In order to achieve better effect on blocking virus propagation, a neighbor immunization strategy was proposed and verified in this paper. On email-EU real networks and on scale-free model network, the efficiencies of...
详细信息
In the last few years, the hash functions are the very common and essential primitives implemented in lots of fields. RIPEMD-128, a member of MD-family hash function, has been found collisions on the full round. In th...
详细信息
PDF files are adopted for launching cyberattacks because of their popularity and the increasing number of relative vulnerabilities. Machine learning algorithms are developed to detect the maliciousness of PDF files. A...
详细信息
Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization syste...
详细信息
Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization system based on storage covert channel to overcome the affection of the semantic gap. Taking advantage of undetectability of the covert channel, a secure channel is established between Guest and virtual machine monitor to pass data directly. The Guest machine can pass the control information of malicious process to virtual machine monitor by using the VMCALL instruction and shared memory. By parsing critical information in process control structure, virtual machine monitor can terminate the malicious processes. The test results show that the proposed mechanism can clear the user-level malicious programs in the virtual machine effectively and covertly. Meanwhile, its performance overhead is about the same as that of other mainstream monitoring mode.
Aiming at the problem of insufficient defense ability of fingerprint detection, the anti-reconnaissance model of host fingerprint based on virtual node is proposed. The model constructs periodically reconfigurable vir...
详细信息
Traditional Relation Extraction (RE) trains individual extractors for pre-defined relations. Open Relation Extraction (ORE) can eschew domain-specific training data, tackle an unbounded number of relations, and scale ...
详细信息
At present, deep learning has achieved excellent performance in the field of network traffic classification. However, deep learning relies on massive data-driven classification models. When the data set is small, it i...
详细信息
The increasing availability of folksonomy data makes them vital for user profiling approaches to precisely detect user preferences and better understand user interests, so as to render some personalized recommendation...
详细信息
The increasing availability of folksonomy data makes them vital for user profiling approaches to precisely detect user preferences and better understand user interests, so as to render some personalized recommendation or re- trieval results. This paper presents a rigorous probabilis- tic framework to discover user preference from folkson- omy data. Furthermore, we incorporate three models into the framework with the corresponding inference methods, expectation-maximization or Gibbs sampling algorithms. The user preference is expressed through topical conditional distributions. Moreover, to demonstrate the versatility of our framework, a recommendation method is introduced to show the possible usage of our framework and evaluate the applica- bility of the engaged models. The experimental results show that, with the help of the proposed framework, the user pref- erence can be effectively discovered.
Aiming at the problem of energy imbalance and low-energy efficiency in wireless sensor network, a novel energy-balanced clustering routing algorithm based on spectral graph partition is proposed in this paper, which f...
详细信息
In the recovery of security strings in identity authentication mechanism, the combination of dictionary and string transformation rules is an effective method. However, the processing of string transformation rules fa...
详细信息
暂无评论