首页 > 最新文献

Advances in Engineering Innovation最新文献

英文 中文
Malware authorship attribution: Unmasking the culprits behind malicious software 恶意软件作者归属:揭露恶意软件背后的罪魁祸首
Pub Date : 2023-10-07 DOI: 10.54254/2977-3903/2/2023021
Harmon Lee Bruce Chia
With the digital age ushering in an unprecedented proliferation of malware, accurately attributing these malicious software variants to their original authors or affiliated groups has emerged as a crucial endeavor in cybersecurity. This study delves into the intricacies of malware authorship attribution by combining traditional analytical techniques with advanced machine learning methodologies. An integrated approach, encompassing static and dynamic analyses, yielded promising results in the challenging realm of malware attribution. Despite the encouraging outcomes, the research highlighted the multifaceted complexities involved, especially considering the sophisticated obfuscation techniques frequently employed by attackers. This paper emphasizes the merits of a holistic attribution model and underscores the importance of continuous innovation in the face of an ever-evolving threat landscape.
随着数字时代的到来,恶意软件出现了前所未有的扩散,准确地将这些恶意软件的变体归因于它们的原作者或附属组织已经成为网络安全领域的一项关键工作。本研究通过将传统分析技术与先进的机器学习方法相结合,深入研究了恶意软件作者归属的复杂性。一种集成的方法,包括静态和动态分析,在恶意软件归属的挑战性领域产生了有希望的结果。尽管取得了令人鼓舞的成果,但该研究强调了所涉及的多方面的复杂性,特别是考虑到攻击者经常使用的复杂的混淆技术。本文强调了整体归因模型的优点,并强调了在面对不断变化的威胁环境时持续创新的重要性。
{"title":"Malware authorship attribution: Unmasking the culprits behind malicious software","authors":"Harmon Lee Bruce Chia","doi":"10.54254/2977-3903/2/2023021","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023021","url":null,"abstract":"With the digital age ushering in an unprecedented proliferation of malware, accurately attributing these malicious software variants to their original authors or affiliated groups has emerged as a crucial endeavor in cybersecurity. This study delves into the intricacies of malware authorship attribution by combining traditional analytical techniques with advanced machine learning methodologies. An integrated approach, encompassing static and dynamic analyses, yielded promising results in the challenging realm of malware attribution. Despite the encouraging outcomes, the research highlighted the multifaceted complexities involved, especially considering the sophisticated obfuscation techniques frequently employed by attackers. This paper emphasizes the merits of a holistic attribution model and underscores the importance of continuous innovation in the face of an ever-evolving threat landscape.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135253767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Database security 数据库安全
Pub Date : 2023-10-07 DOI: 10.54254/2977-3903/2/2023013
Cameron Parisi, Samantha Renicker
In the modern technological tapestry, the security of database systems has burgeoned into a prominent concern for institutional frameworks. This urgency is invigorated by a dual confluence: the shifting industry paradigm which underscores the primacy of expansive data collections, coupled with the proliferation of legislative frameworks that zealously guard the sanctity of individual consumer data. The core aim of this discourse is to furnish a panoramic understanding of indispensable measures to bolster database security, with an amplified emphasis on countering SQL injection threats. The introductory segment delineates essential fortification strategies and succinctly touches upon optimal practices for shaping a database environments network topography and error mitigation methodologies. Subsequent to this panoramic insight, the discourse pivots to spotlight a diverse array of methodologies to discern and neutralize SQL injection forays.
