The increase in number of people using the Internet leads to increased cyberattack *** Persistent Threats,or APTs,are among the most dangerous targeted *** attacks utilize various advanced tools and techniques for att...
详细信息
The increase in number of people using the Internet leads to increased cyberattack *** Persistent Threats,or APTs,are among the most dangerous targeted *** attacks utilize various advanced tools and techniques for attacking targets with specific *** countries with advanced technologies,like the US,Russia,the UK,and India,are susceptible to this targeted *** is a sophisticated attack that involves multiple stages and specific ***,TTP(Tools,Techniques,and Procedures)involved in the APT attack are commonly new and developed by an attacker to evade the security ***,APTs are generally implemented in multiple *** one of the stages is detected,we may apply a defense mechanism for subsequent stages,leading to the entire APT attack *** detection at the early stage of APT and the prediction of the next step in the APT kill chain are ongoing *** survey paper will provide knowledge about APT attacks and their essential *** follows the case study of known APT attacks,which will give clear information about the APT attack process—in later sections,highlighting the various detection methods defined by different researchers along with the limitations of the *** used in this article comes from the various annual reports published by security experts and blogs and information released by the enterprise networks targeted by the attack.
With its untameable and traceable properties,blockchain technology has been widely used in the field of data *** to preserve individual privacy while enabling efficient data queries is one of the primary issues with s...
详细信息
With its untameable and traceable properties,blockchain technology has been widely used in the field of data *** to preserve individual privacy while enabling efficient data queries is one of the primary issues with secure data *** this paper,we study verifiable keyword frequency(KF)queries with local differential privacy in *** the numerical and the keyword attributes are present in data objects;the latter are sensitive and require privacy ***,prior studies in blockchain have the problem of trilemma in privacy protection and are unable to handle KF *** propose an efficient framework that protects data owners’privacy on keyword attributes while enabling quick and verifiable query processing for KF *** framework computes an estimate of a keyword’s frequency and is efficient in query time and verification object(VO)size.A utility-optimized local differential privacy technique is used for privacy *** data owner adds noise locally into data based on local differential privacy so that the attacker cannot infer the owner of the keywords while keeping the difference in the probability distribution of the KF within the privacy *** propose the VB-cm tree as the authenticated data structure(ADS).The VB-cm tree combines the Verkle tree and the Count-Min sketch(CM-sketch)to lower the VO size and query *** VB-cm tree uses the vector commitment to verify the query *** fixed-size CM-sketch,which summarizes the frequency of multiple keywords,is used to estimate the KF via hashing *** conduct an extensive evaluation of the proposed *** experimental results show that compared to theMerkle B+tree,the query time is reduced by 52.38%,and the VO size is reduced by more than one order of magnitude.
Large Language Models (LLMs) have evolved into Multimodal Large Language Models (MLLMs), significantly enhancing their capabilities by integrating visual information and other types, thus aligning more closely with th...
详细信息
Images captured under severe weather conditions, such as haze and fog, suffer from image quality degradation caused by atmospheric particle diffusion. This degradation manifests as color fading, reduced contrast, and ...
详细信息
The quality of image segmentation results has a direct impact on subsequent image processing and its application. Therefore, image segmentation represents a pivotal step in image processing and recognition. A minimum ...
详细信息
Apricot detection is a prerequisite for counting and harvesting tasks. Existing algorithms face challenges in adapting to the impacts of complex environmental factors such as lighting variations, shadows, dense foliag...
详细信息
A large number of Web APIs have been released as services in mobile communications,but the service provided by a single Web API is usually *** enrich the services in mobile communications,developers have combined Web ...
详细信息
A large number of Web APIs have been released as services in mobile communications,but the service provided by a single Web API is usually *** enrich the services in mobile communications,developers have combined Web APIs and developed a new service,which is known as a *** emergence of mashups greatly increases the number of services in mobile communications,especially in mobile networks and the Internet-of-Things(IoT),and has encouraged companies and individuals to develop even more mashups,which has led to the dramatic increase in the number of *** a trend brings with it big data,such as the massive text data from the mashups themselves and continually-generated usage ***,the question of how to determine the most suitable mashups from big data has become a challenging *** this paper,we propose a mashup recommendation framework from big data in mobile networks and the *** proposed framework is driven by machine learning techniques,including neural embedding,clustering,and matrix *** employ neural embedding to learn the distributed representation of mashups and propose to use cluster analysis to learn the relationship among the *** also develop a novel Joint Matrix Factorization(JMF)model to complete the mashup recommendation task,where we design a new objective function and an optimization *** then crawl through a real-world large mashup dataset and perform *** experimental results demonstrate that our framework achieves high accuracy in mashup recommendation and performs better than all compared baselines.
The existing radio access network(RAN)is facing many challenges to meet the very strict speed and latency requirements by different mobile applications in addition to the increasing pressure to reduce operating *** an...
详细信息
The existing radio access network(RAN)is facing many challenges to meet the very strict speed and latency requirements by different mobile applications in addition to the increasing pressure to reduce operating *** and development in RAN have been accelerated to tackle these challenges and to define how next generation mobile networks should look *** role of machine learning(ML)and artificial intelligence(AI)driven innovations within the RAN domain is strengthening and attracting lots of attention to tackle many of the challenging *** this paper we surveyed RAN network base stations(BSs)clustering and its applications in the *** paper also demonstrates how to leverage community detection algorithms to understand underlying community structures within *** areas(TAs)novel framework was developed by adapting existing community detection algorithm to solve the problem of statically partitioning a set of BSs into TA according to mobility ***,live network dataset in dense urban part of Cairo is used to assess how the developed framework is used to partition this part of the network more efficiently compared to other clustering *** obtained showed that the new methodology saved up to 34.6%of inter TA signaling overhead and surpassing other conventional clustering algorithms.
Over the years, numerous optimization problems have been addressed utilizing meta-heuristic algorithms. Continuing initiatives have always been to create and develop new, practical algorithms. This work proposes a nov...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security desig...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security design defects,such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes,easily triggering prefix hijacking,path forgery,route leakage,and other BGP security ***,the traditional BGP security mechanism,relying on a public key infrastructure,faces issues like a single point of failure and a single point of *** decentralization,anti-tampering,and traceability advantages of blockchain offer new solution ideas for constructing secure and trusted inter-domain routing *** this paper,we summarize the characteristics of BGP protocol in detail,sort out the BGP security threats and their ***,we analyze the shortcomings of the traditional BGP security mechanism and comprehensively evaluate existing blockchain-based solutions to address the above problems and validate the reliability and effectiveness of blockchain-based BGP security methods in mitigating BGP security ***,we discuss the challenges posed by BGP security problems and outline prospects for future research.
暂无评论