Application security
-
In recent years, landslides are taking place very seriously, and tend to increase in both scope and scale, threatening people's lives and properties. Therefore, timely detection of landslide areas is extremely important to minimize damage. In this paper, an improved algorithm for partitioning data with reliability problems using multiple fuzzifiers named as TSSFC is introduced.
9p viengfa 28-10-2024 2 2 Download
-
Using case study method in National Defense - Security Education at high schools in Ho Chi Minh city
This study examines the implementation of the case study method in teaching National Defense - Security Education in Ho Chi Minh City high schools. A survey of 50 teachers and 200 students from three high schools reveals that while the case study method has been introduced, its application remains limited, with an average score of 3.19.
10p viling 11-10-2024 1 1 Download
-
In this study, we propose a NOMA communication model combined with linear array antennas for the purpose of enhancing physical layer security. We introduce a model of 4 nodes: transmitter node S, receiver node D1, receiver node D2, eavesdropping node E.
10p viling 11-10-2024 1 1 Download
-
This paper introduces the application of artificial intelligence to build a security control software system in local military units. This software system uses state-of-the-art convolutional neural networks (CNN SOTA) for facial recognition by testing two of the best facial recognition models currently available: the FaceNet model and the VGGFace model.
8p vifilm 11-10-2024 6 1 Download
-
The main goal of the present study was to quantify the effects of water-saving regimes and fertilizer application improvement on water productivity, N-use efficiency, and yield. Furthermore, the study explored options for watersaving technologies and fertilizer application methods at the field scale to achieve yield security and reduced water use at a regional scale.
14p vibecca 01-10-2024 2 2 Download
-
For this aim, we propose to study a controlled fractional network-based SCIRS (Susceptible - Carrier - Infectious - Recovered - Susceptible) malware propagation model and its stabilization problem based on fractional interconnected TakagiSugeno fuzzy system.
11p viyoko 01-10-2024 2 1 Download
-
In this paper, we propose a novel DL-based solution for web attack detection, named DL-WAD, leveraging deep learning and natural language processing techniques. Moreover, DL-WAD is designed with a data preprocessing mechanism aimed at differentiating between regular web requests and malicious ones that carry attack payloads encompassing multiple types of web attacks.
11p viyoko 01-10-2024 7 1 Download
-
This paper proposes and implements a model combining Zalo and end-toend encryption to apply in digital transformation. The main idea is to promote the strengths of the Zalo social network to exchange information and manage work but ensure information confidentiality for both the server and man-in-the-middle attacks based on the end-to-end encryption model.
14p viyoko 01-10-2024 3 1 Download
-
Regular expressions, or regexes, have become an integral part of modern software development, seamlessly woven into the fabric of countless applications. This paper explores the inherent ambiguity of regular expressions, fuzzing with static analysis and proposes a novel fuzzing technique to generate effective attack patterns.
11p viyoko 01-10-2024 5 1 Download
-
Trong nghiên cứu này, tác giả trình bày một cách tiếp cận cải tiến CI/CD pipeline bằng cách tích hợp các công cụ an toàn thông tin được giới thiệu bởi Open Source Foundation for Application Security Project (OWASP). Ngoài ra, cũng trình bày những khía cạnh cần đánh đổi khi triển khai yếu tố an toàn thông tin vào CI/CD pipeline.
5p gaupanda051 13-09-2024 1 1 Download
-
This thesis intends to develop application-level access control models to address several major security issues in enterprise environments. The first goal is to provide simple and efficient authorization specifications to reduce the complexity of security management. The second goal is to provide dynamic access control for Web service applications. The third goal is to provide an access control framework for Semantic Web services. In this thesis, an Authorization-Function-Based Role-based Access Control (FB-RBAC) model is proposed for controlling enterprise systems at the application level.
182p runthenight07 01-03-2023 12 3 Download
-
Lecture "On safety and security of information systems: Cryptographic hash funtionns" provide students with knowledge about: Hash function; Applications of cryptographic hash functions; Simple hash functions; Requirements and security;... Please refer to the detailed content of the lecture!
22p hoabingan205 12-12-2022 13 5 Download
-
The author identifies two research gaps of this topic, respectively: (1) Understanding and evaluating the current situation of fair value application in the accounting system of securities companies in Vietnam and (2) Find out the factors affecting the application of fair value in the accounting system of securities companies in Vietnam.
27p petsematary 06-06-2021 27 5 Download
-
The human population continues to grow steadily with the shrinking resources being used for agricultural production situates great challenge against Indian agricultural system to attain food and environmental security. To counter these twin challenges in the country there is urgent need of application of modern Hi-tech technologies for enhancing the productivity and sustainability of the rice-wheat system for long term on scientific basis. Precision farming (PF) looks a win-win technology towards improving the capability of agricultural land to produce crops on sustainable basis.
10p chauchaungayxua6 26-06-2020 19 2 Download
-
Bài giảng "An toàn mạng máy tính nâng cao - Chương 6: Web application security" cung cấp cho người học các kiến thức về bảo mật ứng dụng Web, web application attack and defense. Đây là một tài liệu hữu ích dành cho các bạn sinh viên và những ai quan tâm dùng làm tài liệu học tập và nghiên cứu.
51p tieu_vu12 03-07-2018 99 15 Download
-
Module 7: Advanced application and web filtering. This module explains how application and Web filtering can be used for very specific filtering of traffic that flows through the ISA Server. The module shows how to configure application and Web filtering to provide advanced protection for the internal network.
23p nomoney2 10-02-2017 50 3 Download
-
Chapter 5 - Wireless security. After studying this chapter you will be able to understand: Wireless concepts, Securing digital cellular telephony, wireless application protocol, wireless transport layer security, hardening wireless local area networks, IEEE 802.11, wired equivalent privacy (WEP).
20p nhanmotchut_3 20-10-2016 67 4 Download
-
Lecture Security+ Certification: Chapter 9 - System hardening. The main contents of this chapter include all of the following: Disable nonessential systems, harden operating systems, harden applications, harden networks.
39p nhanmotchut_3 20-10-2016 73 5 Download
-
Lecture "Database security and auditing - Protecting data integrity and accessibility - Chapter 9: Auditing database activities" presentation of content: Audit server activities with Microsoft SQL Server 2000, audit database activities using Microsoft SQL Profiler, use SQL Server for security auditing. Mời các bạn tham khảo.
46p thangnamvoiva20 20-09-2016 78 3 Download
-
Lecture Database security and auditing - Protecting data integrity and accessibility - Chapter 8: Application Data Auditing presentation of content Create and implement Oracle triggers, create and implement SQL Server triggers, define and implement Oracle fine-grained auditing,... Mời các bạn cùng tham khảo.
37p thangnamvoiva20 20-09-2016 65 2 Download