期刊文献+
共找到257,218篇文章
< 1 2 250 >
每页显示 20 50 100
Cyber Resilience through Real-Time Threat Analysis in Information Security
1
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information security Network security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling security Architecture
下载PDF
Evolving National Security: A Roadmap from Present to Future in Renewable and Nonrenewable Energy Policies (A Technical Review) 被引量:1
2
作者 Bahman Zohuri 《Journal of Energy and Power Engineering》 2023年第3期102-108,共7页
This comprehensive exploration delves into the intricate dynamics of national security policies in the realm of renewable and nonrenewable energy sources.From the present landscape characterized by the diversification... This comprehensive exploration delves into the intricate dynamics of national security policies in the realm of renewable and nonrenewable energy sources.From the present landscape characterized by the diversification of energy portfolios to the long-term vision encompassing nuclear fusion,this article navigates through the nuanced interplay of technology,resilience,and environmental responsibility.The synthesis of established nuclear fission technologies and evolving renewable sources forms the cornerstone of a strategic approach,addressing challenges and opportunities to ensure a secure,sustainable energy future. 展开更多
关键词 national security policy renewable energy nonrenewable energy nuclear fission nuclear fusion energy resilience sustainability technological innovation environmental responsibility global collaboration.
下载PDF
Thoroughly Study and Implement a Holistic Approach to National Security to Safeguard Chinese Modernization
3
作者 《Contemporary International Relations》 2024年第5期4-25,共22页
2024 marks the tenth anniversary of a holistic approach to national security. As an important component of Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era, a holistic approach to national se... 2024 marks the tenth anniversary of a holistic approach to national security. As an important component of Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era, a holistic approach to national security provides fundamental guidance for China's national security work in the new era and is, therefore, of great theoretical and practical significance. This approach has several distinct features: it ref lects the trends of our times, is deeply rooted in China's national culture, and follows a people-centered, struggle-oriented, systematic, st rategic, in novative, and practice-based approach. By upholding and developing a holistic approach to national security, the Central Committee of the Communist Party of China(CPC) has comprehensively strengthened the Party's absolute leadership over national security, reshaped the systems and mechanisms for national security across the board, and made brilliant achievements in national security work in the new era. Given the context of the momentous changes unseen in a century that shape today's world, the national security situation facing China is increasingly complex and grim, characterized by many challenges and new characteristics. On the new journey toward rejuvenating the nation and building China into a strong country, we should fully implement the spirit of the 20th CPC National Congress, firmly pursue a holistic approach to national security, and accelerate the modernization of China's national security system and capacity to ensure steady and sustained progress in Chinese modernization. 展开更多
关键词 Chinese modernization holistic approach to national security national security situation
下载PDF
U. S. -Iraq War and China's National Security 被引量:1
4
作者 Gu Dexin 《Contemporary International Relations》 2003年第6期18-24,共7页
Discussions about the U. S-Iraq war would last for years, but the war will surely produce long-term influences on international strategic structure and China’s security environment. The feature and influence of the w... Discussions about the U. S-Iraq war would last for years, but the war will surely produce long-term influences on international strategic structure and China’s security environment. The feature and influence of the war are determined by the America’ purposes in launching the war, which, in the common. 展开更多
关键词 of on IT into Iraq War and Chinas national security that HAVE been for
下载PDF
An Analysis of the Current State of Civil Society Participation in Ensuring the National Security of Mongolia
5
作者 Khatanbold Oidov Nergui Bayartogtokh 《International Relations and Diplomacy》 2023年第1期24-41,共18页
