Ôn thi
-
In this paper, we will consider 02 problems with traditional digital signature schemes. The first problem will be related to multi-target attacks, which are often considered on the family of hash-based digital signature schemes such as XMSS, HORST, and FORST that are proposed as candidates for post-quantum cryptography.
10p viyoko 01-10-2024 0 0 Download
-
In this study, we propose a method for generating mutated Windows malware against malware detection based on ensemble learning by combining GANs and RL to overcome the limitations of the MalGAN model.
15p viyoko 01-10-2024 0 0 Download
-
This paper is aimed at evaluating the efficiency of Vietnamese SMS spam detection methods on different variants of Vietnamese datasets by utilizing both traditional machine learning models and deep learning models.
8p viyoko 01-10-2024 0 0 Download
-
In this paper, we research and propose a network attack detection framework using a 2-stage classification algorithm with an Autoencoder model, integrating online stream processing technology based on Apache Kafka and Spark technology.
17p viyoko 01-10-2024 0 0 Download
-
In this paper, we conduct a survey on optimization-based approaches to dynamic CGKM, which can be divided into two categories based on logical/heuristic arguments and a rigorous mathematical optimization model.
9p viyoko 01-10-2024 0 0 Download
-
This paper addresses the problem of automatically extracting threat intelligence from unstructured text sources. We focus specifically on the possibility of multiple relations between two entities and propose a two-stage process that allows any binary classifier to be used for multiclass classification without interfering with the binary algorithm used.
9p viyoko 01-10-2024 0 0 Download
-
This work is devoted to conducting a new study for global dynamics and numerical simulation of a discrete-time computer virus propagation model, which was constructed in our recent work. By utilizing well-known results on asymptotic stability of discrete-time dynamical systems, we establish the global asymptotic stability of a unique viral equilibrium point, whereas only its local asymptotic stability was previously analyzed.
8p viyoko 01-10-2024 0 0 Download
-
In this paper, we propose an enhanced method (named FeaWAD*) that improves the data encoding strategy based on the FeaWAD network. These models require only a small fraction of anomalies for training.
9p viyoko 01-10-2024 1 0 Download
-
For this aim, we propose to study a controlled fractional network-based SCIRS (Susceptible - Carrier - Infectious - Recovered - Susceptible) malware propagation model and its stabilization problem based on fractional interconnected TakagiSugeno fuzzy system.
11p viyoko 01-10-2024 0 0 Download
-
This paper proposes a new method of representing malicious code as an image by arranging highly correlated bytes in close pixels in the image. The current research trains deep learning models on self-built datasets and compare the performance of different image representation methods.
9p viyoko 01-10-2024 1 0 Download
-
This paper proposes and implements a model combining Zalo and end-toend encryption to apply in digital transformation. The main idea is to promote the strengths of the Zalo social network to exchange information and manage work but ensure information confidentiality for both the server and man-in-the-middle attacks based on the end-to-end encryption model.
14p viyoko 01-10-2024 0 0 Download
-
This property is provided by maintaining synchronized states on each side. In our article, we will analyze the risk of desynchronizing states between parties in the Signal protocol if at least one of those parties in this protocol uses a weak random source.
8p viyoko 01-10-2024 0 0 Download
-
In this paper, we provide a security assessment for the authenticated encryption mode used in the recommendation of the Signal protocol. Furthermore, we found how tags are computed in Signal’s guidance differs slightly from the cited documentation.
8p viyoko 01-10-2024 0 0 Download
-
This paper present a high-throughput, low latency 4-pipeline stages architecture of AES with efficient throughput per resource (Mbps/slice). The proposed implementation achieves a high throughput of 105.7 Gbps with an efficiency of 31.48 Mbps/slice. In comparison to state-of-the-art works, our design surpasses the majority of existing designs in terms of throughput and latency.
9p viyoko 01-10-2024 0 0 Download
-
Regular expressions, or regexes, have become an integral part of modern software development, seamlessly woven into the fabric of countless applications. This paper explores the inherent ambiguity of regular expressions, fuzzing with static analysis and proposes a novel fuzzing technique to generate effective attack patterns.
11p viyoko 01-10-2024 0 0 Download
-
This article presents a comprehensive analysis of Denisenko's method for constructing quantum circuits for S-boxes without using ancilla qubits. We elaborate on this methodology in terms of practical aspects that can be applied to S-boxes or permutations of arbitrary sizes.
14p viyoko 01-10-2024 0 0 Download
-
In this paper, we conduct a new analysis on the complexity of the same. We also remove the restriction of using a primitive polynomial to generate the matrix by using an arbitrary monic polynomial over a finite field whose independent term is distinct from zero.
15p viyoko 01-10-2024 0 0 Download
-
This article focuses on one of the methods to improve the data processing performance of firewalls by taking advantage of the power of FPGA (Field-Programmable Gate Array) chips in analyzing packets at the network layer instead of CPU.
10p viyoko 01-10-2024 0 0 Download
-
Single-storey industrial steel frames with cranes are considered as being vertically irregular in structural configuration and load distribution under strong earthquake excitations. In this paper, various frames with their spans of 20, 26, 32 and 38 m and locations built in Hanoi and Son La regions were designed to resist dead, roof live, crane and wind loads.
12p viyoko 01-10-2024 0 0 Download
-
In this research, the smoothed finite element methods (S-FEM) based on the edge-based (ES) and node-based (NS) approaches are combined to develop for the 3-node triangular plate element which uses the mixed interpolation of tensorial components (MITC3) technique to remove the shear-locking phenomenon.
13p viyoko 01-10-2024 0 0 Download