OALib 期刊
  OALib Journal (ISSN Print: 2333-9705, ISSN Online: 2333-9721)是一本多合一的开源期刊,以同行评审的方式出版发行文章,其所涵盖的研究领域多达311种领域。本刊发表的全部文章均可在期刊网站上免费阅读、下载、引用和传播。单篇文章出版费用为99美元。详情请咨询service@oalib.com 或 QQ: 3279437679 WhatsApp +8615387084133 WeChat 1538708413。现在就去投稿!
               文章    |    目标与领域    |    读者指南    |    编委    |    文章版面费    |    检索             


Go

Apr 17, 2024Open    Access

Analysis of Database Security

Xueying Pan,Anthony Obahiaghon,Brendan Makar,Samuel Wilson,Christian Beard
This paper discusses how authorized users use various techniques to secure data schemes for getting privileged access and keeping database system security. However, there are different threats to databases such as SQL inject attack that would have caused loss of integrity, availability, and confidentiality. Therefore, firstly we introduce different control measures and then discuss mechanisms for granting and revoking privileges in the relational database system. In the paper, we specify securit...
Open Access Library J.   Vol.11, 2024
Doi:10.4236/oalib.1111366


Mar 29, 2024Open    Access

XML Attacks towards Different Targeted Operating Systems

Xueying Pan,Sharon Martin
This paper is to study how Extensible Markup Language (XML) code injection attacks are widespread over web and cloud applications, databases, and multiple types of systems within major corporations that can be equated to system vulnerabilities. The attacks can be on the Application layer, Transport layer, or at the core of the Operating System. In this paper, we have explained a common translation tool translating web page information into other file types as XSLT can unknowingly inject maliciou...
Open Access Library J.   Vol.11, 2024
Doi:10.4236/oalib.1111367


Jul 31, 2023Open    Access

An Analytical Model Modifications and Adaptations for Malware Spread and Containment in Communication Networks

Moses Okechukwu Onyesolu, Charles Okechukwu Ugwunna
Due to the escalating wave of malware in communication networks, continuous/discrete differential equations have been used in traditional analytical models to better understand the patterns of malware spread. Networks for local area networks, networks for metropolitan areas, and broad area networks were all utilized in this study. In particular, we developed the vulnerable-latent-contagious-recovery-inoculation (VLCR-I) model as well as built its computational equivalents in MathLab simulator. F...
Open Access Library J.   Vol.10, 2023
Doi:10.4236/oalib.1110174


Dec 30, 2021Open    Access

Implementation of Machine Learning Method for the Detection and Prevention of Attack in Supervised Network

Patrick Dany Bavoua Kenfack, Fabrice Kwefeu Mbakop, Edward Eyong-Ebai
The sustainability of a company depends on the permanent availability of its information system. This reality influences the behavior of companies, which are becoming increasingly mature in their investments in information system security, which is an absolutely vital element. The use of a service called “SYSLOG” to centralize the network event logs that are sent by printers, servers, routers, firewalls, IDS and IPS in an SYSLOG server is a perfect example for network optimization. In this work,...
Open Access Library J.   Vol.8, 2021
Doi:10.4236/oalib.1108000


Aug 19, 2021Open    Access

New Progress in CPK Public Key

Xianghao Nan
The private-key structure of CPK has developed from single-layer and multi-layer to multi-block and composite structure. The scheme structure of CPK has formed as fixed, flexible or disposable types. CPK digital signature forms an identity signature protocol not only for data signature, but also for identity signature. CPK is not only suitable for the authentication requirements of open global communication network and business network, but also suitable for the authentication requirements of cl...
Open Access Library J.   Vol.8, 2021
Doi:10.4236/oalib.1107440


Nov 16, 2020Open    Access

The Intelligent Software Systems: The Practical Implementation of Software Security Vulnerabilities Detection Modeling

Musoni Wilson, Umutesi Liliane, Mbanzabugabo Jean Baptiste
System products are widely used in almost all applications. Most of the human capacity has been converted to software solutions. Measuring and evaluating the quality of software products has become a problem for many companies that may be looking for software solutions. There are a number of skills that are required and used to make good software. As time goes on, new software is advancing and this has caused security problems to persist and thus affect the software’s performance. New components...
Open Access Library J.   Vol.7, 2020
Doi:10.4236/oalib.1106831


Mar 25, 2020Open    Access

Recurrent Neural Networks and Deep Neural Networks Based on Intrusion Detection System

Rabeb Zarai, Mnaouer Kachout, Mohamed A. G. Hazber, Mohammed A. Mahdi
The computer security has become a major challenge. Tools and mechanisms have been developed to ensure a level of compliance. These include the Intrusion De-tection Systems (IDS). The principle of conventional IDS is to detect attempts to attack a network and to identify abnormal activities and behaviors. The reasons, including the uncertainty in searching for types of attacks and the increasing com-plexity of advanced cyber-attacks, IDS calls for the need for integration of meth-ods such as Dee...
Open Access Library J.   Vol.7, 2020
Doi:10.4236/oalib.1106151


Oct 09, 2019Open    Access

Car FAQ Assistant Based on BILSTM-Siamese Network

Bo Jin, Zhezhi Jin
With the development of artificial intelligence, the automatic question answering technology has been paid more and more attention. Along with the technology’s maturing, the problem is gradually exposed. This technique has several major difficulties. There is semantic recognition. How accurate are the answers to the questions? Because Chinese grammar is relatively complex. There are many diffe
...
Open Access Library J.   Vol.6, 2019
Doi:10.4236/oalib.1105817


Mar 19, 2018Open    Access

Securisation of an IPv6 Address Obtaining with SLAAC in Home Networks

S. Y. Massamba, S. A. R. R. Cheikh
In this article, we present a new method based on the securisation of an IPv6 (Internet Protocol version 6) address obtaining with the SLAAC (Stateless Address Autoconfiguration) method in the domestic network. The particularity of our domestic network is the presence of several Multihoming Internet service providers. The peripherals of the Home Network domain, especially routers are in charge of the re
...
Open Access Library J.   Vol.5, 2018
Doi:10.4236/oalib.1104424


Apr 23, 2015Open    Access

A Novel Information Security Scheme for E-Learning Infrastructure Success Based on TRI Model

Yassine Khlifi, Adel Bessadok
The fast growth of the Internet proposes and offers several new applications and advanced services that has greatly and quickly innovated the educational environment. The platform of e- learning represents an attractive educational field where the acceptance or utilization progresses and more and more people are taking courses or training using this technology. Mainly, e-learning platform exploits Internet infrastructure which became location for illegal events and actions, especially exposed to...
Open Access Library J.   Vol.2, 2015
Doi:10.4236/oalib.1101424


Go

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413