Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (71)
  • Open Access

    ARTICLE

    Research on ABAC Access Control Based on Big Data Platform

    Kun Yang1, Xuanxu Jin2, Xingyu Zeng1,*

    Journal of Cyber Security, Vol.3, No.4, pp. 187-199, 2021, DOI:10.32604/jcs.2021.026735

    Abstract In the environment of big data, the traditional access control lacks effective and flexible access mechanism. Based on attribute access control, this paper proposes a HBMC-ABAC big data access control framework. It solves the problems of difficult authority change, complex management, over-authorization and lack of authorization in big data environment. At the same time, binary mapping codes are proposed to solve the problem of low efficiency of policy retrieval in traditional ABAC. Through experimental analysis, the results show that our proposed HBMC-ABAC model can meet the current large and complex environment of big data. More >

  • Open Access

    ARTICLE

    Analysis and Design of University Teaching Equipment Management Information System

    Yu Xue1,2,*, Xiang Jiao1, Chishe Wang2 , Huanlun Chen1,4, Moayad Aloqaily3

    Journal of Cyber Security, Vol.3, No.3, pp. 177-185, 2021, DOI:10.32604/jcs.2021.016657

    Abstract Teaching equipment management is an important factor for colleges and universities to improve their teaching level, and its management level directly affects the service life and efficiency of teaching equipment. But in recent years, our university recruitment of students scale is increasing year by year, the size of the corresponding teaching equipment is also growing, therefore to develop a teaching equipment management information system is necessary, not only can help universities to effective use of the existing teaching resources, also can update scrap equipment, related equipment maintenance, and build a good learning environment to students and to the improvement of… More >

  • Open Access

    ARTICLE

    Enterprise Cyberspace Threat Landscape: An Analysis

    Emmanuel U. Opara1,*, Oredola A. Soluade2

    Journal of Cyber Security, Vol.3, No.3, pp. 167-176, 2021, DOI:10.32604/jcs.2021.019158

    Abstract The ecosystem security platform described in this research is already impacting the threat spectrum in quantifiable ways. The global network has undergone a dramatic transformation over the course of 2020, with an unprecedented destabilization of events. Security breaches of all kinds are growing in complexity, sophistication, and impact. The bad actors are bypassing predictable security devices at will by breaching network systems at an escalating rate. This study will analyze these developments by creating awareness among security practitioners so they can be prepared to defend their enterprise systems. More >

  • Open Access

    ARTICLE

    Securing Fog Computing For E-Learning System Using Integration of Two Encryption Algorithms

    Hind A. Alshambri1,* Fawaz Alassery2

    Journal of Cyber Security, Vol.3, No.3, pp. 149-166, 2021, DOI:10.32604/jcs.2021.022112

    Abstract Currently, the majority of institutions have made use of information technologies to improve and develop their diverse educational methods to attract more learners. Through information technologies, e-learning and learning-on-the go have been adopted by the institutions to provide affordability and flexibility of educational services. Most of the educational institutes are offering online teaching classes using the technologies like cloud computing, networking, etc. Educational institutes have developed their e-learning platforms for the online learning process, through this way they have paved the way for distance learning. But e-learning platform has to face a lot of security challenges in terms of cyberattacks… More >

  • Open Access

    ARTICLE

    Awareness about the Online Security Threat and Ways to Secure the Youths

    Yeshi Nidup*

    Journal of Cyber Security, Vol.3, No.3, pp. 133-148, 2021, DOI:10.32604/jcs.2021.024136

    Abstract This study aimed to find out the awareness about the online security threat and understanding of the preventive measuresto secure the youthsfrom online risks. For this, a quantitative method was applied and the survey questionnaire was instituted to collect the data randomly from the youths studying in class eleven and higher. A total of 264 youths, 147 female and 117 male responded to the survey questionnaire. The data was organized and analyzed using Excel data analysis tool package, interpreted and represented in the form of graphs with some explanations. The awareness about the online security threat was found to be… More >

  • Open Access

    ARTICLE

    Design and Implementation of Enterprise Recruitment Mini Program

    Yu Xue1,2,*, Nan Wei1 , Junyang Han1,4, Chishe Wang2, Moayad Aloqaily3

    Journal of Cyber Security, Vol.3, No.3, pp. 125-132, 2021, DOI:10.32604/jcs.2021.016647