In this article, the researchers tried to evaluate the contribution of civil society to Mongolian democracy and the problems faced by civil society. In addition, the article aimed to determine the unique national crit... In this article, the researchers tried to evaluate the contribution of civil society to Mongolian democracy and the problems faced by civil society. In addition, the article aimed to determine the unique national criteria of Mongolian democracy and the need to create an organization to monitor the process of democracy. The process of identifying important documents and ideals for the development of Mongolian civil society today is still in its early stages. It can be said that the approval of the democratic constitution and the first free and fair parliamentary elections as a country that has newly and restored democracy became another impetus for the creation of a new type of citizen organization. It is characterized by trying to study the changes that have occurred since this historical period at the intersection of political science and security studies. One of the most important issues today is to find out how many non-governmental and civil society organizations exist in Mongolia today, which are Western-oriented, focused on specific issues, have their own position and opinion, are specialized, and are capable of influencing government policy. On the other hand, in this article, we emphasize whether non-governmental and civil society organizations, which aim to hold the government accountable, and carry out influence and control activities, are fully developed. 展开更多
关键词 national security civil society DEMOCRACY Mongolia defense and political science reforms and changes in the society
下载PDF
Cyberspace Security Using Adversarial Learning and Conformal Prediction
6
作者 Harry Wechsler 《Intelligent Information Management》 2015年第4期195-222,共28页
This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactic... This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactical offensive threats. Conformal prediction is the principled and unified adaptive and learning framework used to design, develop, and deploy a multi-faceted?self-managing defensive shield to detect, disrupt, and deny intrusive attacks, hostile and malicious behavior, and subterfuge. Conformal prediction leverages apparent relationships between immunity and intrusion detection using non-conformity measures characteristic of affinity, a typicality, and surprise, to recognize patterns and messages as friend or foe and to respond to them accordingly. The solutions proffered throughout are built around active learning, meta-reasoning, randomness, distributed semantics and stratification, and most important and above all around adaptive Oracles. The motivation for using conformal prediction and its immediate off-spring, those of semi-supervised learning and transduction, comes from them first and foremost supporting discriminative and non-parametric methods characteristic of principled demarcation using cohorts and sensitivity analysis to hedge on the prediction outcomes including negative selection, on one side, and providing credibility and confidence indices that assist meta-reasoning and information fusion. 展开更多
关键词 Active LEARNING Adversarial LEARNING Anomaly DETECTION Change DETECTION CONFORMAL PREDICTION Cyber security Data Mining DENIAL and Deception Human Factors INSIDER Threats Intrusion DETECTION Meta-Reasoning Moving Target Defense Performance Evaluation Randomness Semi-Supervised LEARNING Sequence Analysis Statistical LEARNING Transduction
下载PDF
Information Security in the Cloud: Emerging Trends and Challenges
7
作者 Keerthana Chitreddy Andrew Mikhl Anthony +1 位作者 Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第5期69-80,共12页
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective. 展开更多
关键词 Cloud Computing Information security Cloud Infrastructure Offerings Cloud Migration security Measures Data Breaches Cloud Service Providers CYBERsecurity Cloud security Case Studies Cloud Threat Landscape Data Encryption COMPLIANCE Cloud security Tools
下载PDF
Global and International Security Under Spatial Grasp Paradigm
8
作者 Peter Simon Sapaty 《International Relations and Diplomacy》 2024年第2期72-85,共14页
Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrat... Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrated with bodies of real systems wherever in physical,virtual,or combined spaces they may exist.So global security capabilities should not only be distributed,but rather be really spatial,self-organized,and dynamic,also exhibiting overall integrity,awareness,and consciousness features.The paper describes applicability of the patented and revealed in 10 books Spatial Grasp Model and Technology(SGT)and its basic Spatial Grasp Language(SGL)which conceptually and functionally match security problems of large distributed and heterogeneous systems.It investigates very practical security solutions for finding and tracing distribution of forbidden items,world roaming criminals,recovery from natural and human-made disasters,tracing and elimination of moving dangerous objects in terrestrial and celestial spaces,as well as analysis and restoration of damaged transport networks.It advises how different security infrastructures can be organized and managed,and how to cooperate and integrate within global security systems with higher awareness and consciousness levels over them.The provided security-oriented version of SGL can be quickly implemented and integrated with existing distributed management and security systems. 展开更多
