The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Online interaction behavior between web users often makes some events go viral. Popularity prediction of events is a key task in many security related applications. It forecasts how widely events would spread based on the information of evolution at an early stage. Existing methods either rely on careful feature engineering, or solely consider time series, ignoring rich information of user and text...
In this paper, we propose two dependence link addition strategies to enhance the robustness of interdependent Cyber-Physical Systems. One is based on intra-degree and receiving capability difference and the other is based on intra-degree and receiving capability ratio. Numerical simulations demonstrate that the two strategies are better than adding dependence links randomly.
Cybersecurity is a critical concern in society today. One common avenue of attack for malicious hackers is exploiting vulnerable websites. It is estimated that there are over one million websites that are attacked daily. Two emerging targets of such attacks are Supervisory Control and Data Acquisition (SCADA) devices and scientific instruments. Vulnerability assessment tools can help provide owners...
Caching query results is an efficient technique for Web search engines. A state-of-the-art approach named Static-Dynamic Cache (SDC) is widely used in practice. Replacement policy is the key factor on the performance of cache system, and has been widely studied such as LIRS, ARC, CLOCK, SKLRU and RANDOM in different research areas. In this paper, we discussed replacement policies for static-dynamic...
Motivated by recent findings that human mobility influences crime behavior in big cities and that there is a superlinear relationship between the population movement and crime, this article aims to evaluate the impact of how these findings influence police allocation. More precisely, we shed light on the differences between an allocation strategy, in which the resources are distributed by clusters...
Ransomware techniques have evolved over time with the most resilient attacks making data recovery practically impossible. This has driven countermeasures to shift towards recovery against prevention but in this paper, we model ransomware attacks from an infection vector point of view. We follow the basic infection chain of crypto ransomware and use Bayesian network statistics to infer some of the...
Malware detection has been a difficult problem for a very long time. Since the wide use of smart devices in recent years, the number of malwares is increasing rapidly. Most existing methods for malware detection rely too much on manual interventions (e.g. pre-defined features and patterns), which can be easily deceived. In this paper, we propose a novel end-to-end deep learning model to detect Android...
Given a collection of event-related documents, event ranking generates a list of ranked events based on the input query. Ranking news events, which takes event related news documents for the generation of ranked events, is both an essential research issue and important component for many security oriented applications, such as public event monitoring, retrieval, detection and mining. Previous related...
Performing port scans through Tor is a way to hide the source's IP address from the target. Researchers hoping to source their own scans benefit from a means of scanning that helps them to anonymize themselves from targets that may potentially retaliate as the result of being scanned. Though effective in providing anonymization during scanning, it is not scalable to the point of scanning the entire...
Among the most important and distinctive actionable knowledge are actionable behavioral rules (ABRs). To make ABRM a promising technique for security informatics, we develop new methodologies for it. We also conduct an experiment to validate our approach. The experimental results strongly suggest the validity of our approach.
The data hiding technique based on halftone dot features (spatial position or shape) has a special anti-copy function. However, this function has a very strict demand for image acquisition and authenticity identification. We provide a high-resolution imaging control technology of the macro mode for iPhones based on Xcode tool and ZXing Jar. At the same time, an image resolution estimation algorithm...
Online emotion diffusion is a compound process that involves interactions with multiple modalities. For instance, different behaviors influence the velocity and scale of emotion diffusion in online communities. Depicting and predicting massive online emotions helps to guide the trend of emotion evolution, thus avoiding unprecedented damages in crises. However, most existing work tries to depict and...
This paper analyzed the relationship between Networked Readiness Index and Global Competitiveness Index published by the World Economic Forum through regression model. It is verified that the global competitiveness of a country is closely related to its degree of informatization. So in the context of China's “new normal”, keeping rapid development in information technology may help China to keep the...
To assure cyber security of an enterprise, typically SIEM (Security Information and Event Management) system is in place to normalize security events from different preventive technologies and flag alerts. Analysts in the security operation center (SOC) investigate the alerts to decide if it is truly malicious or not. However, generally the number of alerts is overwhelming with majority of them being...
In the last decade, numerous fake websites have been developed on the World Wide Web to mimic trusted websites, with the aim of stealing financial assets from users and organizations. This form of online attack is called phishing, and it has cost the online community and the various stakeholders hundreds of million Dollars. Therefore, effective counter measures that can accurately detect phishing...
Public sentiment permeated through social media is usually regarded as an important measure for public opinion monitoring, policy making, and so forth. However, the deluge of user-generated content in web, especially in social platform, causes great challenge to public sentiment analysis tasks. Therefore, Web-derived Emotional Word Detection (WEWD) is proposed as a fundamental tool aims to alleviate...
DDoS attack is still one of the major threats from Internet. We propose a new technique to mitigate different types of DDoS, combining and taking advantages of both machine learning algorithms and Bloom filter. We use machine learning to extract features of attacks, then use a customized Bloom filter to defend attacks based on selected features. We implemented and tested the performance of the proposed...
This paper proposes an attack pattern mining algorithm to extract attack pattern in massive security logs. The improved fuzzy clustering algorithm is used to generate sequence set. Then PrefixSpan is used to mine frequent sequence from the sequence set. The experimental results show that this algorithm can effectively mine the attack pattern, improve the accuracy and generate more valuable attack...
The competitive perspective implied in online texts reflect people's conflicts in their stances and viewpoints. Competitive perspective identification aims to determine people's inclinations to one of multiple competitive perspectives, which is an important research issue and can facilitate many security-related applications. As the word usage of different perspectives is distinct in various topics,...
Because of the characteristics of the availability and practicability, mobile media technology had got a rapid development in the whole world. So, people now often use mobile devices through a mobile application (APP). Based on this, this study established a mobile application customer engagement model to carry on the investigation and research about mobile application of customers' recommendation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.