Securing data
-
In recent years, landslides are taking place very seriously, and tend to increase in both scope and scale, threatening people's lives and properties. Therefore, timely detection of landslide areas is extremely important to minimize damage. In this paper, an improved algorithm for partitioning data with reliability problems using multiple fuzzifiers named as TSSFC is introduced.
9p viengfa 28-10-2024 1 1 Download
-
An embedded device is becoming popular in daily life thanks to their low power consumption and multiprocessing capability. In particular, the security of embedded devices has been a big issue of concern to academic and industrial communities. This study aims at the Grain 128- AEAD authenticated encryption with associated data algorithm embedded on low-power and resourceconstrained devices.
12p vibecca 01-10-2024 4 1 Download
-
In this paper, we research and propose a network attack detection framework using a 2-stage classification algorithm with an Autoencoder model, integrating online stream processing technology based on Apache Kafka and Spark technology.
17p viyoko 01-10-2024 3 1 Download
-
In this article, we have researched, compared and evaluated current methods for solving problems such as data augmentation, data generation via generative networks and classing importance control. Additionally, we will also provide a brief overview of existing datasets for intrusion detection in wireless networks.
12p viyoko 01-10-2024 5 1 Download
-
In this paper, we propose an enhanced method (named FeaWAD*) that improves the data encoding strategy based on the FeaWAD network. These models require only a small fraction of anomalies for training.
9p viyoko 01-10-2024 7 1 Download
-
In this paper, we propose a novel DL-based solution for web attack detection, named DL-WAD, leveraging deep learning and natural language processing techniques. Moreover, DL-WAD is designed with a data preprocessing mechanism aimed at differentiating between regular web requests and malicious ones that carry attack payloads encompassing multiple types of web attacks.
11p viyoko 01-10-2024 6 1 Download
-
This article focuses on one of the methods to improve the data processing performance of firewalls by taking advantage of the power of FPGA (Field-Programmable Gate Array) chips in analyzing packets at the network layer instead of CPU.
10p viyoko 01-10-2024 12 1 Download
-
Vietnam experiences increasing droughts throughout the dry season due to climate change, global warming, and human-caused activities like urbanization and deforestation. Drought hazard significantly impacts socioeconomic, agriculture, and the environment; it directly threatens human lives, livelihoods, food security, and environmental degradation.
13p vifaye 20-09-2024 4 1 Download
-
The data collected using purposive sampling and Slovin formula. The hypothesis of this research is tested by multiple linier regression. The research results showed that the variable site design, informative, security and communication have a partialy significant effect to the online shopping customer satisfaction, while the convenience of shopping variable is not significant. This understandable because each online store has different system and procedure that incovenience for consumers.
9p longtimenosee10 26-04-2024 6 3 Download
-
Lecture "On safety and security of information systems: Symmetric ciphers" provide students with knowledge about: Block cipher principles; Data encryption standard; Feistel cipher;... Please refer to the detailed content of the lecture!
41p hoabingan205 12-12-2022 12 5 Download
-
Cuốn "Các chương trình mẫu .NET (Visual Basic .NET, ASP.NET, .NET Framework, Data Access, Security, Networking)" giới thiệu tới người đọc các kiến thức về windows forms, security, kết hợp nhiều phần, file, web development, web services, các chủ đề cao cấp, xử lý dữ liệu. Sách gồm có 10 chủ đề lớn, phần 1 ebook sau đây gồm có các nội dung sau: Windows form, security, kết hợp nhiều phần, file, web development, web services, language. Mời các bạn cùng tham khảo để biết thêm các nội dung chi tiết.
361p runordie6 06-08-2022 27 7 Download
-
Nối tiếp các nội dung phần 1, phần 2 cuốn "Các chương trình mẫu .NET (Visual Basic .NET, ASP.NET, .NET Framework, Data Access, Security, Networking)" gồm có những nội dung chính sau: Các chủ đề cao cấp, xử lý dữ liệu, Microsoft .Net framework. Mời các bạn cùng tham khảo để biết thêm các nội dung chi tiết.
542p runordie6 06-08-2022 11 7 Download
-
This paper proposes a security framework for Internet of Things (IoT) based on blockchain. The solution provides the two features: (1) Access control for IoT devices, which allows users to pay a fee to the device’s owner to access the device for a certain period of time.
9p viaespa2711 31-07-2021 29 4 Download
-
Bài thực hành Bảo mật hệ thống thông tin số 9: Oracle Label Security (2) có nội dung trình bày về các thành phần của nhãn trong Oracle Label Security, nhãn dữ liệu (data label), cú pháp của nhãn dữ liệu,... Mời các bạn cùng tham khảo chi tiết nội dung tài liệu.
16p xusong 05-07-2021 40 6 Download
-
Research Aims: The thesis aims to develop deep neural networks for analyzing security data. These techniques improve the accuracy of machine learning-based models applied in NAD. Therefore, the thesis attempts to address the above challenging problems in NAD using models and techniques in deep neural networks. Specifically, the following problems are studied.
128p armyofthedead 23-06-2021 13 3 Download
-
Privacy-preserving frequency mining is a quite simple technique, but it is very useful in privacy-preserving machine learning and data mining. In this paper, we construct an elliptic curve analog of the ElGamal system-based protocol for privacy-preserving frequency mining in fully distributed setting.
8p tamynhan9 02-12-2020 16 2 Download
-
This paper proposes a new approach which combines different classifiers in order to make best use of each classifier. To build the new model, we evaluate the accuracy and performance (training and testing time) of three classification algorithms: ID3, Naitive Bayes and SVM.
8p tamynhan8 04-11-2020 13 3 Download
-
In this work, one of the methods deploying encryption to cipher data is represented. The primary object of this project is applying Advanced Encryption Standard (AES) in communications based Orthogonal Frequency Division Multiplexing (OFDM). This article discusses the security of the method encrypting directly QAM symbols instead of input bit-stream.
8p tamynhan6 14-09-2020 34 3 Download
-
Models representing uncertainty factors; data mining techniques; calculation methods of power systems taking into account uncertainty factors.
31p gaocaolon6 30-07-2020 21 2 Download
-
In this study, panel data analysis is performed to assess not only the Textile Sector which holds an important place in Turkish Economy but also the impact of Research and Development investments of 14 firms, competing in national and international markets in this sector with public securities traded in Istanbul Stock Exchange, on their market prices, net sales and equity capital.
8p guineverehuynh 21-06-2020 31 5 Download