在现代技术领域,数据库系统的安全性已迅速成为体制框架的一个突出问题。这种紧迫性是由双重汇合激发的:不断变化的行业范式强调了广泛数据收集的首要地位,加上积极保护个人消费者数据神圣性的立法框架的扩散。本演讲的核心目标是提供对增强数据库安全性的必要措施的全面理解,并进一步强调对抗SQL注入威胁。介绍部分描述了基本的防御策略,并简要介绍了塑造数据库环境、网络地形和减少错误方法的最佳实践。在这一全局性的见解之后,本文将重点介绍用于辨别和消除SQL注入攻击的各种方法。
{"title":"Database security","authors":"Cameron Parisi, Samantha Renicker","doi":"10.54254/2977-3903/2/2023013","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023013","url":null,"abstract":"In the modern technological tapestry, the security of database systems has burgeoned into a prominent concern for institutional frameworks. This urgency is invigorated by a dual confluence: the shifting industry paradigm which underscores the primacy of expansive data collections, coupled with the proliferation of legislative frameworks that zealously guard the sanctity of individual consumer data. The core aim of this discourse is to furnish a panoramic understanding of indispensable measures to bolster database security, with an amplified emphasis on countering SQL injection threats. The introductory segment delineates essential fortification strategies and succinctly touches upon optimal practices for shaping a database environments network topography and error mitigation methodologies. Subsequent to this panoramic insight, the discourse pivots to spotlight a diverse array of methodologies to discern and neutralize SQL injection forays.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135253773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Harnessing the power of federated learning to advance technology 利用联合学习的力量来推动技术进步
Pub Date : 2023-10-07 DOI: 10.54254/2977-3903/2/2023020
Harmon Lee Bruce Chia
Federated Learning (FL) has emerged as a transformative paradigm in machine learning, advocating for decentralized, privacy-preserving model training. This study provides a comprehensive evaluation of contemporary FL frameworks TensorFlow Federated (TFF), PySyft, and FedJAX across three diverse datasets: CIFAR-10, IMDb reviews, and the UCI Heart Disease dataset. Our results demonstrate TFF's superior performance on image classification tasks, while PySyft excels in both efficiency and privacy for textual data. The study underscores the potential of FL in ensuring data privacy and model performance, yet emphasizes areas warranting improvement. As the volume of edge devices escalates and the need for data privacy intensifies, refining and expanding FL frameworks become essential for future machine learning deployments.
联邦学习(FL)已经成为机器学习领域的一种变革范式,倡导去中心化、保护隐私的模型训练。本研究在三个不同的数据集(CIFAR-10、IMDb综述和UCI心脏病数据集)上对当代FL框架TensorFlow Federated (TFF)、PySyft和FedJAX进行了全面评估。我们的结果表明,TFF在图像分类任务上表现优异,而PySyft在文本数据的效率和隐私方面都表现出色。该研究强调了FL在确保数据隐私和模型性能方面的潜力,但也强调了需要改进的领域。随着边缘设备数量的增加和对数据隐私需求的增加,改进和扩展FL框架对于未来的机器学习部署至关重要。
{"title":"Harnessing the power of federated learning to advance technology","authors":"Harmon Lee Bruce Chia","doi":"10.54254/2977-3903/2/2023020","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023020","url":null,"abstract":"Federated Learning (FL) has emerged as a transformative paradigm in machine learning, advocating for decentralized, privacy-preserving model training. This study provides a comprehensive evaluation of contemporary FL frameworks TensorFlow Federated (TFF), PySyft, and FedJAX across three diverse datasets: CIFAR-10, IMDb reviews, and the UCI Heart Disease dataset. Our results demonstrate TFF's superior performance on image classification tasks, while PySyft excels in both efficiency and privacy for textual data. The study underscores the potential of FL in ensuring data privacy and model performance, yet emphasizes areas warranting improvement. As the volume of edge devices escalates and the need for data privacy intensifies, refining and expanding FL frameworks become essential for future machine learning deployments.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135253581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion detection in cybersecurity 网络安全中的入侵检测
Pub Date : 2023-10-07 DOI: 10.54254/2977-3903/2/2023014
Johnny Smithie
The ever-increasing complexity of cyber threats mandates advanced defense mechanisms. Intrusion Detection Systems (IDS) have emerged as fundamental tools in cybersecurity, incessantly monitoring networks for any suspicious activities. This paper offers an in-depth examination of IDS, tracing its evolution, methodologies, challenges, and future trajectories, substantiating the assertions with empirical studies and research.
