Vector space modelling-based intelligent binary image encryption for secure communication

V Dankan Gowda, A Sharma… - Journal of Discrete …, 2022 - Taylor & Francis
In this research work, a secured routing technique is developed based on the LEACH
algorithm. Many secure routing algorithms were proposed in the past by modifying the …

Uisfuzz: An efficient fuzzing method for cpu undocumented instruction searching

X Li, Z Wu, Q Wei, H Wu - IEEE Access, 2019 - ieeexplore.ieee.org
With the rapid development of network security and the frequent appearance of CPU
vulnerabilities, CPU security have gradually raised great attention and become a crucial …

Scheduling sequence control method based on sliding window in cyberspace mimic defense

W Guo, Z Wu, F Zhang, J Wu - IEEE Access, 2019 - ieeexplore.ieee.org
Cyberspace Mimic Defense (CMD) is a proactive defense theory proposed in recent years to
deal with vulnerability and backdoor threats that are common in information systems …

Symmetric key and polynomial-based key generation mechanism for secured data communications in 5G networks

S Pradeep, S Muthurajkumar, S Ganapathy, A Kannan - Soft Computing, 2024 - Springer
Fifth Generation (5G) networks provide data communications through various latest
technologies including Software Defined Networks (SDN), Artificial Intelligence, Machine …

Cyber defensive capacity and capability:: A perspective from the financial sector of a small state

K de Nobrega - 2023 - research.tilburguniversity.edu
Tilburg University Cyber defensive capacity and capability: de Nobrega, Kristel Page 1 Tilburg
University Cyber defensive capacity and capability: de Nobrega, Kristel DOI …

A novel model of mimic defense based on minimal L-order error probability

G Chen, G Shi, L Chen, X He, S Jiang - IEEE Access, 2020 - ieeexplore.ieee.org
Mimic defense is an active defense theory, which aims to fundamentally change the “easy to
attack and difficult to defend” situation of network security. In this paper, we propose an …

Confidence Skewing Problem and Its Correction Method in Mimic Arbitration Mechanism

W GUO, F ZHANG, Z WU, J WEI, J WU… - Chinese Journal of …, 2020 - Wiley Online Library
Arbitration mechanism is the core element of Cyberspace mimic defense (CMD) scheme,
providing the security effect of exception perception and exception shielding for the …

Mimic Scoring Voting Algorithm Based on Historical Confidence and Heterogeneity

Z Tang, X Guo, L Chen - 2021 IEEE 6th International …, 2021 - ieeexplore.ieee.org
Cyberspace mimic defense technology uses dynamic heterogeneous redundancy (DHR)
architecture to improve system security. DHR architecture contains scheduling, voting, and …

Symmetric Key and Polynomial Based Key Generation Mechanism for Secured Data Communications in 5G Networks

P Suthanthiramani, M Sannasy, S Ganapathy… - 2021 - researchsquare.com
Fifth Generation (5G) networks provide data communications through various latest
technologies including Software Defined Network (SDN), Artificial Intelligence, Machine …

Interactive Symmetric Context Encryption in Framework of Asynchronous Data Exchange

T Duan, YJ Peng - 2020 Chinese Control And Decision …, 2020 - ieeexplore.ieee.org
With the rapid development of the Internet world, information security issues has been
increasingly concerned with wide investigations. In the browser/server (B/S) architecture, a …