期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Delay-CJ:A novel cryptojacking covert attack method based on delayed strategy and its detection 被引量:1
1
作者 Guangquan Xu Wenyu Dong +6 位作者 Jun Xing Wenqing Lei Jian Liu Lixiao Gong Meiqi Feng Xi Zheng Shaoying Liu 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1169-1179,共11页
Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits.It has been common since 2017,and in fact,it once beca... Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits.It has been common since 2017,and in fact,it once became the greatest threat to network security.To better prove the attack ability the harm caused by cryptojacking,this paper proposes a new covert browser-based mining attack model named Delay-CJ,this model was deployed in a simulation environment for evaluation.Based on the general framework of cryptojacking,Delay-CJ adds hybrid evasion detection techniques and applies the delayed execution strategy specifically for video websites in the prototype implementation.The results show that the existing detection methods used for testing may become invalid as result of this model.In view of this situation,to achieve a more general and robust detection scheme,we built a cryptojacking detection system named CJDetector,which is based on cryptojacking process features.Specifically,it identifies malicious mining by monitoring CPU usage and analyzing the function call information.This system not only effectively detects the attack in our example but also has universal applicability.The recognition accuracy of CJDetector reaches 99.33%.Finally,we tested the web pages in Alexa 50K websites to investigate cryptojacking activity in the real network.We found that although cryptojacking is indeed on the decline,it remains a part of network security threats that cannot be ignored. 展开更多
关键词 Cryptojacking Evasion techniques delayed strategy Cryptocurrency mining Behavior-based detection
下载PDF
Acetylcholinesterase inhibitor modifications: a promising strategy to delay the progression of Alzheimer's disease 被引量:5
2
作者 Soumee Bhattacharya Dirk Montag 《Neural Regeneration Research》 SCIE CAS CSCD 2015年第1期43-45,共3页
Alzheimer's disease (AD), a fatal, progressive, neurodegener- ative disorder, is the most common cause of old-age demen- tia, accounting for 50-75% of dementia patients. Early stages of AD are marked by vocabulary ... Alzheimer's disease (AD), a fatal, progressive, neurodegener- ative disorder, is the most common cause of old-age demen- tia, accounting for 50-75% of dementia patients. Early stages of AD are marked by vocabulary shrinkage, spatial disori- entation, depression, apraxia, and deterioration of recent forms of declarative memory. In course of time, the patients require close supervision due to the loss of cognitive and functional abilities, and at the terminal stages of the disease, all forms of memory are severely impaired with the patients needing nursing home care (World Alzheimer Report, 2013). 展开更多
关键词 Acetylcholinesterase inhibitor modifications a promising strategy to delay the progression of Alzheimer’s disease ACH ORAL
下载PDF
Mathematical Model of Dynamic Operation and Optimum Control of Billet Reheating Furnace 被引量:1
3
作者 刘日新 宁宝林 《Journal of Materials Science & Technology》 SCIE EI CAS CSCD 1992年第4期279-283,共5页
This paper provides a mathematical model for the billet reheating process in furnace.A new optimum method is brought up that the objective function is the integral value of enthalpy increasing process of a billet.Diff... This paper provides a mathematical model for the billet reheating process in furnace.A new optimum method is brought up that the objective function is the integral value of enthalpy increasing process of a billet.Different delays are simulated and calculated,some proper delay strategies are ob- tained.The on-line computer control model is de- veloped.The real production conditions simulated, the temperature deviation of drop out billet from the target temperature is kept within±15℃. 展开更多
关键词 reheating furnace enthalpy increasing process delay strategy on-line computer control mathematical model
下载PDF
Delay Time Measurement and Comparison of Protection Strategies with One-Link Failed Domestic Optical Fiber Networks in Taiwan
4
作者 Shyh-Lin Tsao Lan-Chih Yang 《光学学报》 EI CAS CSCD 北大核心 2003年第S1期-,共2页
In this paper, we study the protection strategies of domestic optical fiber networks in Taiwan. Delay time experiment of two one-link failed cases are also reported and compared. We can get best protection strategy an... In this paper, we study the protection strategies of domestic optical fiber networks in Taiwan. Delay time experiment of two one-link failed cases are also reported and compared. We can get best protection strategy and bypass the optical transmission signal at shortest delay time. 展开更多
关键词 link work it as in delay Time Measurement and Comparison of Protection Strategies with One-Link Failed Domestic Optical Fiber Networks in Taiwan of
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部