LIVIVO - Das Suchportal für Lebenswissenschaften

switch to English language
Erweiterte Suche

Ihre letzten Suchen

  1. AU="Jingfeng Xue"
  2. AU="Kelliher, Christina M"
  3. AU="Busby, Marjorie G"

Suchergebnis

Treffer 1 - 8 von insgesamt 8

Suchoptionen

  1. Artikel ; Online: An empirical study of problems and evaluation of IoT malware classification label sources

    Tianwei Lei / Jingfeng Xue / Yong Wang / Thar Baker / Zequn Niu

    Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 1, Pp 101898- (2024)

    2024  

    Abstract: With the proliferation of malware on IoT devices, research on IoT malicious code has also become more mature. Most studies use learning models to detect or classify malware. Therefore, ensuring high-quality labels for malware samples is crucial to ... ...

    Abstract With the proliferation of malware on IoT devices, research on IoT malicious code has also become more mature. Most studies use learning models to detect or classify malware. Therefore, ensuring high-quality labels for malware samples is crucial to maintaining research accuracy. Researchers typically submit malware samples to Anti-Virus (AV) engines to obtain labels, but different engines have varying rules for detecting maliciousness and variants. This study aims to improve future IoT malware research accuracy by investigating label quality. We address three label-related issues, including Anti-Virus detection technology, naming rules, and label expiration. Additionally, we examine multiple sources of malware labels, including 63 studies on IoT, Windows, and Android malware, as well as commonly used tools such as AVClass and Anti-Virus engines. To evaluate and recommend label sources, we construct classification models using an IoT malware dataset obtained from VirusShare, which is labeled with common tools and Anti-Virus engines and classified based on ELF features. For family classification, we investigate four methods and tools, and for variant hierarchy classification, we compare label overlaps with sample clustering from 12 Anti-Virus engines. Based on our findings, we recommend AVClass for obtaining labels for IoT family classification. For small-scale malware families at the variant level, we recommend using the labels from Ad-Aware, BitDefender, and Emsisoft engines. For large-scale malware families, we advise employing labels from Jiangmin, NANO-Antivirus, and Avira engines, serving as a valuable guide for future IoT malware research.
    Schlagwörter Malware classification ; Malware label ; IoT malware analysis ; Anti-Virus engine label ; Label tool ; Electronic computers. Computer science ; QA75.5-76.95
    Thema/Rubrik (Code) 006
    Sprache Englisch
    Erscheinungsdatum 2024-01-01T00:00:00Z
    Verlag Elsevier
    Dokumenttyp Artikel ; Online
    Datenquelle BASE - Bielefeld Academic Search Engine (Lebenswissenschaftliche Auswahl)

    Zusatzmaterialien

    Kategorien

  2. Artikel ; Online: Strain Transfer Characteristic of a Fiber Bragg Grating Sensor Bonded to the Surface of Carbon Fiber Reinforced Polymer Laminates

    Zhongyu Wang / Hongyang Li / Li Zhang / Jingfeng Xue

    Applied Sciences, Vol 8, Iss 7, p

    2018  Band 1171

    Abstract: Structural health monitoring is of great importance for the application of composites in aircrafts. Fiber Bragg grating (FBG) sensors are very suitable for structure strain measurement. However, the strain measured by FBG sensors is different from the ... ...

    Abstract Structural health monitoring is of great importance for the application of composites in aircrafts. Fiber Bragg grating (FBG) sensors are very suitable for structure strain measurement. However, the strain measured by FBG sensors is different from the original strain in host materials. The relationship between them is defined as strain transfer. As composites are anisotropic, the traditional strain transfer model, which regards the elasticity modulus of host materials as a constant, is inadaptable. In this paper, a new strain transfer model is proposed for FBG sensors bonded to the surface of carbon fiber reinforced polymer (CFRP) laminates. Based on the measurement structure, the model is established and the transfer function is derived. The characteristics influencing the strain transfer are analyzed. The stacking directions, stacking numbers, and stacking sequences of CFRP laminates have a distinct effect on the transfer efficiency, which is different from the isotropy host materials. The accuracy of the proposed model was verified by experiments on a nondestructive tensile system, and the maximum model error is less than 0.5%. Moreover, the model was applied to the strain measurement of CFRP wing skin, which indicates that measurement errors decrease by 11.6% to 19.8% after the compensation according to the model.
    Schlagwörter strain transfer ; fiber Bragg grating (FBG) ; carbon fiber reinforced polymer (CFRP) ; wing skin ; Technology ; T ; Engineering (General). Civil engineering (General) ; TA1-2040 ; Biology (General) ; QH301-705.5 ; Physics ; QC1-999 ; Chemistry ; QD1-999
    Thema/Rubrik (Code) 621
    Sprache Englisch
    Erscheinungsdatum 2018-07-01T00:00:00Z
    Verlag MDPI AG
    Dokumenttyp Artikel ; Online
    Datenquelle BASE - Bielefeld Academic Search Engine (Lebenswissenschaftliche Auswahl)

    Zusatzmaterialien

    Kategorien

  3. Artikel ; Online: Defending Application Layer DDoS Attacks via Multidimensional Parallelotope

    Xiaolin Zhao / Hui Peng / Xiang Li / Yue Li / Jingfeng Xue / Yaoyuan Liang / Mingzhe Pei

    Security and Communication Networks, Vol

    2020  Band 2020

    Abstract: The Internet is more and more integrated into people’s life; because of the complexity and fragility of the network environment, network attack presents a more and more serious trend. Application Layer DDoS (AL-DDoS) attack is the most complex form of ... ...

