expensive in ...
Yong Fang   +3 more
doaj   +1 more source

A Novel Hybrid Model for Cantonese Rumor Detection on Twitter

open access: yesApplied Sciences, 2020
The development of information technology and mobile Internet has spawned the prosperity of online social networks. As the world’s largest microblogging platform, Twitter is popular among people all over the world.
Xinyu Chen   +4 more
doaj   +1 more source

Developing and evaluating cybersecurity competencies for students in computing programs [PDF]

open access: yesPeerJ Computer Science, 2022
Changes due to technological development in the workplace are putting pressure on academia to keep pace with the changing nature of work. Due to the growing need for cybersecurity professionals, universities improve their cybersecurity programs to ...
Abdullah Alammari   +2 more
doaj   +2 more sources

Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism

open access: yesIEEE Access, 2019
The phishing email is one of the significant threats in the world today and has caused tremendous financial losses. Although the methods of confrontation are continually being updated, the results of those methods are not very satisfactory at present ...
Yong Fang   +4 more
doaj   +1 more source

Unbalanced Web Phishing Classification through Deep Reinforcement Learning

open access: yesComputers, 2023
Web phishing is a form of cybercrime aimed at tricking people into visiting malicious URLs to exfiltrate sensitive data. Since the structure of a malicious URL evolves over time, phishing detection mechanisms that can adapt to such variations are ...
Antonio Maci   +3 more
doaj   +1 more source

Cross-Site Scripting Guardian: A Static XSS Detector Based on Data Stream Input-Output Association Mining

open access: yesApplied Sciences, 2020
The largest number of cybersecurity attacks is on web applications, in which Cross-Site Scripting (XSS) is the most popular way. The code audit is the main method to avoid the damage of XSS at the source code level.
Chenghao Li   +3 more
doaj   +1 more source

Analyzing and Identifying Data Breaches in Underground Forums

open access: yesIEEE Access, 2019
Recently, underground forums play a crucial role in trading and exchanging leaked personal information. Meanwhile, the forums have been gradually used as data breaches' information sources. Therefore, it shows an upward trend in announcing the results of
Yong Fang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy