Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (71)
  • Open Access

    ARTICLE

    Web Tracking Domain and Possible Privacy Defending Tools: A Literature Review

    Maryam Abdulaziz Saad Bubukayr1,*, Mounir Frikha2

    Journal of Cyber Security, Vol.4, No.2, pp. 79-94, 2022, DOI:10.32604/jcs.2022.029020

    Abstract Personal data are strongly linked to web browsing history. By visiting a certain website, a user can share her favorite items, location, employment status, financial information, preferences, gender, medical status, news, etc. Therefore, web tracking is considered as one of the most significant internet privacy threats that can have a serious impact on end-users. Usually, it is used by most websites to track visitors through the internet in order to enhance their services and improve search customization. Moreover, selling users’ data to the advertising companies without their permission. Although there are more research efforts focused on third-party tracking to protect… More >

  • Open Access

    ARTICLE

    CenterPicker: An Automated Cryo-EM Single-Particle Picking Method Based on Center Point Detection

    Jianquan Ouyang1,*, Jinling Wang1, Yaowu Wang1, Tianming Liu2

    Journal of Cyber Security, Vol.4, No.2, pp. 65-77, 2022, DOI:10.32604/jcs.2022.028065

    Abstract Cryo-electron microscopy (cryo-EM) has become one of the mainstream techniques for determining the structures of proteins and macromolecular complexes, with prospects for development and significance. Researchers must select hundreds of thousands of particles from micrographs to acquire the database for single-particle cryo-EM reconstruction. However, existing particle picking methods cannot ensure that the particles are in the center of the bounding box because the signal-to-noise ratio (SNR) of micrographs is extremely low, thereby directly affecting the efficiency and accuracy of 3D reconstruction. We propose an automated particle-picking method (CenterPicker) based on particle center point detection to automatically select a large number… More >

  • Open Access

    ARTICLE

    Security Analysis for a VANET Privacy Protection Scheme

    Yuzhen Liu1,2, Xiaoliang Wang1,2,*, Zhoulei Cao1,2, Frank Jiang3

    Journal of Cyber Security, Vol.4, No.1, pp. 57-64, 2022, DOI:10.32604/jcs.2022.028792

    Abstract Vehicular ad hoc network (VANET) is a self-organizing wireless sensor network model, which is extensively used in the existing traffic. Due to the openness of wireless channel and the sensitivity of traffic information, data transmission process in VANET is vulnerable to leakage and attack. Authentication of vehicle identity while protecting vehicle privacy information is an advantageous way to improve the security of VANET. We propose a scheme based on fair blind signature and secret sharing algorithm. In this paper, we prove that the scheme is feasible through security analysis. More >

  • Open Access

    ARTICLE

    Research on the Method of Implementing Named Data Network Interconnection Based on IP Network

    Yabin Xu1,2,*, Lufa Qin2, Xiaowei Xu3

    Journal of Cyber Security, Vol.4, No.1, pp. 41-55, 2022, DOI:10.32604/jcs.2022.028265

    Abstract In order to extend the application scope of NDN and realize the transmission of different NDNs across IP networks, a method for interconnecting NDN networks distributed in different areas with IP networks is proposed. Firstly, the NDN data resource is located by means of the DNS mechanism, and the gateway IP address of the NDN network where the data resource is located is found. Then, the transmission between different NDNs across the IP network is implemented based on the tunnel technology. In addition, in order to achieve efficient and fast NDN data forwarding, we have added a small number of… More >

  • Open Access

    ARTICLE

    A Certificateless Homomorphic Encryption Scheme for Protecting Transaction Data Privacy of Post-Quantum Blockchain

    Meng-Wei Zhang1, Xiu-Bo Chen1, Haseeb Ahmad2, Gang Xu3,4,*, Yi-Xian Yang1

    Journal of Cyber Security, Vol.4, No.1, pp. 29-39, 2022, DOI:10.32604/jcs.2022.027693

    Abstract Blockchain has a profound impact on all areas of society by virtue of its immutability, decentralization and other characteristics. However, blockchain faces the problem of data privacy leakage during the application process, and the rapid development of quantum computing also brings the threat of quantum attack to blockchain. In this paper, we propose a lattice-based certificateless fully homomorphic encryption (LCFHE) algorithm based on approximate eigenvector firstly. And we use the lattice-based delegate algorithm and preimage sampling algorithm to extract part of the private key based on certificateless scheme, which is composed of the private key together with the secret value… More >

