Open Access
ARTICLE
Yu Xue1,2,*, Xu Cai1, Shoubao Su2, Junxiang Han1, Romany F. Mansour3
Journal of Cyber Security, Vol.3, No.1, pp. 1-10, 2021, DOI:10.32604/jcs.2021.016371
Abstract According to some data in the Industrial Purchasing Trends report
released by China in 2017, we can see that e-commerce purchasing channels
have ranked first among all industrial products purchasing channels in China
compared with European and American countries. In addition, in the whole
industrial product purchasing market, we can also see that both manufacturers
and suppliers are making active e-commerce transformation, and some other
Internet giants are also actively entering the industrial product e-commerce
industry. But at present, the revenue of all kinds of subjects is still a lot of room
for improvement compared to the United States industrial… More >
Open Access
ARTICLE
Zhangjie Fu1,2,3,*, Yongjie Ding1, Musaazi Godfrey1
Journal of Cyber Security, Vol.3, No.1, pp. 11-28, 2021, DOI:10.32604/jcs.2021.016632
Abstract Mobile malware occupies a considerable proportion of cyberattacks.
With the update of mobile device operating systems and the development of
software technology, more and more new malware keep appearing. The
emergence of new malware makes the identification accuracy of existing
methods lower and lower. There is an urgent need for more effective malware
detection models. In this paper, we propose a new approach to mobile malware
detection that is able to detect newly-emerged malware instances. Firstly, we
build and train the LSTM-based model on original benign and malware samples
investigated by both static and dynamic analysis techniques. Then, we build… More >
Open Access
ARTICLE
Le Lai1,*,Tongqing Zhou1, Zhiping Cai1, Zhiyao Liang2, Hao Bai1
Journal of Cyber Security, Vol.3, No.1, pp. 29-44, 2021, DOI:10.32604/jcs.2021.016349
Abstract Bitcoin is known as the first decentralized digital currency around the
world. It uses blockchain technology to store transaction data in a distributed
public ledger, is a distributed ledger that removes third-party trust institutions.
Since its invention, bitcoin has achieved great success, has a market value of
about $200 billion. However, while bitcoin has brought a wide and far-reaching
impact in the financial field, it has also exposed some security problems, such as
selfish mining attacks, Sybil attack, eclipse attacks, routing attacks, EREBUS
attacks, and so on. This paper gives a comprehensive overview of various attack
scenarios that the bitcoin… More >
Open Access
ARTICLE
Yunzuo Zhang*, Yi Li, Wei Guo, Lei Huo, Jiayu Zhang, Kaina Guo
Journal of Cyber Security, Vol.3, No.1, pp. 45-54, 2021, DOI:10.32604/jcs.2021.017071
Abstract In the field of educational examination, automatic marking technology
plays an essential role in improving the efficiency of marking and liberating the
labor force. At present, the implementation of the policy of expanding erolments
has caused a serious decline in the teacher-student ratio in colleges and
universities. The traditional marking system based on Optical Mark Reader
technology can no longer meet the requirements of liberating the labor force of
teachers in small and medium-sized examinations. With the development of
image processing and artificial neural network technology, the recognition of
handwritten character in the field of pattern recognition has attracted the… More >
Open Access
ARTICLE
Chungen Xu1,*, Lin Mei1, Jinxue Cheng2, Yu Zhao1, Cong Zuo3
Journal of Cyber Security, Vol.3, No.1, pp. 55-67, 2021, DOI:10.32604/jcs.2021.017217
Abstract With the rapid development of wireless communication technology,
the Internet of Things is playing an increasingly important role in our everyday.
The amount of data generated by sensor devices is increasing as a large number
of connectable devices are deployed in many fields, including the medical,
agricultural, and industrial areas. Uploading data to the cloud solves the problem
of data overhead but results in privacy issues. Therefore, the question of how to
manage the privacy of uploading data and make it available to be interconnected
between devices is a crucial issue. In this paper, we propose a scheme that
supports… More >