咨询与建议

限定检索结果

文献类型

  • 12 篇 期刊文献

馆藏范围

  • 12 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 8 篇 计算机科学与技术...
    • 1 篇 控制科学与工程
    • 1 篇 软件工程
    • 1 篇 网络空间安全
  • 2 篇 医学
    • 1 篇 临床医学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 理学
    • 1 篇 数学

主题

  • 1 篇 complex networks
  • 1 篇 cyber security
  • 1 篇 illiterate
  • 1 篇 image steganogra...
  • 1 篇 blockchain taxon...
  • 1 篇 user-friendly mo...
  • 1 篇 asset classifica...
  • 1 篇 sandbox
  • 1 篇 percolation
  • 1 篇 cyber-attack
  • 1 篇 投毒攻击
  • 1 篇 logistics securi...
  • 1 篇 suspect identifi...
  • 1 篇 数据完整性审计
  • 1 篇 格基加密
  • 1 篇 错误学习
  • 1 篇 survey
  • 1 篇 lung
  • 1 篇 公钥加密关键字搜...
  • 1 篇 reverse engineer...

机构

  • 2 篇 东南大学
  • 2 篇 department of in...
  • 1 篇 department of ce...
  • 1 篇 national center ...
  • 1 篇 division of coho...
  • 1 篇 department of ge...
  • 1 篇 departments of g...
  • 1 篇 division of engi...
  • 1 篇 university of bu...
  • 1 篇 laboratory for s...
  • 1 篇 department of mo...
  • 1 篇 division of epid...
  • 1 篇 department of th...
  • 1 篇 department of di...
  • 1 篇 department of ge...
  • 1 篇 department of ga...
  • 1 篇 department of co...
  • 1 篇 department of in...
  • 1 篇 molecular pathol...
  • 1 篇 tohoku medical m...

作者

  • 5 篇 sadeeq jan
  • 4 篇 fazal qudus khan
  • 2 篇 蒋睿
  • 2 篇 salman ahmed
  • 2 篇 imran maqsood
  • 2 篇 george tsaramirs...
  • 2 篇 iftikhar ahmad
  • 2 篇 niamat ullah
  • 1 篇 katsuhiro masago
  • 1 篇 morched derbali
  • 1 篇 masahiro torasaw...
  • 1 篇 赵宁宁
  • 1 篇 sandeep kumar sh...
  • 1 篇 ken takasawa
  • 1 篇 louis m.shekhtma...
  • 1 篇 gao gao dong
  • 1 篇 takahisa kawaguc...
  • 1 篇 yoko shimada
  • 1 篇 keitaro matsuo
  • 1 篇 kazuki kumada