    Abstract Since the 21st century, the Internet has been updated and developed at an alarming speed. At the same time, WeChat applets are constantly improving and introducing new functions. Develop an enterprise recruitment system based on WeChat applets for the majority of job seekers and recruiter users, provide job seekers with easy-to-reach employment opportunities, and provide a convenient and clear screening environment for job seekers. The front-end part of the applet is developed using WeChat developer tools, and the back-end system is developed using MyEclipse. Use Spring Boot + Spring MVC framework, implemented in Java language. Data is managed using MySql… More >

  • Open Access

    ARTICLE

    A Hybrid Algorithm Based on PSO and GA for Feature Selection

    Yu Xue1,*, Asma Aouari1, Romany F. Mansour2, Shoubao Su3

    Journal of Cyber Security, Vol.3, No.2, pp. 117-124, 2021, DOI:10.32604/jcs.2021.017018

    Abstract One of the main problems of machine learning and data mining is to develop a basic model with a few features, to reduce the algorithms involved in classification’s computational complexity. In this paper, the collection of features has an essential importance in the classification process to be able minimize computational time, which decreases data size and increases the precision and effectiveness of specific machine learning activities. Due to its superiority to conventional optimization methods, several metaheuristics have been used to resolve FS issues. This is why hybrid metaheuristics help increase the search and convergence rate of the critical algorithms. A… More >

  • Open Access

    ARTICLE

    Blockchain Based Secure Solution for Cloud Storage: A Model for Synchronizing Industry 4.0 and IIoT

    Prakhar Sahu1,*, S. K. Singh1, Arun Kumar Singh2

    Journal of Cyber Security, Vol.3, No.2, pp. 107-115, 2021, DOI:10.32604/jcs.2021.020831

    Abstract Industry 4.0 is one of the hot topic of today’s world where everything in the industry will be data driven and technological advancements will take place accordingly. In the fourth phase of industrial revolution, manufacturers are dependent upon data produced by the consumers to invent, innovate or change anything for the product. Internet of things devices like OBD, RFID, IIoT, Smart devices are the major source of data generation and represents trends in the industry. Since the IoT device are vulnerable to hackers due to its limitation, consumer data security should be tighten up and enhanced. This paper gives an… More >

  • Open Access

    ARTICLE

    Computational Intelligent Techniques To Detect DDOS Attacks : A Survey

    Isha Sood*, Varsha Sharma

    Journal of Cyber Security, Vol.3, No.2, pp. 89-106, 2021, DOI:10.32604/jcs.2021.018623

    Abstract The Internet is often targeted by the Distributed Denial of Service (DDOS) Attacks that deliberately utilize resources and bandwidth to prohibit access to potential users. The attack possibility is that the packets are filled massively. A DOS attack is launched by a single source, while a DDOS attack is originated from numerous resources. DDoS attacks are not capable of stealing website user’s information. The prime motive of the DDoS attacks is to devastate the website resources. Distributed Denial of Service (DDoS) attacks are disruptive to internet access on the Network. The attitude of the customer to get fast and reliable… More >

  • Open Access

    ARTICLE

    Pedestrian Crossing Detection Based on HOG and SVM

    Yunzuo Zhang*, Kaina Guo, Wei Guo, Jiayu Zhang, Yi Li

    Journal of Cyber Security, Vol.3, No.2, pp. 79-88, 2021, DOI:10.32604/jcs.2021.017082

    Abstract In recent years, pedestrian detection is a hot research topic in the field of computer vision and artificial intelligence, it is widely used in the field of security and pedestrian analysis. However, due to a large amount of calculation in the traditional pedestrian detection technology, the speed of many systems for pedestrian recognition is very limited. But in some restricted areas, such as construction hazardous areas, real-time detection of pedestrians and cross-border behaviors is required. To more conveniently and efficiently detect whether there are pedestrians in the restricted area and cross-border behavior, this paper proposes a pedestrian cross-border detection method… More >

Displaying 31-40 on page 4 of 71. Per Page