Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (61)
  • Open Access

    ARTICLE

    Research on Known Vulnerability Detection Method Based on Firmware Analysis

    Wenjing Wang1, Tengteng Zhao1, Xiaolong Li1,*, Lei Huang1, Wei Zhang1, Hui Guo2

    Journal of Cyber Security, Vol.4, No.1, pp. 1-15, 2022, DOI:10.32604/jcs.2022.026816

    Abstract At present, the network security situation is becoming more and more serious. Malicious network attacks such as computer viruses, Trojans and hacker attacks are becoming more and more rampant. National and group network attacks such as network information war and network terrorism have a serious damage to the production and life of the whole society. At the same time, with the rapid development of Internet of Things and the arrival of 5G era, IoT devices as an important part of industrial Internet system, have become an important target of infiltration attacks by hostile forces. This paper describes the challenges facing… More >

  • Open Access

    ARTICLE

    Cooperative Detection Method for DDoS Attacks Based on Blockchain

    Jieren Cheng1,2, Xinzhi Yao1,2,*, Hui Li3, Hao Lu4, Naixue Xiong5, Ping Luo1,2, Le Liu1,2, Hao Guo1,2, Wen Feng1,2

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 103-117, 2022, DOI:10.32604/csse.2022.025668

    Abstract Distributed Denial of Service (DDoS) attacks is always one of the major problems for service providers. Using blockchain to detect DDoS attacks is one of the current popular methods. However, the problems of high time overhead and cost exist in the most of the blockchain methods for detecting DDoS attacks. This paper proposes a blockchain-based collaborative detection method for DDoS attacks. First, the trained DDoS attack detection model is encrypted by the Intel Software Guard Extensions (SGX), which provides high security for uploading the DDoS attack detection model to the blockchain. Secondly, the service provider uploads the encrypted model to… More >

  • Open Access

    ARTICLE

    AMDnet: An Academic Misconduct Detection Method for Authors’ Behaviors

    Shihao Zhou1, Ziyuan Xu3,4, Jin Han1,*, Xingming Sun1,2, Yi Cao5

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5995-6009, 2022, DOI:10.32604/cmc.2022.023316

    Abstract In recent years, academic misconduct has been frequently exposed by the media, with serious impacts on the academic community. Current research on academic misconduct focuses mainly on detecting plagiarism in article content through the application of character-based and non-text element detection techniques over the entirety of a manuscript. For the most part, these techniques can only detect cases of textual plagiarism, which means that potential culprits can easily avoid discovery through clever editing and alterations of text content. In this paper, we propose an academic misconduct detection method based on scholars’ submission behaviors. The model can effectively capture the atypical… More >

  • Open Access

    ARTICLE

    Intrusion Detection Method of Internet of Things Based on Multi GBDT Feature Dimensionality Reduction and Hierarchical Traffic Detection

    Taifeng Pan*

    Journal of Quantum Computing, Vol.3, No.4, pp. 161-171, 2021, DOI:10.32604/jqc.2021.025373

    Abstract The rapid development of Internet of Things (IoT) technology has brought great convenience to people’s life. However, the security protection capability of IoT is weak and vulnerable. Therefore, more protection needs to be done for the security of IoT. The paper proposes an intrusion detection method for IoT based on multi GBDT feature reduction and hierarchical traffic detection model. Firstly, GBDT is used to filter the features of IoT traffic data sets BoT-IoT and UNSW-NB15 to reduce the traffic feature dimension. At the same time, in order to improve the reliability of feature filtering, this paper constructs multiple GBDT models… More >

  • Open Access

    REVIEW

    Dengue virus infection: A review of advances in the emerging rapid detection methods

    MUBASHIR HUSSAIN1, ZEESHAN ALI1, BIN LIU2, JIANGUO DAI1, XIAOLONG LIU1, JUNCHEN ZHU1, YONGJUN TANG1

    BIOCELL, Vol.46, No.1, pp. 61-74, 2022, DOI:10.32604/biocell.2022.016392

    Abstract Dengue virus infections are increasing worldwide generally and in Asia, Central and South America and Africa, particularly. It poses a serious threat to the children population. The rapid and accurate diagnostic systems are essentially required due to lack of effective vaccine against dengue virus and the progressive spread of the dengue virus infection. The recent progress in developing micro- and nano-fabrication techniques has led to low cost and scale down the biomedical point-of-care devices. Starting from the conventional and modern available methods for the diagnosis of dengue infection, this review examines several emerging rapid and point-of-care diagnostic devices that hold… More >

