首页 > 最新文献

Journal of Cyber Security and Mobility最新文献

英文 中文
Improving Intrusion Detection in UAV Communication Using an LSTM-SMOTE Classification Method 利用LSTM-SMOTE分类方法改进无人机通信入侵检测
Q3 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/jcs.2023.042486
Abdulrahman M. Abdulghani, Mokhles M. Abdulghani, Wilbur L. Walters, Khalid H. Abed
{"title":"Improving Intrusion Detection in UAV Communication Using an LSTM-SMOTE Classification Method","authors":"Abdulrahman M. Abdulghani, Mokhles M. Abdulghani, Wilbur L. Walters, Khalid H. Abed","doi":"10.32604/jcs.2023.042486","DOIUrl":"https://doi.org/10.32604/jcs.2023.042486","url":null,"abstract":"","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79866746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CenterPicker: An Automated Cryo-EM Single-Particle Picking Method Based on Center Point Detection 中心拾取器:一种基于中心点检测的冷冻电镜单粒子自动拾取方法
Q3 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/jcs.2022.028065
Jian-quan Ouyang, Jinling Wang, Yaowu Wang, Tianming Liu
{"title":"CenterPicker: An Automated Cryo-EM Single-Particle Picking Method Based on Center Point Detection","authors":"Jian-quan Ouyang, Jinling Wang, Yaowu Wang, Tianming Liu","doi":"10.32604/jcs.2022.028065","DOIUrl":"https://doi.org/10.32604/jcs.2022.028065","url":null,"abstract":"","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87608479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning Based Image Forgery Detection Methods 基于深度学习的图像伪造检测方法
Q3 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/jcs.2022.032915
Liang Xiu-jian, Sun He
{"title":"Deep Learning Based Image Forgery Detection Methods","authors":"Liang Xiu-jian, Sun He","doi":"10.32604/jcs.2022.032915","DOIUrl":"https://doi.org/10.32604/jcs.2022.032915","url":null,"abstract":"","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85016871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Analysis for a VANET Privacy Protection Scheme VANET隐私保护方案的安全性分析
Q3 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/jcs.2022.028792
Yuzhen Liu, Xiaoliang Wang, Zhoulei Cao, Frank Jiang
{"title":"Security Analysis for a VANET Privacy Protection Scheme","authors":"Yuzhen Liu, Xiaoliang Wang, Zhoulei Cao, Frank Jiang","doi":"10.32604/jcs.2022.028792","DOIUrl":"https://doi.org/10.32604/jcs.2022.028792","url":null,"abstract":"","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76166791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Security Aspects in LoRaWAN LoRaWAN的安全问题分析
Q3 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/jcs.2022.030498
Ahmed AL-Hthlool, M. Frikha
{"title":"Analysis of Security Aspects in LoRaWAN","authors":"Ahmed AL-Hthlool, M. Frikha","doi":"10.32604/jcs.2022.030498","DOIUrl":"https://doi.org/10.32604/jcs.2022.030498","url":null,"abstract":"","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"126 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78643886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Phishing Scam Detection on Ethereum via Mining Trading Information 基于挖掘交易信息的以太坊网络钓鱼诈骗检测
Q3 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/jcs.2022.038401
Yanyu Chen, Zhangjie Fu
{"title":"Phishing Scam Detection on Ethereum via Mining Trading Information","authors":"Yanyu Chen, Zhangjie Fu","doi":"10.32604/jcs.2022.038401","DOIUrl":"https://doi.org/10.32604/jcs.2022.038401","url":null,"abstract":"","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83669202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web Tracking Domain and Possible Privacy Defending Tools: A燣iterature燫eview 网络跟踪域和可能的隐私保护工具:燣文献燫综述
Q3 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/jcs.2022.029020
Maryam Abdulaziz Saad Bubukayr, M. Frikha
{"title":"Web Tracking Domain and Possible Privacy Defending Tools: A燣iterature燫eview","authors":"Maryam Abdulaziz Saad Bubukayr, M. Frikha","doi":"10.32604/jcs.2022.029020","DOIUrl":"https://doi.org/10.32604/jcs.2022.029020","url":null,"abstract":"","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75587308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey on Visualization-Based Malware Detection 基于可视化的恶意软件检测研究进展
