Information security
-
This study was conducted. Moreover, it is shown that choosing the best Tx/Rx parameters is necessary to meet service quality requirements such as BER and transmission confidentiality. The provided findings provide insightful information about the practical considerations of deploying UWOC/ CDMA systems.
11p viengfa 28-10-2024 2 1 Download
-
In this paper, we will consider 02 problems with traditional digital signature schemes. The first problem will be related to multi-target attacks, which are often considered on the family of hash-based digital signature schemes such as XMSS, HORST, and FORST that are proposed as candidates for post-quantum cryptography.
10p viyoko 01-10-2024 2 1 Download
-
In this study, we propose a method for generating mutated Windows malware against malware detection based on ensemble learning by combining GANs and RL to overcome the limitations of the MalGAN model.
15p viyoko 01-10-2024 2 1 Download
-
This paper is aimed at evaluating the efficiency of Vietnamese SMS spam detection methods on different variants of Vietnamese datasets by utilizing both traditional machine learning models and deep learning models.
8p viyoko 01-10-2024 2 1 Download
-
In this paper, we research and propose a network attack detection framework using a 2-stage classification algorithm with an Autoencoder model, integrating online stream processing technology based on Apache Kafka and Spark technology.
17p viyoko 01-10-2024 2 1 Download
-
The paper first analyzes the two algorithms LPC and MELP and implements them on the current popular hardware technologies ARM and DSP to give an evaluation direction when choosing technology to serve the design of vocoders.
10p viyoko 01-10-2024 3 1 Download
-
In this paper, we conduct a survey on optimization-based approaches to dynamic CGKM, which can be divided into two categories based on logical/heuristic arguments and a rigorous mathematical optimization model.
9p viyoko 01-10-2024 2 1 Download
-
This paper addresses the problem of automatically extracting threat intelligence from unstructured text sources. We focus specifically on the possibility of multiple relations between two entities and propose a two-stage process that allows any binary classifier to be used for multiclass classification without interfering with the binary algorithm used.
9p viyoko 01-10-2024 2 1 Download
-
This work is devoted to conducting a new study for global dynamics and numerical simulation of a discrete-time computer virus propagation model, which was constructed in our recent work. By utilizing well-known results on asymptotic stability of discrete-time dynamical systems, we establish the global asymptotic stability of a unique viral equilibrium point, whereas only its local asymptotic stability was previously analyzed.
8p viyoko 01-10-2024 6 1 Download
-
In this article, we have researched, compared and evaluated current methods for solving problems such as data augmentation, data generation via generative networks and classing importance control. Additionally, we will also provide a brief overview of existing datasets for intrusion detection in wireless networks.
12p viyoko 01-10-2024 5 1 Download
-
In this paper, we propose an enhanced method (named FeaWAD*) that improves the data encoding strategy based on the FeaWAD network. These models require only a small fraction of anomalies for training.
9p viyoko 01-10-2024 7 1 Download
-
For this aim, we propose to study a controlled fractional network-based SCIRS (Susceptible - Carrier - Infectious - Recovered - Susceptible) malware propagation model and its stabilization problem based on fractional interconnected TakagiSugeno fuzzy system.
11p viyoko 01-10-2024 2 1 Download
-
This paper proposes a new method of representing malicious code as an image by arranging highly correlated bytes in close pixels in the image. The current research trains deep learning models on self-built datasets and compare the performance of different image representation methods.
9p viyoko 01-10-2024 3 1 Download
-
Currently, machine learning not only solves simple problems such as object classification but also machine learning is widely applied in the field of computer vision such as identification systems, object detection, and modules in the authentication system, intelligent processing algorithms such as automatic driving, chatbot, etc.
14p viyoko 01-10-2024 1 1 Download
-
In this paper, we propose a novel DL-based solution for web attack detection, named DL-WAD, leveraging deep learning and natural language processing techniques. Moreover, DL-WAD is designed with a data preprocessing mechanism aimed at differentiating between regular web requests and malicious ones that carry attack payloads encompassing multiple types of web attacks.
11p viyoko 01-10-2024 4 1 Download
-
This paper proposes and implements a model combining Zalo and end-toend encryption to apply in digital transformation. The main idea is to promote the strengths of the Zalo social network to exchange information and manage work but ensure information confidentiality for both the server and man-in-the-middle attacks based on the end-to-end encryption model.
14p viyoko 01-10-2024 3 1 Download
-
The paper presents the results of an analysis of the decrease in cryptographic strength of the most common symmetric ciphers, taking into account the development of cryptanalytic methods. The vector of the threat to the reduction of information confidentiality stored and processed in information systems in the long term has been determined.
7p viyoko 01-10-2024 4 1 Download
-
In this study, we use various features, including permission lists, API system calls, and library lists, to create a system named AnLibsXAI to classify Android malware. We experimented with six machine learning models such as Support Vector Machine (SVM), Random Forest (RF), Logistic Regression (LR), Decision Tree (DT), K-Nearest Neighbors (KNN) and Multilayer Perceptron (MLP).
12p viyoko 01-10-2024 2 1 Download
-
This property is provided by maintaining synchronized states on each side. In our article, we will analyze the risk of desynchronizing states between parties in the Signal protocol if at least one of those parties in this protocol uses a weak random source.
8p viyoko 01-10-2024 1 1 Download
-
In this paper, we provide a security assessment for the authenticated encryption mode used in the recommendation of the Signal protocol. Furthermore, we found how tags are computed in Signal’s guidance differs slightly from the cited documentation.
8p viyoko 01-10-2024 4 1 Download