Computer security
-
This work is devoted to conducting a new study for global dynamics and numerical simulation of a discrete-time computer virus propagation model, which was constructed in our recent work. By utilizing well-known results on asymptotic stability of discrete-time dynamical systems, we establish the global asymptotic stability of a unique viral equilibrium point, whereas only its local asymptotic stability was previously analyzed.
8p viyoko 01-10-2024 6 1 Download
-
Currently, machine learning not only solves simple problems such as object classification but also machine learning is widely applied in the field of computer vision such as identification systems, object detection, and modules in the authentication system, intelligent processing algorithms such as automatic driving, chatbot, etc.
14p viyoko 01-10-2024 1 1 Download
-
In this paper, we provide a security assessment for the authenticated encryption mode used in the recommendation of the Signal protocol. Furthermore, we found how tags are computed in Signal’s guidance differs slightly from the cited documentation.
8p viyoko 01-10-2024 4 1 Download
-
In this paper, we conduct a new analysis on the complexity of the same. We also remove the restriction of using a primitive polynomial to generate the matrix by using an arbitrary monic polynomial over a finite field whose independent term is distinct from zero.
15p viyoko 01-10-2024 5 1 Download
-
Intrusion Detection (ID) is one of the active branches in network security research field. Many technologies, such as neural networks, fuzzy logic and genetic algorithms have been applied in intrusion detection and the results are varied. In this thesis, an Artificial Immune System (AIS) based intrusion detection is explored. AIS is a bio-inspired computing paradigm that has been applied in many different areas including intrusion detection.
74p runthenight07 01-03-2023 8 2 Download
-
This thesis proposes and implements a new and novel solution on simulators and real devices to solve the mobility problem in a VPN. The new solution adds mobility support to existing L2TP/IPsec (Layer 2 Tunneling Protocol/IP Security) tunnels. The new solution tunnels Layer 2 packets between VPN clients and a VPN server without using Mobile IP, without incurring tunnel-re-establishment at handoff, without losing packets during handoff, achieves better security than current mobility solutions for VPN, and supports fast handoff in IPv4 networks.
123p runthenight07 01-03-2023 4 3 Download
-
Several studies have been carried out by optimising only the cost. They have not considered some other risk factors such as political and economic factors in their modelling. Currently, there is no generalised model available to determine the optimal sourcing locations incorporating important factors including risks in international LNG trading. In this study, 12 risk factors were taken into consideration to evaluate the risk.
125p runthenight04 02-02-2023 6 3 Download
-
Tiếp nội dung phần 1, Bài giảng Hệ điều hành mạng: Phần 2 cung cấp cho người học những kiến thức như: Quản lý đĩa và máy in; Cấu hình và quản lý các dịch vụ mạng của windows server; Hệ thống bảo mật của window server; Cấu hình windows server cho mobile computing; Sử dụng Synchronization Manager để đồng bộ hoá các file.
141p ermintrudetran 01-06-2021 43 9 Download
-
Privacy-preserving frequency mining is a quite simple technique, but it is very useful in privacy-preserving machine learning and data mining. In this paper, we construct an elliptic curve analog of the ElGamal system-based protocol for privacy-preserving frequency mining in fully distributed setting.
8p tamynhan9 02-12-2020 16 2 Download
-
In this paper, we firstly state the secure three-vector product computation problem and develop protocols called tree-vector products to solve this problem. Our protocols are developed based on some basic protocols and their security properties is validated base on the composition theorem for the semi-honest model [9]. We then use the proposed protocols to address a focus problem of privacy preserving multivariate classification.
9p tamynhan8 04-11-2020 10 1 Download
-
This paper proposes a new approach which combines different classifiers in order to make best use of each classifier. To build the new model, we evaluate the accuracy and performance (training and testing time) of three classification algorithms: ID3, Naitive Bayes and SVM.
8p tamynhan8 04-11-2020 13 3 Download
-
In this article the work of the components of information of protection tools on the occurring violations, their types and the elimination of these violations and the possible trajectory of a change over time of the functioning states of information of protection tools with a discrete time are researched.
10p lucastanguyen 01-06-2020 18 3 Download
-
Giáo trình gồm 5 chương tổng quan về bảo mật mạng, bảo mật với lọc gói IP, IPSEC, NAT, Virus và cách phòng chống. Với một số nội dung xác định những rủi ro và những mối đe dọa Computer, thiết kế Security cho các Computer, làm thế nào để tạo và quản lý Account an toàn, phân tích và thiết kế các chính sách an toàn cho Account, bảo mật với lọc gói IP, các tác động bảo mật, các bộ lọc IPSec, thiết lập NAT trên Windows Server 2003, cách thức lây lan và phòng chống virus... Mời các bạn cùng tham khảo giáo trình để tham khảo nội dung chi tiết.
38p tramvanhien 08-08-2019 145 18 Download
-
In this paper, a novel method is presented to detect spam content on the web. It is based on classification and employs an idea from biology, namely, danger theory, to guide the use of different classifiers. The evaluation of content features of WEBSPAM-UK2007 data set using 10-fold cross-validation demonstrates that this method provides high evaluation criteria in detecting web spam.
13p byphasse043256 23-03-2019 27 1 Download
-
In this paper, the authors use analytical method of explore factor analysis to determining factors that are components of the training quality (by service quality) at Lac Hong University (LHU) in Dong Nai province. This paper conducted during the period from from June 2012 to June, 2015. The exploratory factor analysis result showed that there were four factors, which included of factors following Teaching (Lecturers); Facilitie.
7p byphasse043256 23-03-2019 28 0 Download
-
In this chapter, the following content will be discussed: What operating systems do, computer-system organization, computer-system architecture, operating-system structure, operating-system operations, process management, memory management, storage management, protection and security, kernel data structures, computing environments, open-source operating systems
58p dien_vi02 07-10-2018 39 1 Download
-
Module 2: Automating an installation of Microsoft Windows XP Professional. The following topics are covered in this module: Introduction to automating an installation of Windows XP Professional; creating answer files; creating a uniqueness database file; performing an automated installation of Windows XP Professional; overview of creating and deploying an image; preparing a reference computer; creating, testing, and deploying an image; managing security settings by using security center.
42p nomoney2 10-02-2017 46 3 Download
-
Chapter 11 - Incident response. The main contents of this chapter include all of the following: Incident response overview, computer forensics defined, contemporary issues in computer forensics, forensic process, forensic tools, forensic problems, the future of computer forensics.
90p nhanmotchut_3 20-10-2016 44 5 Download
-
In this chapter, students will be able to understand: Password policies ensure that users choose effective passwords; user-level security requires a separate account for each user; in share-level security, all users access shares by using the same passwords; a firewall is a hardware or software product that protects a network from unauthorized access, using techniques such as packet filtering, NAT, or proxy servers;...
15p tangtuy08 21-04-2016 35 3 Download
-
Bài giảng chương 4 trang bị cho người học những hiểu biết về cách hiện thực và quản lý các tài khoản group và computer. Mục đích của chương này nhằm giúp người học: Hiểu mục đích của việc dùng các tài khoản group là để đơn giản hóa việc quản trị, tạo các đối tượng group dùng công cụ giao diện đồ họa cũng như dòng lệnh, quản lý các group security và các group distribution,... Mời các bạn cùng tham khảo.
50p kiepnaybinhyen_03 15-12-2015 73 6 Download