    Abstract The Internet is more and more integrated into people’s life; because of the complexity and fragility of the network environment, network attack presents a more and more serious trend. Application Layer DDoS (AL-DDoS) attack is the most complex form of DDoS attack, which is hindering the availability for the legitimate users by taking up a large number of requests of web server. The paper introduced the concept of behavior utility to portray the network. The concept of attack and defense utility was defined by a specific property which was the manifestation of the network risk after the offset of attack and defense. In the utility model, traffic metrics were mapped to the multidimensional parallelotope in the Euclidean space to express as a diagonal matrix. To determine the threshold status, the defense strategies of load balancing and limiting the maximum number of connections were used with different attack scales. Finally, the attack and defense utility value was calculated to evaluate the network risk level. The proposed method can master the capacity of network system against each attack means and the defense capability of network system. Its availability and accuracy are verified by comparing with the relevant works.
    Schlagwörter Technology (General) ; T1-995 ; Science (General) ; Q1-390
    Thema/Rubrik (Code) 303
    Sprache Englisch
    Erscheinungsdatum 2020-01-01T00:00:00Z
    Verlag Hindawi-Wiley
    Dokumenttyp Artikel ; Online
    Datenquelle BASE - Bielefeld Academic Search Engine (Lebenswissenschaftliche Auswahl)

    Zusatzmaterialien

    Kategorien

  4. Artikel ; Online: An Approach for Internal Network Security Metric Based on Attack Probability

    Chun Shan / Benfu Jiang / Jingfeng Xue / Fang Guan / Na Xiao

    Security and Communication Networks, Vol

    2018  Band 2018

    Abstract: A network security metric may provide quantifiable evidence to assist security practitioners in securing computer networks. However, research on security metrics based on attack graph is not applicable to the characteristics of internal attack; therefore ...

    Abstract A network security metric may provide quantifiable evidence to assist security practitioners in securing computer networks. However, research on security metrics based on attack graph is not applicable to the characteristics of internal attack; therefore we propose an internal network security metric method based on attack probability. Our approach has the following benefits: it provides the method of attack graph simplification with monitoring event node which could solve the attack graph exponential growth with the network size, while undermining the disguise of internal attacks and improving the efficiency of the entire method; the method of attack probability calculation based on simplified attack graph can simplify the complexity of internal attacks and improve the accuracy of the approach.
    Schlagwörter Technology (General) ; T1-995 ; Science (General) ; Q1-390
    Sprache Englisch
    Erscheinungsdatum 2018-01-01T00:00:00Z
    Verlag Hindawi-Wiley
    Dokumenttyp Artikel ; Online
    Datenquelle BASE - Bielefeld Academic Search Engine (Lebenswissenschaftliche Auswahl)

    Zusatzmaterialien

    Kategorien

  5. Artikel ; Online: An Improved WiFi Indoor Positioning Algorithm by Weighted Fusion

    Rui Ma / Qiang Guo / Changzhen Hu / Jingfeng Xue

    Sensors, Vol 15, Iss 9, Pp 21824-

    2015  Band 21843

    Abstract: The rapid development of mobile Internet has offered the opportunity for WiFi indoor positioning to come under the spotlight due to its low cost. However, nowadays the accuracy of WiFi indoor positioning cannot meet the demands of practical applications. ...

    Abstract The rapid development of mobile Internet has offered the opportunity for WiFi indoor positioning to come under the spotlight due to its low cost. However, nowadays the accuracy of WiFi indoor positioning cannot meet the demands of practical applications. To solve this problem, this paper proposes an improved WiFi indoor positioning algorithm by weighted fusion. The proposed algorithm is based on traditional location fingerprinting algorithms and consists of two stages: the offline acquisition and the online positioning. The offline acquisition process selects optimal parameters to complete the signal acquisition, and it forms a database of fingerprints by error classification and handling. To further improve the accuracy of positioning, the online positioning process first uses a pre-match method to select the candidate fingerprints to shorten the positioning time. After that, it uses the improved Euclidean distance and the improved joint probability to calculate two intermediate results, and further calculates the final result from these two intermediate results by weighted fusion. The improved Euclidean distance introduces the standard deviation of WiFi signal strength to smooth the WiFi signal fluctuation and the improved joint probability introduces the logarithmic calculation to reduce the difference between probability values. Comparing the proposed algorithm, the Euclidean distance based WKNN algorithm and the joint probability algorithm, the experimental results indicate that the proposed algorithm has higher positioning accuracy.
    Schlagwörter WiFi indoor positioning ; location fingerprinting algorithm ; weighted fusion ; Technology (General) ; T1-995 ; Technology ; T ; Analytical chemistry ; QD71-142 ; Chemistry ; QD1-999 ; Science ; Q
    Thema/Rubrik (Code) 629
    Sprache Englisch
    Erscheinungsdatum 2015-08-01T00:00:00Z
    Verlag MDPI AG
    Dokumenttyp Artikel ; Online
    Datenquelle BASE - Bielefeld Academic Search Engine (Lebenswissenschaftliche Auswahl)

