With the advent of the 4th industrial era, ICT technologies such as artificial intelligence and autonomous driving are rapidly developing. However, unlike these positive aspects, malicious hackers target IoT devices a...
详细信息
With the advent of the 4th industrial era, ICT technologies such as artificial intelligence and autonomous driving are rapidly developing. However, unlike these positive aspects, malicious hackers target IoT devices a...
详细信息
ISBN:
(纸本)9781450383042
With the advent of the 4th industrial era, ICT technologies such as artificial intelligence and autonomous driving are rapidly developing. However, unlike these positive aspects, malicious hackers target IoT devices around us using malwares such as viruses, worms, and Trojan horses to steal confidential information or prevent IoT devices from operating normally. In addition, malicious hackers are developing and using intelligent and advanced malwares so that malware cannot be easily detected. In recent years, studied/development of malware detection technology using machine learning and deep learning technologies has been conducted to detect intelligent and advanced variants of malwares. In this paper, based on the KISA Data Challenge Dataset, basic machine learning based malware detection is performed and the limitations that have occurred are analyzed.
With the rapid development of cloud computing technology,cloud services have now become a new business model for information *** cloud server provides the IT resources required by customers in a selfservice manner thr...
详细信息
With the rapid development of cloud computing technology,cloud services have now become a new business model for information *** cloud server provides the IT resources required by customers in a selfservice manner through the network,realizing business expansion and rapid ***,due to the insufficient protection of data privacy,the problem of data privacy leakage in cloud storage is threatening cloud *** address the problem,we propose BC-PECK,a data protection scheme based on blockchain and public key searchable ***,all the data is protected by the encryption *** privacy data is encrypted and stored in a cloud server,while the ciphertext index is established by a public key searchable encryption scheme and stored on the ***,based on the characteristics of trusted execution of smart contract technology,a control mechanism for data accessing and sharing is *** transaction is automatically recorded on the blockchain,which is fairer under the premise of ensuring the privacy and security of the data sharing ***,we analyzed the security and fairness of the current *** the comparison with similar schemes,we have shown the advantages of the proposed scheme.
暂无评论