Vulnerability Analysis and Security Assessment of Secure Keyboard Software to Prevent PS/2 Interface Keyboard Sniffing [PDF]
Online security threats have arisen through Internet banking hacking cases, and highly sensitive user information such as the ID, password, account number, and account password that is used for online payments has become vulnerable.
Kyungroul Lee, Kangbin Yim
doaj +2 more sources
Review of Visual Question Answering Technology [PDF]
Visual question answering (VQA) is a popular cross-modal task that combines natural language pro-cessing and computer vision techniques. The main objective of this task is to enable computers to intelligently recognize and retrieve visual content and ...
WANG Yu, SUN Haichun
doaj +1 more source
Malicious Encrypted Traffic Detection Integrating One-Dimensional Inception Structure and ViT [PDF]
In Internet encryption, traditional malicious traffic detection performs poorly in distinguishing encrypted traffic.To detect malicious traffic in encrypted traffic better, this paper designs a malicious encryption traffic detection model integrating a ...
SUN Yi, GAO Jian, GU Yijun
doaj +1 more source
Management on biotic stress to improve the nutmeg quality in North Moluccas, Indonesia [PDF]
Indonesia dominates about 76% of nutmeg production and export in the world, where around 28.26% is produced in North Moluccas and 24.25% of its from North Halmahera.
Assagaf Muhammad +6 more
doaj +1 more source
Node Label Classification Algorithm Based on Structural Depth Network Embedding Model [PDF]
In the era of Internet,where massive data is growing explosively,traditional algorithms have been unable to meet the needs of processing large-scale and multi type data.In recent years,the latest graph embedding algorithm has achieved excellent results ...
CHEN Shi-cong, YUAN De-yu, HUANG Shu-hua, YANG Ming
doaj +1 more source
Recent advancement in power systems induces complexity in large-scale interconnected systems and poses challenges in performing security assessment studies at various operating conditions. Traditional model-based methods are computationally intensive and
Bharat Vyakaranam +10 more
doaj +1 more source
Cyber Security Risk Assessment
The COVID-19 pandemic has accelerated the digitization of business processes, remote work/ access to sensitive data and critical corporate resources. There is a fast expansion of cloud computing services. The cybercrime follows the same trend: the sudden rise of global ransomware attacks, theft and disclosure of personal data, attacks on news sites ...
Valentin BRICEAG, Tudor BRAGARU
openaire +2 more sources
Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge [PDF]
The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture.
Ani, Uchenna +9 more
core +3 more sources
High-performance computing for static security assessment of large power systems
Contingency analysis (CA) is one of the essential tools for the optimal design and security assessment of a reliable power system. However, its computational requirements rise with the growth of distributed generations in the interconnected power system.
Venkateswara Rao Kagita +4 more
doaj +1 more source
Research on Malicious Code Family Classification Combining Attention Mechanism
In recent years, with the diversification of malicious code family and the enhancement of confounding countermeasures, traditional detection methods for malicious code are difficult to achieve good classification effect.
WANG Runzheng, GAO Jian, TONG Xin, YANG Mengqi
doaj +1 more source