关键词 global security international security critical infrastructures Spatial Grasp Technology Spatial Grasp Language distributed language interpretation self-recovering security scenarios global security awareness and consciousness
下载PDF
End-to-End Encryption in Messaging Services and National Security—Case of WhatsApp Messenger 被引量:1
9
作者 Robert E. Endeley 《Journal of Information Security》 2018年第1期95-99,共5页
The ubiquity of instant messaging services on mobile devices and their use of end-to-end encryption in safeguarding the privacy of their users have become a concern for some governments. WhatsApp messaging service has... The ubiquity of instant messaging services on mobile devices and their use of end-to-end encryption in safeguarding the privacy of their users have become a concern for some governments. WhatsApp messaging service has emerged as the most popular messaging app on mobile devices today. It uses end-to-end encryption which makes government and secret services efforts to combat organized crime, terrorists, and child pornographers technically impossible. Governments would like a “backdoor” into such apps, to use in accessing messages and have emphasized that they will only use the “backdoor” if there is a credible threat to national security. Users of WhatsApp have however, argued against a “backdoor”;they claim a “backdoor” would not only be an infringement of their privacy, but that hackers could also take advantage of it. In light of this security and privacy conflict between the end users of WhatsApp and government’s need to access messages in order to thwart potential terror attacks, this paper presents the advantages of maintaining E2EE in WhatsApp and why governments should not be allowed a “backdoor” to access users’ messages. This research presents the benefits encryption has on consumer security and privacy, and also on the challenges it poses to public safety and national security. 展开更多
关键词 INSTANT MESSAGING WhatsApp END-TO-END ENCRYPTION national security Privacy
下载PDF
Changes in the US National Security Council in the Trump Administration
10
作者 Sun Chenghao 《Contemporary International Relations》 2020年第1期86-109,共24页
The structure of the National Security Council(NSC)under Donald Trump has been tweaked only slightly on the basis of the previous administration’s"three tiers of committees"model,and without any breakthroug... The structure of the National Security Council(NSC)under Donald Trump has been tweaked only slightly on the basis of the previous administration’s"three tiers of committees"model,and without any breakthrough in reform.However,the NSC also faces a series of new changes and features,including instability caused by changes in the President’s entourage,and dysfunction induced by the decreased number of formal meetings.These changes may be attributed principally to the impact of Trump’s governing style,management style and informal decision-making process.The NSC’s role in the decision-making system varies according to the frequent changes in National Security Advisor.In the 70 plus year history of the NSC,it is evident that its development direction is determined by structural changes in the international pattern,US national security challenges and the transfer of power within the decision-making system.How the President positions and utilizes the NSC ultimately determines the structure and efficiency of the mechanism. 展开更多
关键词 Donald Trump national security COUNCIL national security ADVISOR mechanism evaluation
下载PDF
Awareness of the Potential Threat of Cyberterrorism to the National Security
11
作者 Abdulrahman Alqahtani 《Journal of Information Security》 2014年第4期137-146,共10页
The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of sec... The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries, who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This paper uses qualitative data to develop a conceptual framework for awareness of cyberterrorism threat from the viewpoint of experts and security officials in critical infrastructure. Empirical data collected from in-depth interviews were analysed using grounded theory approach. This study applied to Saudi Arabia as a case study. 展开更多
关键词 CYBERTERRORISM TERRORISM national security Critical Infrastructure CONCEPTUAL Framework
下载PDF
On the Relations Between National Security and Human Rights Defined in the Constitution of the People’s Republic of China
12
作者 韩大元 JIANG Lin(译) 《The Journal of Human Rights》 2019年第5期551-563,共13页