Q3 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/jcs.2022.033537
A. Moawad, Ahmed Ismail Ebada, Aya M. Al-Zoghby
{"title":"A Survey on Visualization-Based Malware Detection","authors":"A. Moawad, Ahmed Ismail Ebada, Aya M. Al-Zoghby","doi":"10.32604/jcs.2022.033537","DOIUrl":"https://doi.org/10.32604/jcs.2022.033537","url":null,"abstract":"","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86499761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Deployment of Network Testbed for Web Data Security Web数据安全网络试验台的设计与部署
Q3 Computer Science Pub Date : 2021-12-28 DOI: 10.13052/jcsm2245-1439.1121
Shishir K. Shandilya
In recent years, the cyber security scenario has transformed predominantly from conventional response-based security mechanisms to proactive security strategies. And this transformation is still continuing which is shifting it from proactive security strategies to cyber immunity which eliminates the cyber threats by introducing stringent and adaptive security measures. In the process of developing new security algorithms/procedures, accurate modelling and effective simulation play a vital role for the robustness and effectiveness of proposed system. It is also necessary to analyze the behaviour of proposed system against multiple types of known cyber attacks. This paper focuses on the existing network testbeds for an effective analysis and monitoring while proposing a new network testbed for examining new security concepts like cyber immunity. The proposed network testbed is designed to incorporate the methods and procedures of Nature-inspired Cyber Security to accommodate the adaptive responses against the sophisticated and ever-advancing cyber attacks. The proposed testbed provides customizable analytical tool to design, test and examine the new security algorithms through a rich set of attack scenarios. It also allows developers to design, implement, and evaluate their defensive techniques with library support.
近年来,网络安全形势已从传统的响应式安全机制向主动安全战略转变。这种转变仍在继续,即从主动安全策略转向网络免疫,通过引入严格和自适应的安全措施来消除网络威胁。在开发新的安全算法/程序的过程中,准确的建模和有效的仿真对系统的鲁棒性和有效性起着至关重要的作用。还需要分析所提出的系统对多种已知网络攻击的行为。本文主要针对现有的网络测试平台进行有效的分析和监控,同时提出了一种新的网络测试平台来检验网络免疫等新的安全概念。拟议的网络测试平台旨在整合自然启发的网络安全方法和程序,以适应针对复杂和不断发展的网络攻击的自适应响应。提出的测试平台提供了可定制的分析工具,通过丰富的攻击场景集来设计、测试和检查新的安全算法。它还允许开发人员在库支持下设计、实现和评估他们的防御技术。
{"title":"Design and Deployment of Network Testbed for Web Data Security","authors":"Shishir K. Shandilya","doi":"10.13052/jcsm2245-1439.1121","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1121","url":null,"abstract":"In recent years, the cyber security scenario has transformed predominantly from conventional response-based security mechanisms to proactive security strategies. And this transformation is still continuing which is shifting it from proactive security strategies to cyber immunity which eliminates the cyber threats by introducing stringent and adaptive security measures. In the process of developing new security algorithms/procedures, accurate modelling and effective simulation play a vital role for the robustness and effectiveness of proposed system. It is also necessary to analyze the behaviour of proposed system against multiple types of known cyber attacks. This paper focuses on the existing network testbeds for an effective analysis and monitoring while proposing a new network testbed for examining new security concepts like cyber immunity. The proposed network testbed is designed to incorporate the methods and procedures of Nature-inspired Cyber Security to accommodate the adaptive responses against the sophisticated and ever-advancing cyber attacks. The proposed testbed provides customizable analytical tool to design, test and examine the new security algorithms through a rich set of attack scenarios. It also allows developers to design, implement, and evaluate their defensive techniques with library support.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76914180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Phisher Fighter: Website Phishing Detection System Based on URL and Term Frequency-Inverse Document Frequency Values Phisher Fighter:基于URL和词频逆文档频率值的网站钓鱼检测系统