语言

  • 10 篇 英文
  • 2 篇 中文
检索条件"基金资助=Center for Cyber Security "
12 条 记 录,以下是1-10 订阅
排序:
Investigating the Use of Email Application in Illiterate and Semi-Illiterate Population
收藏 引用
Computers, Materials & Continua 2020年 第3期62卷 1473-1486页
作者: Sadeeq Jan Imran Maqsood Salman Ahmed Zahid Wadud Iftikhar Ahmad National center for cyber security-UETP Department of CS&ITUniversity of Engineering&TechnologyPeshawarPakistan Department of Computer Software Engineering University of Engineering&TechnologyMardanPakistan Department of Computer Systems Engineering University of Engineering&TechnologyPeshawarPakistan 不详
The use of electronic communication has been significantly increased over the last few *** is one of the most well-known means of electronic *** email applications are widely used by a large population;however,illiter... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A User-friendly Model for Ransomware Analysis Using Sandboxing
收藏 引用
Computers, Materials & Continua 2021年 第6期67卷 3833-3846页
作者: Akhtar Kamal Morched Derbali Sadeeq Jan Javed Iqbal Bangash Fazal Qudus Khan Houssem Jerbi Rabeh Abbassi Gulzar Ahmad Department of Computer Science&Information Technology National Center for Cyber SecurityUniversity of Engineering&TechnologyPeshawar25120Pakistan Department of Information Technology Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Institute of Computer Sciences and Information Technology(ICS/IT) University of AgriculturePeshawar25130Pakistan Department of Industrial/Electrical Engineering College of EngineeringUniversity of Ha’ilHail1234Saudi Arabia Department of Electrical Engineering University of Engineering&TechnologyPeshawar25120Pakistan
Ransomware is a type of malicious software that blocks access to a computer by encrypting user’s files until a ransom is paid to the *** have been several reported high-profile ransomware attacks including WannaCry,P... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Framework for Systematic Classification of Assets for security Testing
收藏 引用
Computers, Materials & Continua 2021年 第1期66卷 631-645页
作者: Sadeeq Jan Omer Bin Tauqeer Fazal Qudus Khan George Tsaramirsis Awais Ahmad Iftikhar Ahmad Imran Maqsood Niamat Ullah National center for cyber security Department of CS&ITUniversity of Engineering&TechnologyPeshawarPakistan Department of Information Technology FCITKing Abdulaziz UniversityJeddahSaudi Arabia Dipartimento di Informatica(DI) UniversitàDegli Studi di Milano StataleVia Celoria 18MilanoItaly Department of Computer Science&IT University of Engineering&TechnologyPeshawarPakistan Department of Software Engineering University of Engineering&TechnologyMardanPakistan University of Buner BunerPakistan
Over the last decade,a significant increase has been observed in the use of web-based Information systems that process sensitive information,e.g.,personal,financial,*** this increased use,the security of such systems ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Reverse Engineering of Mobile Banking Applications
收藏 引用
Computer Systems Science & Engineering 2021年 第9期38卷 265-278页
作者: Syeda Warda Asher Sadeeq Jan George Tsaramirsis Fazal Qudus Khan Abdullah Khalil Muhammad Obaidullah National center for cyber security Department of Computer Science&Information TechnologyUniversity of Engineering&TechnologyPeshawar25120Pakistan Higher Colleges of Technology Abu Dhabi Women’s CollegeAbu DhabiUAE Department of Information Technology Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Software Engineering University of Engineering&TechnologyMardan23200Pakistan
Software reverse engineering is the process of analyzing a software system to extract the design and implementation *** engineering provides the source code of an application,the insight view of the architecture and t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Novel Approach of Image Steganography for Secure
收藏 引用
Computers, Materials & Continua 2020年 第7期64卷 31-61页
作者: Shahid Rahman Fahad Masood Wajid Ullah Khan Niamat Ullah Fazal Qudus Khan Georgios Tsaramirsis Sadeeq Jan Majid Ashraf University of Buner Buner19290Pakistan Abasyn University Peshawar25000Pakistan Department of Information Technology Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21577Saudi Arabia National center for cyber security-UETP Department of CS&ITUniversity of Engineering&TechnologyPeshawar25000Pakistan Department of Electrical Engineering University of Engineering&TechnologyPeshawar25000Pakistan
Steganography aims to hide the messages from unauthorized persons for various purposes,e.g.,military correspondence,financial transaction *** the data during transmission is of utmost importance these *** confidential... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
cyber Secure Framework for Smart Containers Based on Novel Hybrid DTLS Protocol
收藏 引用
Computer Systems Science & Engineering 2022年 第12期43卷 1297-1313页
作者: Waseem Ullah Khan Safdar Nawaz Khan Marwat Salman Ahmed Department of Computer Systems Engineering University of Engineering and Technology PeshawarPeshawar25120Pakistan
The Internet of Things (IoTs) is apace growing, billions of IoT devicesare connected to the Internet which communicate and exchange data among eachother. Applications of IoT can be found in many fields of engineering ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Efficient network immunization under limited knowledge
收藏 引用
National Science Review 2021年 第1期8卷 127-134页
作者: Yangyang Liu Hillel Sanhedrai Gao Gao Dong Louis M.Shekhtman Fan Wang Sergey V.Buldyrev Shlomo Havlin Department of Systems Science National University of Defense Technology Department of Physics Bar-Ilan University Faculty of Science Jiangsu University Network Science Institute Northeastern University Department of Physics Yeshiva University
Targeted immunization of centralized nodes in large-scale networks has attracted significant ***, in real-world scenarios, knowledge and observations of the network may be limited, thereby precluding a full assessment... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Blockchain applied to the construction supply chain:A case study with threat model
收藏 引用
Frontiers of Engineering Management 2020年 第4期7卷 564-577页
作者: Gjorgji SHEMOV Borja GARCIA de SOTO Hoda ALKHZAIMI Division of Engineering New York University Abu Dhabi(NYUAD)Saadiyat IslandAbu Dhabi 129188United Arab Emirates
The construction industry has long faced the challenge of introducing collaborative systems among multiple *** challenge creates a high level of rigidity in terms of processing shared information related to different ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Identifying malicious accounts in blockchains using domain names and associated temporal properties
收藏 引用
Blockchain(Research and Applications) 2023年 第3期4卷 39-51页
作者: Rohit Kumar Sachan Rachit Agarwal Sandeep Kumar Shukla C3i Hub Indian Institute of Technology KanpurKanpur 208016India CSE Department Indian Institute of Technology KanpurKanpur 208016India Bennet University Greater Noida 201310India Merkle Science Bangalore 560102India
The rise in the adoption of blockchain technology has led to increased illegal activities by cybercriminals costing billions of *** machine learning algorithms are applied to detect such illegal *** algorithms are oft... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
云上基于错误学习的可验证多关键词搜索方案
收藏 引用
Journal of Southeast University(English Edition) 2023年 第2期39卷 169-175页
作者: 汪攀 蒋睿 东南大学网络空间安全学院 南京210096
为了解决公钥加密关键字搜索(PEKS)算法面临的多种难题,提出了一种基于错误学习的可验证多关键字搜索方案(LWE-VMKS).该方案利用格加密的算法生成关键字索引,搜索查询和签名,以抵抗量子计算攻击.该方案将单个搜索查询中多个关键字合并,... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论