Results 11 to 20 of about 20,005 (219)
Flow Context and Host Behavior Based Shadowsocks’s Traffic Identification
Cloud Virtual Private Server (VPS) services provide the chance of rapid deployment of anonymous proxy services, becoming an important part of many anonymous proxy solutions.
Xuemei Zeng +6 more
doaj +1 more source
Multi-Wavelength Quantum Key Distribution Emulation with Physical Unclonable Function
This work details the theory and implementation of a multi-wavelength quantum key distribution (QKD) emulation system with a physical unclonable function (PUF).
Brit Riggs +6 more
doaj +1 more source
Malware Classification Based on Shallow Neural Network
The emergence of a large number of new malicious code poses a serious threat to network security, and most of them are derivative versions of existing malicious code.
Pin Yang +4 more
doaj +1 more source
Android Malware Familial Classification Based on DEX File Section Features
The rapid proliferation of Android malware is challenging the classification of the Android malware family. The traditional static method for classification is easily affected by the confusion and reinforcement, while the dynamic method is expensive in ...
Yong Fang +3 more
doaj +1 more source
A Novel Hybrid Model for Cantonese Rumor Detection on Twitter
The development of information technology and mobile Internet has spawned the prosperity of online social networks. As the world’s largest microblogging platform, Twitter is popular among people all over the world.
Xinyu Chen +4 more
doaj +1 more source
Developing and evaluating cybersecurity competencies for students in computing programs [PDF]
Changes due to technological development in the workplace are putting pressure on academia to keep pace with the changing nature of work. Due to the growing need for cybersecurity professionals, universities improve their cybersecurity programs to ...
Abdullah Alammari +2 more
doaj +2 more sources
Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism
The phishing email is one of the significant threats in the world today and has caused tremendous financial losses. Although the methods of confrontation are continually being updated, the results of those methods are not very satisfactory at present ...
Yong Fang +4 more
doaj +1 more source
Unbalanced Web Phishing Classification through Deep Reinforcement Learning
Web phishing is a form of cybercrime aimed at tricking people into visiting malicious URLs to exfiltrate sensitive data. Since the structure of a malicious URL evolves over time, phishing detection mechanisms that can adapt to such variations are ...
Antonio Maci +3 more
doaj +1 more source
The largest number of cybersecurity attacks is on web applications, in which Cross-Site Scripting (XSS) is the most popular way. The code audit is the main method to avoid the damage of XSS at the source code level.
Chenghao Li +3 more
doaj +1 more source
Analyzing and Identifying Data Breaches in Underground Forums
Recently, underground forums play a crucial role in trading and exchanging leaked personal information. Meanwhile, the forums have been gradually used as data breaches' information sources. Therefore, it shows an upward trend in announcing the results of
Yong Fang +3 more
doaj +1 more source