日益复杂的网络威胁要求先进的防御机制。入侵检测系统(IDS)已经成为网络安全的基本工具,它可以不间断地监控网络中的任何可疑活动。本文对IDS进行了深入的研究,追踪了它的演变、方法、挑战和未来的轨迹,并通过实证研究证实了这些断言。
{"title":"Intrusion detection in cybersecurity","authors":"Johnny Smithie","doi":"10.54254/2977-3903/2/2023014","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023014","url":null,"abstract":"The ever-increasing complexity of cyber threats mandates advanced defense mechanisms. Intrusion Detection Systems (IDS) have emerged as fundamental tools in cybersecurity, incessantly monitoring networks for any suspicious activities. This paper offers an in-depth examination of IDS, tracing its evolution, methodologies, challenges, and future trajectories, substantiating the assertions with empirical studies and research.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135254946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social engineering 社会工程
Pub Date : 2023-10-07 DOI: 10.54254/2977-3903/2/2023016
Christine Potthas, Patrick Berry, Hamad Al-Naimi
The realm of cybersecurity is replete with challenges, not least among them being the art of social engineering. This form of attack leverages human tendencies such as trust, leading to potential breaches. Though more covert than brute force or technical hacks, social engineering can be insidiously effective. Within this exposition, we probe various manifestations of social engineering: from phishing to pretexting, baiting to tailgating, and the subtle act of shoulder surfing, concluding with mitigation strategies.
网络安全领域充满了挑战,其中最重要的是社会工程的艺术。这种形式的攻击利用了信任等人类倾向,导致潜在的破坏。尽管比暴力破解或技术黑客更隐蔽,但社会工程可能会在不知不觉中发挥作用。在本次展览中,我们探讨了社会工程的各种表现形式:从网络钓鱼到借口,诱饵到尾随,以及肩部冲浪的微妙行为,最后提出了缓解策略。
{"title":"Social engineering","authors":"Christine Potthas, Patrick Berry, Hamad Al-Naimi","doi":"10.54254/2977-3903/2/2023016","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023016","url":null,"abstract":"The realm of cybersecurity is replete with challenges, not least among them being the art of social engineering. This form of attack leverages human tendencies such as trust, leading to potential breaches. Though more covert than brute force or technical hacks, social engineering can be insidiously effective. Within this exposition, we probe various manifestations of social engineering: from phishing to pretexting, baiting to tailgating, and the subtle act of shoulder surfing, concluding with mitigation strategies.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135253575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Router forensics: Navigating the digital crossroads 路由器取证:在数字十字路口导航
Pub Date : 2023-10-07 DOI: 10.54254/2977-3903/2/2023018
Maha Nawaf
As the digital landscape continues to evolve, routers have become central gatekeepers, governing the flow of information in networks. This study delves deep into the realm of router forensics, focusing on the methodologies and techniques employed to extract and analyze forensic data from these pivotal devices. Drawing upon both traditional and contemporary approaches, our research underscores the significance of router logs, volatile data, and the challenges that arise in their forensic analysis. We highlight the pressing need for standardized forensic protocols, especially in the face of diverse router architectures and rapidly emerging cyber threats. Our study also emphasizes the potential of leveraging advanced technologies, such as machine learning, in enhancing forensic capabilities. By providing a comprehensive overview of the current state of router forensics and shedding light on potential future trajectories, this research aims to fortify the cybersecurity community's arsenal against escalating cyber threats, ensuring a more secure and resilient digital ecosystem.
