首页 > 最新文献

Cybersecurity最新文献

英文 中文
Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs 基于贝叶斯攻击图的网络最优监控与攻击检测
IF 3.1 4区 计算机科学 Q1 Computer Science Pub Date : 2023-09-01 DOI: 10.1186/s42400-023-00155-y
Armita Kazeminajafabadi, Mahdi Imani
{"title":"Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs","authors":"Armita Kazeminajafabadi, Mahdi Imani","doi":"10.1186/s42400-023-00155-y","DOIUrl":"https://doi.org/10.1186/s42400-023-00155-y","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80598470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FMSA: a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems FMSA:一种基于元学习框架的针对智能网络入侵检测系统的快速模型窃取攻击技术
IF 3.1 4区 计算机科学 Q1 Computer Science Pub Date : 2023-08-04 DOI: 10.1186/s42400-023-00171-y
Kaisheng Fan, Weizhe Zhang, Guangrui Liu, Hui He
{"title":"FMSA: a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems","authors":"Kaisheng Fan, Weizhe Zhang, Guangrui Liu, Hui He","doi":"10.1186/s42400-023-00171-y","DOIUrl":"https://doi.org/10.1186/s42400-023-00171-y","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74371337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MRm-DLDet: a memory-resident malware detection framework based on memory forensics and deep neural network MRm-DLDet:基于内存取证和深度神经网络的内存驻留恶意软件检测框架
IF 3.1 4区 计算机科学 Q1 Computer Science Pub Date : 2023-08-03 DOI: 10.1186/s42400-023-00157-w
Jiaxi Liu, Yun Feng, Xinyu Liu, Jianjun Zhao, Qixu Liu
{"title":"MRm-DLDet: a memory-resident malware detection framework based on memory forensics and deep neural network","authors":"Jiaxi Liu, Yun Feng, Xinyu Liu, Jianjun Zhao, Qixu Liu","doi":"10.1186/s42400-023-00157-w","DOIUrl":"https://doi.org/10.1186/s42400-023-00157-w","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87300801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AppChainer: investigating the chainability among payloads in android applications AppChainer:研究android应用中有效负载之间的链通性
IF 3.1 4区 计算机科学 Q1 Computer Science Pub Date : 2023-08-02 DOI: 10.1186/s42400-023-00151-2
Xiaobo Xiang, Yue Jiang, Qingli Guo, Xiu Zhang, Xiaorui Gong, Baoxu Liu
{"title":"AppChainer: investigating the chainability among payloads in android applications","authors":"Xiaobo Xiang, Yue Jiang, Qingli Guo, Xiu Zhang, Xiaorui Gong, Baoxu Liu","doi":"10.1186/s42400-023-00151-2","DOIUrl":"https://doi.org/10.1186/s42400-023-00151-2","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88836935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing non-profiled side-channel attacks by time-frequency analysis 利用时频分析增强非侧信道攻击
IF 3.1 4区 计算机科学 Q1 Computer Science Pub Date : 2023-08-01 DOI: 10.1186/s42400-023-00149-w
Chengbin Jin, Yongbin Zhou
{"title":"Enhancing non-profiled side-channel attacks by time-frequency analysis","authors":"Chengbin Jin, Yongbin Zhou","doi":"10.1186/s42400-023-00149-w","DOIUrl":"https://doi.org/10.1186/s42400-023-00149-w","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86247888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient confidentiality protection solution for pub/sub system 一种高效的pub/sub系统机密保护解决方案
IF 3.1 4区 计算机科学 Q1 Computer Science Pub Date : 2023-07-04 DOI: 10.1186/s42400-023-00165-w
Jinglei Pei, Yuyang Shi, Qingling Feng, Ruisheng Shi, Lina Lan, Shui Yu, Jinqiao Shi, Zhaofeng Ma
{"title":"An efficient confidentiality protection solution for pub/sub system","authors":"Jinglei Pei, Yuyang Shi, Qingling Feng, Ruisheng Shi, Lina Lan, Shui Yu, Jinqiao Shi, Zhaofeng Ma","doi":"10.1186/s42400-023-00165-w","DOIUrl":"https://doi.org/10.1186/s42400-023-00165-w","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76907886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
NBA: defensive distillation for backdoor removal via neural behavior alignment NBA:通过神经行为对齐进行后门清除的防御蒸馏
IF 3.1 4区 计算机科学 Q1 Computer Science Pub Date : 2023-07-03 DOI: 10.1186/s42400-023-00154-z
Zonghao Ying, Bin Wu
{"title":"NBA: defensive distillation for backdoor removal via neural behavior alignment","authors":"Zonghao Ying, Bin Wu","doi":"10.1186/s42400-023-00154-z","DOIUrl":"https://doi.org/10.1186/s42400-023-00154-z","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73031348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Are our clone detectors good enough? An empirical study of code effects by obfuscation 我们的克隆探测器够好吗?混淆对代码效应的实证研究
IF 3.1 4区 计算机科学 Q1 Computer Science Pub Date : 2023-07-02 DOI: 10.1186/s42400-023-00148-x
Weihao Huang, Guozhu Meng, Chaoyang Lin, Qiucun Yan, Kai Chen, Zhuo Ma
{"title":"Are our clone detectors good enough? An empirical study of code effects by obfuscation","authors":"Weihao Huang, Guozhu Meng, Chaoyang Lin, Qiucun Yan, Kai Chen, Zhuo Ma","doi":"10.1186/s42400-023-00148-x","DOIUrl":"https://doi.org/10.1186/s42400-023-00148-x","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85959972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SkillSim: voice apps similarity detection SkillSim:语音应用相似度检测
IF 3.1 4区 计算机科学 Q1 Computer Science Pub Date : 2023-07-01 DOI: 10.1186/s42400-023-00150-3
Zhixiu Guo, Ruigang Liang, Guozhu Meng, Kai Chen
{"title":"SkillSim: voice apps similarity detection","authors":"Zhixiu Guo, Ruigang Liang, Guozhu Meng, Kai Chen","doi":"10.1186/s42400-023-00150-3","DOIUrl":"https://doi.org/10.1186/s42400-023-00150-3","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81958523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reversible data hiding based on histogram and prediction error for sharing secret data 基于直方图和预测误差的机密数据共享可逆隐藏
IF 3.1 4区 计算机科学 Q1 Computer Science Pub Date : 2023-06-02 DOI: 10.1186/s42400-023-00147-y
C. Islamy, T. Ahmad, R. Ijtihadie
{"title":"Reversible data hiding based on histogram and prediction error for sharing secret data","authors":"C. Islamy, T. Ahmad, R. Ijtihadie","doi":"10.1186/s42400-023-00147-y","DOIUrl":"https://doi.org/10.1186/s42400-023-00147-y","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76475979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cybersecurity
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1