  • Open Access

    ARTICLE

    Adaptive Polling Rate for SNMP for Detecting Elusive DDOS

    Yichiet Aun*, Yen-Min Jasmina Khaw, Ming-Lee Gan, Vasaki Ponnusamy

    Journal of Cyber Security, Vol.4, No.1, pp. 17-28, 2022, DOI:10.32604/jcs.2022.027524

    Abstract Resilient network infrastructure is pivotal for business entities that are growing reliance on the Internet. Distributed Denial-of-Service (DDOS) is a common network threat that collectively overwhelms and exhausts network resources using coordinated botnets to interrupt access to network services, devices, and resources. IDS is typically deployed to detect DDOS based on Snort rules. Although being fairly accurate, IDS operates on a compute-intensive packet inspection technique and lacks rapid DDOS detection. Meanwhile, SNMP is a comparably lightweight countermeasure for fast detection. However, this SNMP trigger is often circumvented if the DDOS burst rate is coordinated to flood the network smaller than… More >

  • Open Access

    ARTICLE

    Research on Known Vulnerability Detection Method Based on Firmware Analysis

    Wenjing Wang1, Tengteng Zhao1, Xiaolong Li1,*, Lei Huang1, Wei Zhang1, Hui Guo2

    Journal of Cyber Security, Vol.4, No.1, pp. 1-15, 2022, DOI:10.32604/jcs.2022.026816

    Abstract At present, the network security situation is becoming more and more serious. Malicious network attacks such as computer viruses, Trojans and hacker attacks are becoming more and more rampant. National and group network attacks such as network information war and network terrorism have a serious damage to the production and life of the whole society. At the same time, with the rapid development of Internet of Things and the arrival of 5G era, IoT devices as an important part of industrial Internet system, have become an important target of infiltration attacks by hostile forces. This paper describes the challenges facing… More >

  • Open Access

    ARTICLE

    A Distributed Secret Sharing Method with QR Code Based on Information Hiding

    Pengcheng Jiang, Yu Xue*

    Journal of Cyber Security, Vol.3, No.4, pp. 217-225, 2021, DOI:10.32604/jcs.2021.026022

    Abstract QR codes are applied widely on the Internet and mobile devices in recent years. Its open standards and the characteristics of easy to generate lead to anyone can generate their QR code easily. Also, the QR code does not have the ability of hiding information, which leads to everyone can get access to read the content in any QR code, including those hiding some secret content in the bytes of QR code. Therefore, in recent years, information tampering and information leakage cases caused by poor security of two-dimensional code occur frequently, especially in the financial field and multi-party verification scenarios.… More >

  • Open Access

    ARTICLE

    Data Anonymous Authentication for BIoMT with Proxy Group Signature

    Chaoyang Li1,*, Yalan Wang2, Gang Xu3, Xiubo Chen4, Xiangjun Xin1, Jian Li4

    Journal of Cyber Security, Vol.3, No.4, pp. 207-216, 2021, DOI:10.32604/jcs.2021.026926

    Abstract Along with the increase of wearable medical device, the privacy leakage problem in the process of transmission between these edge medical devices. The blockchain-enabled Internet of Medical Things (BIoMT) has been developed to reform traditional centralized medical system in recent years. This paper first introduces a data anonymous authentication model to protect user privacy and medical data in BIoMT. Then, a proxy group signature (PGS) scheme has been proposed based on lattice assumption. This scheme can well satisfy the anonymous authentication demand for the proposed model, and provide anti-quantum attack security for BIoMT in the future general quantum computer age.… More >

  • Open Access

    ARTICLE

    Linux Kali for Social Media User Location: A Target-Oriented Social Media Software Vulnerability Detection

    Adnan Alam Khan1,2,*, Qamar-ul-Arfeen1

    Journal of Cyber Security, Vol.3, No.4, pp. 201-205, 2021, DOI:10.32604/jcs.2021.024614

    Abstract Technology is expanding like a mushroom, there are various benefits of technology, in contrary users are facing serious losses by this technology. Furthermore, people lost their lives, their loved ones, brain-related diseases, etc. The industry is eager to get one technology that can secure their finance-related matters, personal videos or pictures, precious contact numbers, and their current location. Things are going worst because every software has some sort of legacy, deficiency, and shortcomings through which exploiters gain access to any software. There are various ways to get illegitimate access but on the top is Linux Kali with QRLjacker by user… More >

Displaying 21-30 on page 3 of 71. Per Page