随着数字领域的不断发展,路由器已经成为中央看门人,管理着网络中的信息流。本研究深入探讨了路由器取证领域,重点关注用于从这些关键设备提取和分析取证数据的方法和技术。利用传统和现代方法,我们的研究强调了路由器日志、易失性数据的重要性,以及在其取证分析中出现的挑战。我们强调了标准化取证协议的迫切需求,特别是在面对多样化的路由器架构和快速出现的网络威胁时。我们的研究还强调了利用机器学习等先进技术提高法医能力的潜力。通过对路由器取证的现状进行全面概述,并揭示潜在的未来轨迹,本研究旨在加强网络安全社区的武器库,以应对不断升级的网络威胁,确保更安全、更有弹性的数字生态系统。
{"title":"Router forensics: Navigating the digital crossroads","authors":"Maha Nawaf","doi":"10.54254/2977-3903/2/2023018","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023018","url":null,"abstract":"As the digital landscape continues to evolve, routers have become central gatekeepers, governing the flow of information in networks. This study delves deep into the realm of router forensics, focusing on the methodologies and techniques employed to extract and analyze forensic data from these pivotal devices. Drawing upon both traditional and contemporary approaches, our research underscores the significance of router logs, volatile data, and the challenges that arise in their forensic analysis. We highlight the pressing need for standardized forensic protocols, especially in the face of diverse router architectures and rapidly emerging cyber threats. Our study also emphasizes the potential of leveraging advanced technologies, such as machine learning, in enhancing forensic capabilities. By providing a comprehensive overview of the current state of router forensics and shedding light on potential future trajectories, this research aims to fortify the cybersecurity community's arsenal against escalating cyber threats, ensuring a more secure and resilient digital ecosystem.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135254939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SQL injection attacks SQL注入攻击
Pub Date : 2023-10-07 DOI: 10.54254/2977-3903/2/2023017
Jene Wrightes
SQL Injection (SQLi) attacks continue to pose significant threats to modern web applications, compromising data integrity and confidentiality. This research delves into the development and evaluation of methodologies designed to detect and mitigate these malicious attacks. Employing a diverse set of web applications, the study unfolds in a controlled environment, simulating real-world conditions to assess the effectiveness of current defense mechanisms against SQLi. Building upon this baseline, the research introduces a two-pronged defense mechanism: a Static Analysis Tool to pre-emptively identify vulnerabilities in application code and a Runtime Query Sanitizer that employs rule-based patterns and machine learning models to scrutinize and sanitize SQL queries in real-time. Performance evaluation metrics, encompassing detection rate, false positives, response time, and machine learning efficiency, are meticulously documented. Further robustness of these mechanisms is ascertained through real-world simulations involving unsuspecting users and ethical hackers. Initial results indicate promising potential for the introduced methodologies in safeguarding web applications against SQLi attacks. The study's findings serve as a critical step towards fortifying web applications, emphasizing the amalgamation of static analysis and real-time query sanitization as an effective countermeasure against SQLi threats.
SQL注入(SQLi)攻击继续对现代web应用程序构成重大威胁,危及数据完整性和机密性。本研究深入研究了用于检测和减轻这些恶意攻击的方法的开发和评估。该研究采用多种web应用程序,在受控环境中展开,模拟现实世界的条件,以评估当前针对SQLi的防御机制的有效性。在此基础上,该研究引入了一种双管齐下的防御机制:一种静态分析工具,用于先发制人地识别应用程序代码中的漏洞;一种运行时查询消毒器,采用基于规则的模式和机器学习模型来实时审查和消毒SQL查询。性能评估指标,包括检出率、误报、响应时间和机器学习效率,都被精心记录。通过涉及毫无戒心的用户和道德黑客的真实世界模拟,确定了这些机制的进一步鲁棒性。初步结果表明,所引入的方法在保护web应用程序免受SQLi攻击方面具有很大的潜力。该研究的发现是强化web应用程序的关键一步,强调将静态分析和实时查询清理合并为对抗SQLi威胁的有效对策。
{"title":"SQL injection attacks","authors":"Jene Wrightes","doi":"10.54254/2977-3903/2/2023017","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023017","url":null,"abstract":"SQL Injection (SQLi) attacks continue to pose significant threats to modern web applications, compromising data integrity and confidentiality. This research delves into the development and evaluation of methodologies designed to detect and mitigate these malicious attacks. Employing a diverse set of web applications, the study unfolds in a controlled environment, simulating real-world conditions to assess the effectiveness of current defense mechanisms against SQLi. Building upon this baseline, the research introduces a two-pronged defense mechanism: a Static Analysis Tool to pre-emptively identify vulnerabilities in application code and a Runtime Query Sanitizer that employs rule-based patterns and machine learning models to