首页 > 最新文献

International Journal of Computer Networks and Communications Security最新文献

英文 中文
Structural Analysis of Enhanced Performance Organic Light Emitting Diodes (OLEDs) 高性能有机发光二极管(oled)的结构分析
Pub Date : 2020-08-30 DOI: 10.47277/ijcncs/8(9)2
We present a detailed study on structure of Organic LEDs (OLEDs) that promise flexibility and enhanced performance. Ordinary LEDs fail when it comes to need of ultra-smart size, thin, flexible smart screens and high efficiency light sources. With electroluminescent layer made of organic compounds, OLEDs promise all such features. We did a comprehensive analysis to find what structural features distinguish OLEDs from semiconductor LEDs. We found that it is the special six layered structure with organic emissive layer and delocalized charges due to weak pi bonds that enable OLEDs to perform better. We dis-cuss a few limitations related to production and life of these LEDs and suggest possible solutions to overcome these challenges. A rigorous, in-depth analysis of this structure is imperative to further comprehend the working of this device in order to make future devices cheaper and more efficient
我们提出了一个详细的研究结构有机发光二极管(oled),承诺灵活性和增强的性能。普通led无法满足超智能尺寸、超薄、柔性智能屏幕和高效光源的需求。有机发光二极管的电致发光层由有机化合物制成,具有上述所有特点。我们做了一个全面的分析,以找出哪些结构特征区分oled和半导体led。我们发现它是特殊的六层结构,具有有机发射层和由于弱pi键引起的离域电荷,使oled具有更好的性能。我们讨论了与这些led的生产和寿命相关的一些限制,并提出了克服这些挑战的可能解决方案。为了使未来的设备更便宜、更高效,对这种结构进行严格、深入的分析是必要的
{"title":"Structural Analysis of Enhanced Performance Organic Light Emitting Diodes (OLEDs)","authors":"","doi":"10.47277/ijcncs/8(9)2","DOIUrl":"https://doi.org/10.47277/ijcncs/8(9)2","url":null,"abstract":"We present a detailed study on structure of Organic LEDs (OLEDs) that promise flexibility and enhanced performance. Ordinary LEDs fail when it comes to need of ultra-smart size, thin, flexible smart screens and high efficiency light sources. With electroluminescent layer made of organic compounds, OLEDs promise all such features. We did a comprehensive analysis to find what structural features distinguish OLEDs from semiconductor LEDs. We found that it is the special six layered structure with organic emissive layer and delocalized charges due to weak pi bonds that enable OLEDs to perform better. We dis-cuss a few limitations related to production and life of these LEDs and suggest possible solutions to overcome these challenges. A rigorous, in-depth analysis of this structure is imperative to further comprehend the working of this device in order to make future devices cheaper and more efficient","PeriodicalId":265348,"journal":{"name":"International Journal of Computer Networks and Communications Security","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116682875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threat Detection using Machine/Deep Learning in IOT Environments 在物联网环境中使用机器/深度学习进行威胁检测
Pub Date : 2020-08-30 DOI: 10.47277/ijcncs/8(8)2
The quality of human life is improving day by day and IOT plays a very important role in this improvement. Everything related to internet have some security concerns. This paper aims to improve the security in IOT environments. In any of the IOT networks the unknown and knows flaws can be a backdoor for any adversary. The increase use of such environment results in the increase of zero day cyber-attacks. This paper aims to focus on different models of DL in order to predict the attacks in IOT environments. The main aim of this research is to provide a very best solution for the detection of threats in order to improve the infrastructures of IOT. In this paper different experiments has been conducted and its results has been discussed in order to provide an effective solution
人类的生活质量日益提高,物联网在其中发挥着非常重要的作用。与互联网有关的一切都有一些安全问题。本文旨在提高物联网环境下的安全性。在任何物联网网络中,未知和已知的漏洞都可能成为任何对手的后门。这种环境使用的增加导致零日网络攻击的增加。本文旨在关注不同的深度学习模型,以预测物联网环境中的攻击。本研究的主要目的是为检测威胁提供最佳解决方案,以改善物联网的基础设施。本文进行了不同的实验,并对其结果进行了讨论,以提供一个有效的解决方案
