نتایج جستجو برای: malicious user
تعداد نتایج: 253175 فیلتر نتایج به سال:
With the development of the Internet, many people are able share information freely, and check for information from various parts of the world in real time. Internet brought about the development of diverse industries, and its utilization is likely to increase through combination with many types of media in the future. However, the Internet also causes some problems. A computer can be infected ...
In recent years database security has become one of the major issues in computer security. Database security is concerned with preventing unauthorized and malicious access into a database. A number of mechanisms needed to defend information, such as verification, user privileges, data encryption, and auditing, are available in DBMS. In reality, malicious access of databases by unauthorized user...
We present collisions for a version of SHA-1 with modified constants, where the colliding payloads are valid binary files. Examples are given of colliding executables, archives, and images. Our malicious SHA-1 instances have round constants that differ from the original ones in only 40 bits (on average). Modified versions of cryptographic standards are typically used on closed systems (e.g., in...
In this work we expose wide-spread efforts by criminals to abuse the Chrome Web Store as a platform for distributing malicious extensions. A central component of our study is the design and implementation of WebEval, the first system that broadly identifies malicious extensions with a concrete, measurable detection rate of 96.5%. Over the last three years we detected 9,523 malicious extensions:...
This paper presents a User Cooperation Trust Model (UCTM) which not only encourages the good behavior liberally, but also punishes those minatory behaviors decisively. In this model, a malicious user will be kicked out from the network system and refused from accessing resources of the network automatically when the user's reputation is lower than some threshold.
With malware detection techniques increasingly adopting machine learning approaches, the creation of precise training sets becomes more and more important. Large data sets of realistic web traffic, correctly classified as benign or malicious are needed, not only to train classic and deep learning algorithms, but also to serve as evaluation benchmarks for existing malware detection products. Int...
The existence of malicious secondary users will bring damage to the performance of cooperative spectrum sensing and spectrum access in cognitive radio networks, so effectively curbing malicious behavior of secondary users become the key to success for cooperative spectrum sensing mechanism. Inspired by economics of repeated game theory, a trust game model and algorithm of distributed cooperativ...
The World Wide Web has become an inseparable part of millions of people who use online services e.g. online banking, online shopping, social networking, e-commerce, and store and manage user sensitive information, etc. In fact, it is a popular tool for any class of user over the Internet. Rich Web based applications are available over the World Wide Web to provide such types of services. At the...
Shilling Attack Prevention for Recommender Systems Using Social-based Clustering Tak Man Desmond Lee A Recommender System (RS) is a system that utilizes user and item information to predict the feeling of users towards unfamiliar items. Recommender Systems have become popular tools for online stores due to their usefulness in confidently recommending items to users. A popular algorithm for reco...
Cognitive radio (CR) is a facilitating technology to efficiently deal with the spectrum scarceness, and it will significantly enhance deployment of upcoming wireless transmission method. Security significant concern, although not well tackle in cognitive networks (CRN). In CR networks, this approach regard as security issue happen from primary user emulation attack (PUEA). A PUEA attacker forwa...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید