malicious相关论文
协作式感知可以提升感知精度,但也可能使系统暴露于可能存在的恶意用户的危险之下,甚至会有恶意用户对网络发起拒绝服务攻击.为此......
为提升数据挖掘技术与网络恶意行为识别准确率,研究基于大数据关联规则的网络恶意行为识别检测方法。模糊化处理网络中存在的大数......
针对P2P(Peer-to-Peer)网络中存在的恶意评价、摇摆服务等现象,提出一种基于模糊理论的Dirichlet信任评估模型。提出的模型利用模糊聚......
移动Ad hoc网络具有无线传输的介质、动态改变的拓扑、合作式的路由算法、缺乏中心监督和管理节点等特点,使得安全防御问题日益重......
The limited labeled sample data in the field of advanced security threats detection seriously restricts the effective de......
环境污染是全球范围内愈演愈烈的环境危机之一,如何以法律手段对其进行遏制与预防,是中外法律界人士一直热衷于探讨的课题。而如何......
网格环境中的信任问题是网格计算发展过程中必须解决的一个重要问题。网格节点间的行为信任具有动态性和不确定性。文章综合考虑了......
安全多方计算为保护各方的私有信息,采用安全协议来保证合作计算的顺利进行。但恶意攻击的存在,使得安全协议的复杂性较高,协议的......
针对现有无线射频识别(RFID)认证机制存在的安全缺陷,提出一种新型抗恶意攻击的RFID双向认证协议,并基于GNY逻辑给出了协议的安全......
检测未知恶性可执行体是计算机免疫系统研究中的一个重要方面,本文借鉴生物免疫系统的"异己"检测、抗体表达方式多样性等原理,结合......
随着Android平台的普及,针对Android平台的攻击也日益增强。现有的智能手机包括Android平台的研究集中在通用的基于行为模式的异常......
To solve the problem that using a single feature cannot play the role of multiple features of Android application in mal......
In this paper, we present an SEIQRS epidemic model with non-linear incidence function. The proposed model exhibits two e......
In this paper, a two step secure spectrum sensing algorithm is proposed for cognitive radio networks. In this algorithm,......
An Online Malicious Spam Email Detection System Using Resource Allocating Network with Locality Sens
In this paper, we propose a new online system that can quickly detect malicious spam emails and adapt to the changes in ......
Cognitive radio has been designed for solving the problem of spectrum scarcity by using the spectrum of primary users wh......
Improving Knowledge Based Spam Detection Methods: The Effect of Malicious Related Features in Imbala
Spam is no longer just commercial unsolicited email messages that waste our time, it consumes network traffic and mail s......
Wireless sensor networks are often used to monitor physical and environmental conditions in various regions where human ......
作为中国古代最重要的人情小说,<红楼梦>与<金瓶梅>之间有着千丝万缕的联系,<红楼梦>在各方面对<金瓶梅>都有所继承和发展,特别是......
The primary function of wireless sensor networks is to gather sensor data from the monitored area. Due to faults or mali......
In this paper, we present a malicious node detection scheme using confidence-level evaluation in a grid-based wireless s......
A federated cloud-based multi-platform Power System is presented to meet the growing challenges confronting power system......