Q3 Computer Science Pub Date : 2021-11-20 DOI: 10.13052/jcsm2245-1439.1114
E. S. Vishva, D. Aju
Fundamentally, phishing is a common cybercrime that is indulged by the intruders or hackers on naive and credible individuals and make them to reveal their unique and sensitive information through fictitious websites. The primary intension of this kind of cybercrime is to gain access to the ad hominem or classified information from the recipients. The obtained data comprises of information that can very well utilized to recognize an individual. The purloined personal or sensitive information is commonly marketed in the online dark market and subsequently these information will be bought by the personal identity brigands. Depending upon the sensitivity and the importance of the stolen information, the price of a single piece of purloined information would vary from few dollars to thousands of dollars. Machine learning (ML) as well as Deep Learning (DL) are powerful methods to analyse and endeavour against these phishing attacks. A machine learning based phishing detection system is proposed to protect the website and users from such attacks. In order to optimize the results in a better way, the TF-IDF (Term Frequency-Inverse Document Frequency) value of webpages is employed within the system. ML methods such as LR (Logistic Regression), RF (Random Forest), SVM (Support Vector Machine), NB (Naive Bayes) and SGD (Stochastic Gradient Descent) are applied for training and testing the obtained dataset. Henceforth, a robust phishing website detection system is developed with 90.68% accuracy.
从根本上说,网络钓鱼是一种常见的网络犯罪,入侵者或黑客沉迷于天真可信的个人,并使他们通过虚构的网站泄露自己的独特和敏感信息。这类网络犯罪的主要意图是从接收者那里获取个人信息或机密信息。所获得的数据包括可以很好地用于识别个体的信息。被窃取的个人或敏感信息通常在网上黑市上进行营销,随后这些信息将被个人身份窃贼购买。根据被盗信息的敏感性和重要性,一条被盗信息的价格从几美元到数千美元不等。机器学习(ML)和深度学习(DL)是分析和抵御这些网络钓鱼攻击的强大方法。为了保护网站和用户免受此类攻击,提出了一种基于机器学习的网络钓鱼检测系统。为了更好地优化结果,系统中采用了网页的TF-IDF(术语频率逆文档频率)值。应用LR(Logistic Regression)、RF(Random Forest)、SVM(Support Vector Machine)、NB(Naive Bayes)和SGD(Random Gradient Descent)等ML方法对所获得的数据集进行训练和测试。此后,开发了一个强大的钓鱼网站检测系统,准确率为90.68%。
{"title":"Phisher Fighter: Website Phishing Detection System Based on URL and Term Frequency-Inverse Document Frequency Values","authors":"E. S. Vishva, D. Aju","doi":"10.13052/jcsm2245-1439.1114","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1114","url":null,"abstract":"Fundamentally, phishing is a common cybercrime that is indulged by the intruders or hackers on naive and credible individuals and make them to reveal their unique and sensitive information through fictitious websites. The primary intension of this kind of cybercrime is to gain access to the ad hominem or classified information from the recipients. The obtained data comprises of information that can very well utilized to recognize an individual. The purloined personal or sensitive information is commonly marketed in the online dark market and subsequently these information will be bought by the personal identity brigands. Depending upon the sensitivity and the importance of the stolen information, the price of a single piece of purloined information would vary from few dollars to thousands of dollars. Machine learning (ML) as well as Deep Learning (DL) are powerful methods to analyse and endeavour against these phishing attacks. A machine learning based phishing detection system is proposed to protect the website and users from such attacks. In order to optimize the results in a better way, the TF-IDF (Term Frequency-Inverse Document Frequency) value of webpages is employed within the system. ML methods such as LR (Logistic Regression), RF (Random Forest), SVM (Support Vector Machine), NB (Naive Bayes) and SGD (Stochastic Gradient Descent) are applied for training and testing the obtained dataset. Henceforth, a robust phishing website detection system is developed with 90.68% accuracy.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42488057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Journal of Cyber Security and Mobility
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1