    Zusatzmaterialien

    Kategorien

  6. Artikel ; Online: An Imbalanced Malicious Domains Detection Method Based on Passive DNS Traffic Analysis

    Zhenyan Liu / Yifei Zeng / Pengfei Zhang / Jingfeng Xue / Ji Zhang / Jiangtao Liu

    Security and Communication Networks, Vol

    2018  Band 2018

    Abstract: Although existing malicious domains detection techniques have shown great success in many real-world applications, the problem of learning from imbalanced data is rarely concerned with this day. But the actual DNS traffic is inherently imbalanced; thus ... ...

    Abstract Although existing malicious domains detection techniques have shown great success in many real-world applications, the problem of learning from imbalanced data is rarely concerned with this day. But the actual DNS traffic is inherently imbalanced; thus how to build malicious domains detection model oriented to imbalanced data is a very important issue worthy of study. This paper proposes a novel imbalanced malicious domains detection method based on passive DNS traffic analysis, which can effectively deal with not only the between-class imbalance problem but also the within-class imbalance problem. The experiments show that this proposed method has favorable performance compared to the existing algorithms.
    Schlagwörter Technology (General) ; T1-995 ; Science (General) ; Q1-390
    Sprache Englisch
    Erscheinungsdatum 2018-01-01T00:00:00Z
    Verlag Hindawi-Wiley
    Dokumenttyp Artikel ; Online
    Datenquelle BASE - Bielefeld Academic Search Engine (Lebenswissenschaftliche Auswahl)

    Zusatzmaterialien

    Kategorien

  7. Artikel ; Online: An Efficient Confidentiality and Integrity Preserving Aggregation Protocol in Wireless Sensor Networks

    Liehuang Zhu / Zhen Yang / Jingfeng Xue / Cong Guo

    International Journal of Distributed Sensor Networks, Vol

    2014  Band 2014

    Schlagwörter Electronic computers. Computer science ; QA75.5-76.95 ; Instruments and machines ; QA71-90 ; Mathematics ; QA1-939 ; Science ; Q ; DOAJ:Computer Science ; DOAJ:Technology and Engineering
    Sprache Englisch
    Erscheinungsdatum 2014-01-01T00:00:00Z
    Verlag Hindawi Publishing Corporation
    Dokumenttyp Artikel ; Online
    Datenquelle BASE - Bielefeld Academic Search Engine (Lebenswissenschaftliche Auswahl)

    Zusatzmaterialien

    Kategorien

  8. Artikel ; Online: An Efficient Confidentiality and Integrity Preserving Aggregation Protocol in Wireless Sensor Networks

    Liehuang Zhu / Zhen Yang / Jingfeng Xue / Cong Guo

    International Journal of Distributed Sensor Networks, Vol

    2014  Band 10

    Abstract: Wireless sensor networks (WSNs) are composed of sensor nodes with limited energy which is difficult to replenish. In-network data aggregation is the main solution to minimize energy consumption and maximize network lifetime by reducing communication ... ...

    Abstract Wireless sensor networks (WSNs) are composed of sensor nodes with limited energy which is difficult to replenish. In-network data aggregation is the main solution to minimize energy consumption and maximize network lifetime by reducing communication overhead. However, performing data aggregation while preserving data confidentiality and integrity is challenging, because adversaries can eavesdrop and modify the aggregation results easily by compromised aggregation nodes. In this paper, we propose an efficient confidentiality and integrity preserving aggregation protocol (ECIPAP) based on homomorphic encryption and result-checking mechanism. We also implement ECIPAP on SimpleWSN nodes running TinyOS. Security and performance analysis show that our protocol is quite efficient while persevering both aggregation confidentiality and integrity.
    Schlagwörter Electronic computers. Computer science ; QA75.5-76.95
    Sprache Englisch
    Erscheinungsdatum 2014-02-01T00:00:00Z
    Verlag SAGE Publishing
    Dokumenttyp Artikel ; Online
    Datenquelle BASE - Bielefeld Academic Search Engine (Lebenswissenschaftliche Auswahl)

    Zusatzmaterialien

    Kategorien

Zum Seitenanfang