scrutinize and sanitize SQL queries in real-time. Performance evaluation metrics, encompassing detection rate, false positives, response time, and machine learning efficiency, are meticulously documented. Further robustness of these mechanisms is ascertained through real-world simulations involving unsuspecting users and ethical hackers. Initial results indicate promising potential for the introduced methodologies in safeguarding web applications against SQLi attacks. The study's findings serve as a critical step towards fortifying web applications, emphasizing the amalgamation of static analysis and real-time query sanitization as an effective countermeasure against SQLi threats.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135253760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud computing- Benefits, challenges, and promises 云计算——好处、挑战和承诺
Pub Date : 2023-10-07 DOI: 10.54254/2977-3903/2/2023019
Harmon Lee Bruce Chia
The era of cloud computing has ushered in a transformative approach to information technology, redefining the operational modalities for businesses and individuals alike. With an overwhelming shift towards Software-as-a-Service (SaaS) models, the cloud landscape is proving to be both promising and challenging. This study undertook a mixed-methods approach, surveying IT professionals and interviewing organizational leaders, to gauge the current state of cloud adoption. Our findings underscore the dominance of SaaS, with security emerging as a paramount concern. Comparative evaluations of major cloud providers further elucidate the nuances in offerings and pricing strategies. As cloud computing continues its upward trajectory, the onus is on understanding and addressing its multifaceted challenges while leveraging its myriad benefits. This paper concludes by highlighting pivotal areas for future research, encompassing hybrid cloud strategies, the amalgamation of emerging technologies, and cloud's role in Industry 4.0.
云计算时代引领了信息技术的变革,重新定义了企业和个人的运营模式。随着向软件即服务(SaaS)模式的压倒性转变,云计算的前景被证明既充满希望又充满挑战。这项研究采用了混合方法,调查了IT专业人员并采访了组织领导者,以评估云采用的当前状态。我们的研究结果强调了SaaS的主导地位,安全性正在成为最重要的问题。对主要云提供商的比较评估进一步阐明了产品和定价策略的细微差别。随着云计算的不断发展,我们有责任理解并解决其多方面的挑战,同时充分利用其巨大的优势。本文最后强调了未来研究的关键领域,包括混合云战略、新兴技术的融合以及云在工业4.0中的作用。
{"title":"Cloud computing- Benefits, challenges, and promises","authors":"Harmon Lee Bruce Chia","doi":"10.54254/2977-3903/2/2023019","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023019","url":null,"abstract":"The era of cloud computing has ushered in a transformative approach to information technology, redefining the operational modalities for businesses and individuals alike. With an overwhelming shift towards Software-as-a-Service (SaaS) models, the cloud landscape is proving to be both promising and challenging. This study undertook a mixed-methods approach, surveying IT professionals and interviewing organizational leaders, to gauge the current state of cloud adoption. Our findings underscore the dominance of SaaS, with security emerging as a paramount concern. Comparative evaluations of major cloud providers further elucidate the nuances in offerings and pricing strategies. As cloud computing continues its upward trajectory, the onus is on understanding and addressing its multifaceted challenges while leveraging its myriad benefits. This paper concludes by highlighting pivotal areas for future research, encompassing hybrid cloud strategies, the amalgamation of emerging technologies, and cloud's role in Industry 4.0.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135253766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linux security Linux安全
Pub Date : 2023-10-07 DOI: 10.54254/2977-3903/2/2023015
Gustavo Amarchand, Patrick Brown, Thomas Mahoney
Linux is an open source Operating system that is for the most part freely available to the public. Due to its customizability and cost to performance benefits Linux has quickly been adopted by users and companies alike for use in applications such as servers and workstation. As the spread of Linux continues it is important for security specialists to understand the platform and the security issues that affect the platform as well. This paper seeks to first educate the users on what the Linux platforms is and what it offers to the user or company. And it then will expand upon some common or recent vulnerabilities that Linux faces due to the way it functions. After explaining some exploits, the paper will then seek to explain some hardening solutions that are available on the platform.
