نتایج جستجو برای: malicious user

تعداد نتایج: 253175  

2012
Byung-Ik Kim Jongil Jeong Hyuncheol Jeong

With the development of the Internet, many people are able share information freely, and check for information from various parts of the world in real time. Internet brought about the development of diverse industries, and its utilization is likely to increase through combination with many types of media in the future. However, the Internet also causes some problems. A computer can be infected ...

2015
Abhishek Mukherjee

In recent years database security has become one of the major issues in computer security. Database security is concerned with preventing unauthorized and malicious access into a database. A number of mechanisms needed to defend information, such as verification, user privileges, data encryption, and auditing, are available in DBMS. In reality, malicious access of databases by unauthorized user...

Journal: :IACR Cryptology ePrint Archive 2014
Ange Albertini Jean-Philippe Aumasson Maria Eichlseder Florian Mendel Martin Schläffer

We present collisions for a version of SHA-1 with modified constants, where the colliding payloads are valid binary files. Examples are given of colliding executables, archives, and images. Our malicious SHA-1 instances have round constants that differ from the original ones in only 40 bits (on average). Modified versions of cryptographic standards are typically used on closed systems (e.g., in...

2015
Nav Jagpal Eric Dingle Jean-Philippe Gravel Panayiotis Mavrommatis Niels Provos Moheeb Abu Rajab Kurt Thomas

In this work we expose wide-spread efforts by criminals to abuse the Chrome Web Store as a platform for distributing malicious extensions. A central component of our study is the design and implementation of WebEval, the first system that broadly identifies malicious extensions with a concrete, measurable detection rate of 96.5%. Over the last three years we detected 9,523 malicious extensions:...

2011
Wu Liu Hai-Xin Duan Ping Ren

This paper presents a User Cooperation Trust Model (UCTM) which not only encourages the good behavior liberally, but also punishes those minatory behaviors decisively. In this model, a malicious user will be kicked out from the network system and refused from accessing resources of the network automatically when the user's reputation is lower than some threshold.

Journal: :CoRR 2018
Johann Vierthaler Roman Kruszelnicki Julian Schütte

With malware detection techniques increasingly adopting machine learning approaches, the creation of precise training sets becomes more and more important. Large data sets of realistic web traffic, correctly classified as benign or malicious are needed, not only to train classic and deep learning algorithms, but also to serve as evaluation benchmarks for existing malware detection products. Int...

2015
Wang Zhendong Wang Huiqiang Zhu Qiang

The existence of malicious secondary users will bring damage to the performance of cooperative spectrum sensing and spectrum access in cognitive radio networks, so effectively curbing malicious behavior of secondary users become the key to success for cooperative spectrum sensing mechanism. Inspired by economics of repeated game theory, a trust game model and algorithm of distributed cooperativ...

2015
Dharmaraj Rajaram Patil J. B. Patil

The World Wide Web has become an inseparable part of millions of people who use online services e.g. online banking, online shopping, social networking, e-commerce, and store and manage user sensitive information, etc. In fact, it is a popular tool for any class of user over the Internet. Rich Web based applications are available over the World Wide Web to provide such types of services. At the...

2011
Tak Man Desmond Lee David E. Keyes Xiangliang Zhang

Shilling Attack Prevention for Recommender Systems Using Social-based Clustering Tak Man Desmond Lee A Recommender System (RS) is a system that utilizes user and item information to predict the feeling of users towards unfamiliar items. Recommender Systems have become popular tools for online stores due to their usefulness in confidently recommending items to users. A popular algorithm for reco...

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2023

Cognitive radio (CR) is a facilitating technology to efficiently deal with the spectrum scarceness, and it will significantly enhance deployment of upcoming wireless transmission method. Security significant concern, although not well tackle in cognitive networks (CRN). In CR networks, this approach regard as security issue happen from primary user emulation attack (PUEA). A PUEA attacker forwa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید