IP geolocation technology can estimate or determine the geographical location of terminal device through IP address, which is an important basis for location-based network services. The existing IP geolocation methods...
详细信息
As quantum computing continues to advance, the complexity of control systems for superconducting qubits also increases. This paper presents a genetic algorithm (GA) approach for optimizing the control systems in quant...
详细信息
Dear editor,The issue on how to ensure the smart grid environment’s security and reliability has always been a focus in current research. The rapid expansion of the Internet of Things enables billions of smart device...
详细信息
Dear editor,The issue on how to ensure the smart grid environment’s security and reliability has always been a focus in current research. The rapid expansion of the Internet of Things enables billions of smart devices to be involved in the smart grid, such as smart meters, who play a part in monitoring and recording consumers’ power usage. The smart meter first amasses the information of energy consumption and then sends it to utility control.
Network anomaly traffic detection is an important technique for detecting intrusion activities and maintaining cyberspace security. Random forest is widely used in network anomalous traffic detection due to its good d...
详细信息
With the increasing number of cyber-attack behaviors, it has caused great harm to the contemporary society. Currently, the cyber attack behavior recognition module is usually implemented by adopting a strategy based o...
详细信息
Software vulnerability detection is crucial for maintaining the security and stability of software systems. In this paper, we propose a novel neural network model called TS-GGNN to address the problem of vulnerability...
详细信息
In recent years, the rapid development of information technology has continuously brought risks and challenges to network security. How to effectively detect and classify malicious codes and avoid serious damage to in...
详细信息
Recently, American National Institute of Standards and Technology (NIST) announced Kyber as the first KEM candidate to be standardized. The security of Kyber is based on the modular learning with errors (MLWE) problem...
详细信息
Device simulation is an important method of embedded device security analysis, due to the extensive and heterogeneous nature of the current peripherals, the existing simulation technology for peripheral simulation is ...
详细信息
The difference between real devices and virtual environments causes a low success rate of application-layer program emulation when the firmware is operating in full-system emulation during the dynamic analysis of the ...
详细信息
暂无评论