Linux是一个开源的操作系统,大部分是免费提供给公众的。由于其可定制性和性能成本优势,Linux很快被用户和公司采用,用于服务器和工作站等应用程序。随着Linux的持续传播,安全专家了解平台以及影响平台的安全问题非常重要。本文首先试图让用户了解Linux平台是什么以及它为用户或公司提供了什么。然后,它将扩展到Linux由于其功能方式而面临的一些常见或最近的漏洞。在解释了一些漏洞之后,本文将试图解释平台上可用的一些强化解决方案。
{"title":"Linux security","authors":"Gustavo Amarchand, Patrick Brown, Thomas Mahoney","doi":"10.54254/2977-3903/2/2023015","DOIUrl":"https://doi.org/10.54254/2977-3903/2/2023015","url":null,"abstract":"Linux is an open source Operating system that is for the most part freely available to the public. Due to its customizability and cost to performance benefits Linux has quickly been adopted by users and companies alike for use in applications such as servers and workstation. As the spread of Linux continues it is important for security specialists to understand the platform and the security issues that affect the platform as well. This paper seeks to first educate the users on what the Linux platforms is and what it offers to the user or company. And it then will expand upon some common or recent vulnerabilities that Linux faces due to the way it functions. After explaining some exploits, the paper will then seek to explain some hardening solutions that are available on the platform.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135254945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study of issues of impact dynamics based on the SPH method 基于SPH方法的碰撞动力学问题研究
Pub Date : 2023-09-20 DOI: 10.54254/2977-3903/1/2023001
Jiawei Guo
Based on the SPH method, this paper investigates a number of key issues in shock dynamics, including the nonlinear phenomenon and its influencing factors in the propagation process of shock waves, and the process and mechanism of the interaction between shock waves and the surface of an object. Through the design of the experiments and the analysis of the results, the main conclusions and contributions of this study are drawn. At the same time, deficiencies and directions for further improvement are also pointed out, and prospects and suggestions for future research on impact dynamics are presented. This study is of great significance in promoting the research of impact dynamics.
基于SPH方法,研究了激波动力学中的一些关键问题,包括激波传播过程中的非线性现象及其影响因素,以及激波与物体表面相互作用的过程和机理。通过实验设计和结果分析,得出本研究的主要结论和贡献。同时指出了目前研究的不足之处和进一步改进的方向,并对今后的碰撞动力学研究提出了展望和建议。本研究对推动冲击动力学的研究具有重要意义。
{"title":"A study of issues of impact dynamics based on the SPH method","authors":"Jiawei Guo","doi":"10.54254/2977-3903/1/2023001","DOIUrl":"https://doi.org/10.54254/2977-3903/1/2023001","url":null,"abstract":"Based on the SPH method, this paper investigates a number of key issues in shock dynamics, including the nonlinear phenomenon and its influencing factors in the propagation process of shock waves, and the process and mechanism of the interaction between shock waves and the surface of an object. Through the design of the experiments and the analysis of the results, the main conclusions and contributions of this study are drawn. At the same time, deficiencies and directions for further improvement are also pointed out, and prospects and suggestions for future research on impact dynamics are presented. This study is of great significance in promoting the research of impact dynamics.","PeriodicalId":476183,"journal":{"name":"Advances in Engineering Innovation","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136379100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Advances in Engineering Innovation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1