{"title":"Threat Detection using Machine/Deep Learning in IOT Environments","authors":"","doi":"10.47277/ijcncs/8(8)2","DOIUrl":"https://doi.org/10.47277/ijcncs/8(8)2","url":null,"abstract":"The quality of human life is improving day by day and IOT plays a very important role in this improvement. Everything related to internet have some security concerns. This paper aims to improve the security in IOT environments. In any of the IOT networks the unknown and knows flaws can be a backdoor for any adversary. The increase use of such environment results in the increase of zero day cyber-attacks. This paper aims to focus on different models of DL in order to predict the attacks in IOT environments. The main aim of this research is to provide a very best solution for the detection of threats in order to improve the infrastructures of IOT. In this paper different experiments has been conducted and its results has been discussed in order to provide an effective solution","PeriodicalId":265348,"journal":{"name":"International Journal of Computer Networks and Communications Security","volume":"25 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120914552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Efficient Approach of Threat Hunting Using Memory Forensics 一种使用内存取证的有效威胁搜索方法
Pub Date : 2020-05-31 DOI: 10.47277/ijcncs/8(5)1
D. Javeed, M. Khan, Ijaz Ahmad, Tahir Iqbal, Umar Mohammed Badamasi, C. Ndubuisi, Aliyu Umar
The capacity and occurrence of new cyber-attacks have shattered in recent years. Such measures have very complicated workflows and comprise multiple illegal actors and organizations. Threat hunting demonstrates the process of proactively searching through networks for threats based on zero-day attacks by repeating the hunting process again and again. Unlike threat intelligence, it uses different automated security tools to collect logs in order to provide a pattern for making new intelligence-based tools by following those logs. According to our research findings about “threat hunting tools” there’s a major flaw that the designed tools are limited to the collection of logs. It works completely on logs for generating new patterns avoiding system’s main memory. Codes written directly to memory fail this process to provide proactive hunting. To overcome this major challenge, we are proposing two distinct methods, either by generating malicious code alerts or by binding memory forensics processes with threat hunting tools to make active hunting possible
近年来,新型网络攻击的能力和发生都在急剧增加。此类措施的工作流程非常复杂,并包含多个非法行为者和组织。威胁搜索是指通过不断重复的搜索过程,在网络中主动搜索基于零日攻击的威胁。与威胁情报不同,它使用不同的自动化安全工具来收集日志,以便通过跟踪这些日志为创建新的基于智能的工具提供模式。根据我们对“威胁狩猎工具”的研究发现,设计的工具存在一个主要缺陷,即仅限于收集日志。它完全在日志上工作,以生成新的模式,避免了系统的主内存。直接写入内存的代码无法提供主动搜索。为了克服这一重大挑战,我们提出了两种不同的方法,一种是生成恶意代码警报,另一种是将内存取证过程与威胁搜索工具绑定,从而使主动搜索成为可能
{"title":"An Efficient Approach of Threat Hunting Using Memory Forensics","authors":"D. Javeed, M. Khan, Ijaz Ahmad, Tahir Iqbal, Umar Mohammed Badamasi, C. Ndubuisi, Aliyu Umar","doi":"10.47277/ijcncs/8(5)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(5)1","url":null,"abstract":"The capacity and occurrence of new cyber-attacks have shattered in recent years. Such measures have very complicated workflows and comprise multiple illegal actors and organizations. Threat hunting demonstrates the process of proactively searching through networks for threats based on zero-day attacks by repeating the hunting process again and again. Unlike threat intelligence, it uses different automated security tools to collect logs in order to provide a pattern for making new intelligence-based tools by following those logs. According to our research findings about “threat hunting tools” there’s a major flaw that the designed tools are limited to the collection of logs. It works completely on logs for generating new patterns avoiding system’s main memory. Codes written directly to memory fail this process to provide proactive hunting. To overcome this major challenge, we are proposing two distinct methods, either by generating malicious code alerts or by binding memory forensics processes with threat hunting tools to make active hunting possible","PeriodicalId":265348,"journal":{"name":"International Journal of Computer Networks and Communications Security","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117063712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
International Journal of Computer Networks and Communications Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1