  • Open Access

    ARTICLE

    Research on Detection Method of Interest Flooding Attack in Named Data Networking

    Yabin Xu1,2,*, Peiyuan Gu2, Xiaowei Xu3

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 113-127, 2021, DOI:10.32604/iasc.2021.018895

    Abstract In order to effectively detect interest flooding attack (IFA) in Named Data Networking (NDN), this paper proposes a detection method of interest flooding attack based on chi-square test and similarity test. Firstly, it determines the detection window size based on the distribution of information name prefixes (that is information entropy) in the current network traffic. The attackers may append arbitrary random suffix to a certain prefix in the network traffic, and then send a large number of interest packets that cannot get the response. Targeted at this problem, the sensitivity of chi-square test is used to detect the change of… More >

  • Open Access

    ARTICLE

    A Fast Detection Method of Network Crime Based on User Portrait

    Yabin Xu1,2,*, Meishu Zhang2, Xiaowei Xu3

    Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 17-28, 2021, DOI:10.32604/jihpp.2021.017497

    Abstract In order to quickly and accurately find the implementer of the network crime, based on the user portrait technology, a rapid detection method for users with abnormal behaviorsis proposed. This method needs to construct the abnormal behavior rule base on various kinds of abnormal behaviors in advance, and construct the user portrait including basic attribute tags, behavior attribute tags and abnormal behavior similarity tagsfor network users who have abnormal behaviors. When a network crime occurs, firstly get the corresponding tag values in all user portraits according to the category of the network crime. Then, use the Naive Bayesian method matching… More >

  • Open Access

    ARTICLE

    An Anomaly Detection Method of Industrial Data Based on Stacking Integration

    Kunkun Wang1,2, Xianda Liu2,3,4,*

    Journal on Artificial Intelligence, Vol.3, No.1, pp. 9-19, 2021, DOI:10.32604/jai.2021.016706

    Abstract With the development of Internet technology, the computing power of data has increased, and the development of machine learning has become faster and faster. In the industrial production of industrial control systems, quality inspection and safety production of process products have always been our concern. Aiming at the low accuracy of anomaly detection in process data in industrial control system, this paper proposes an anomaly detection method based on stacking integration using the machine learning algorithm. Data are collected from the industrial site and processed by feature engineering. Principal component analysis (PCA) and integrated rule tree method are adopted to… More >

  • Open Access

    REVIEW

    Nucleus Detection on Pap Smear Images for Cervical Cancer Diagnosis: A Review Analysis

    Afiqah Halim1, Wan Azani Mustafa1,2,*, Wan Khairunizam Wan Ahmad1, Hasliza A. Rahim2, Hamzah Sakeran3

    Oncologie, Vol.23, No.1, pp. 73-88, 2021, DOI:10.32604/Oncologie.2021.015154

    Abstract Cervical cancer is a cell disease in the cervix that develops out of control in the female body. The cervix links the vagina (birth canal) with the upper section of the uterus, which can only be found in the female body. This is the second leading cause of death among women around the world. However, cervical cancer is currently one of the most preventable cancers if early detection is identified. The effect of unidentified cancer may increase the risk of death when the cell disease spreads to other parts of the female anatomy (metastasize). The Papanicolaou test is a cervical… More >

  • Open Access

    ARTICLE

    Guided Wave Based Damage Detection Method for Aircraft Composite Structures under Varying Temperatures

    Dongyue Gao1, Yunlong Ma2, Zhanjun Wu3,*, Yuebin Zheng3, Hongbo Lu1

    Structural Durability & Health Monitoring, Vol.15, No.1, pp. 23-37, 2021, DOI:10.32604/sdhm.2021.013737

    Abstract Guided waves based damage detection methods using base signals offer the advantages of simplicity of signal generation and reception, sensitivity to damage, and large area coverage; however, applications of the technology are limited by the sensitivity to environmental temperature variations. In this paper, a Spearman Damage Index-based damage diagnosis method for structural health condition monitoring under varying temperatures is presented. First, a PZT sensor-based Guided wave propagation model is proposed and employed to analyze the temperature effect. The result of the analysis shows the wave speed of the Guided wave signal has higher temperature sensitivity than the signal fluctuation features.… More >

Displaying 31-40 on page 4 of 61. Per Page