HTTPS protocol is utilized to protect personal privacy in network communication by man-in-the-middle attacks. However, after the browser is attacked, this protection mechanism will be destroyed. This paper analyzes th...
详细信息
Sparse matrix vector multiplication is an important and commonly used computing kernel in scientific computing. Irregular arrangement of non zeros in sparse matrix leads to irregular memory access pattern, which in tu...
详细信息
We introduce a multi-view document clustering model called DMsECN (Deep Multi-structure Ensemble Clustering Network), comprising a multi-structure processor and a hybrid ensemble clustering module. Unlike existing mod...
详细信息
In recent years, a large number of malware has spread indiscriminately, which causes various significant cyberspace security incidents all over the world. Therefore, malware detection has become one of the important r...
详细信息
Digital image steganography is one of the important ways to achieve covert communication to protect users’ data privacy. Steganalysis technology is the key technology to check the security of steganography, and the e...
详细信息
In the face of increasingly serious firmware attacks, it is of great significance to analyze the vulnerability security of UEFI. This paper first introduces the commonly used trusted authentication mechanisms of UEFI....
详细信息
In this paper, we propose a SH2I2 rumor propagation model considering self-learning mechanism and echo chamber situation with Holling type II functional response in homogeneous and heterogeneous networks. Firstly, we ...
详细信息
Dynamic memory error detection technology is widely utilized in locating and mitigating memory-corruption vulnerabilities. High false negative in existing technologies impairs the effectiveness of detection, especiall...
详细信息
Today most of the moving target defense decision-making methods are based on models of a discrete dynamic game. To more accurately study network attack-defense strategies against continuous confrontations, we analyze ...
详细信息
The supply of open source and open source components is growing at an alarming rate, while vulnerabilities in open source components are everywhere. Software supply chain analysis aims to discover third-party componen...
详细信息
暂无评论