Counterterrorism,de-radicalization and anti-violence are the major tasks of the international community.As the arch enemy of human rights,terrorism destroys the constitutional order and endangers people’s lives,freed... Counterterrorism,de-radicalization and anti-violence are the major tasks of the international community.As the arch enemy of human rights,terrorism destroys the constitutional order and endangers people’s lives,freedom and safety.It is the obligation of modern countries and the core value of legal states to safeguard human rights.Human rights should be effectively safeguarded under the premise of building a sound constitutional order and national security.public order and social stability foster a sound environment for the protection of human rights.In the face of terrorism’s severe threat to human rights,all countries are re-examining the order of human rights values and seeking mechanisms and procedures to balance National Security and Human Rights through their constitutions.The concepts of human rights and social order and the ways to explain the two are different due to different constitutional systems and cultural and religious traditions.However,they do have something in common,that is,counterterrorism and de-radicalization do not conflict with human rights protection.Efforts should be made to foster a view of human rights based on security and a view of security based on human rights,and a dynamic principle of proportionality established for counterterrorism and human rights protection,so endowing the traditional principle of proportionality with flexible,rich value connotation. 展开更多
关键词 national security TERRORISM human RIGHTS principle of PROPORTIONALITY
下载PDF
Rethinking National Security Strategies in Africa 被引量:2
13
作者 Luka Kuol Joel Amegboh 《International Relations and Diplomacy》 2021年第1期1-17,共17页
The delivery of security to state and citizens will continue to be the daunting task facing nation states in Africa.Many African countries are becoming increasingly unable to deliver security to their citizens and in ... The delivery of security to state and citizens will continue to be the daunting task facing nation states in Africa.Many African countries are becoming increasingly unable to deliver security to their citizens and in some instances;states themselves have become sources of insecurity.This is attributed less to the evolving security threats exacerbated by megatrends but more to the governance deficit manifested in weak social contract and strategic leadership that are short supply in many African countries.Despite a well-articulated security and defense policy of the African Union with a call for its member states to do the same,there is a dearth of national security strategies in most African states.This is largely attributed not only to the lack of effective implementation mechanisms of such policy but importantly to the absence of tools to help member states to craft and implement their national security strategies.There is a convincing wealth of evidence that shows a well-designed and inclusive process of developing national security strategies enables decision-makers to better confront the security threats and improve effective delivery of security to all citizens and state.Such a process provides an invaluable opportunity as well for forging a new social contract between state and its people.This article is an attempt to contribute to rethinking of how security could be perceived,planned,and delivered to the citizens in Africa. 展开更多
关键词 AFRICA security POLICY Strategy Human security State security security Threats
下载PDF
Eye on the Sky: A UAP Research and Field Study off New York’s Long Island Coast
14
作者 John Joseph Tedesco Gerald Thomas Tedesco 《Open Journal of Applied Sciences》 2024年第8期2267-2295,共29页
A ten-month field research study was meticulously conducted at Robert Moses State Park (RMSP) on the south shore of Long Island, NY. The objective was to determine if aerial phenomena of an unknown nature exist over a... A ten-month field research study was meticulously conducted at Robert Moses State Park (RMSP) on the south shore of Long Island, NY. The objective was to determine if aerial phenomena of an unknown nature exist over a coastal location and to characterize their properties and behaviors. Primary and secondary field observation methods were utilized in this data-centric study. Forensic engineering principles and methodologies guided the study. The challenges set forward were object detection, observation, and characterization, where multispectral electro-optical devices and radar were employed due to limited visual acuity and intermittent presentation of the phenomena. The primary means of detection utilized a 3 cm X-band radar operating in two scan geometries, the X- and Y-axis. Multispectral electro-optical devices were utilized as a secondary means of detection and identification. Data was emphasized using HF and LF detectors and spectrum analyzers incorporating EM, ultrasonic, magnetic, and RF field transducers to record spectral data in these domains. Data collection concentrated on characterizing VIS, NIR, SWIR, LWIR, UVA, UVB, UVC, and the higher energy spectral range of ionizing radiation (alpha, beta, gamma, and X-ray) recorded by Geiger-Müller counters as well as special purpose semiconductor diode sensors. 展开更多
关键词 Unidentified Anomalous Phenomenon (UAP) Forensic Techno-Signatures Office of the Director of national Intelligence (ODNI) Multispectral Electro-Optical (MEO) Ultraviolet A Radiation (UVA) Ultraviolet B Radiation (UVB) Ultraviolet C Radiation (UVC) Visible (VIS) Near-Infrared (NIR) Short-Wave Infrared (SWIR) Long-Wave Infrared (LWIR) Low-Frequency (LF) High-Frequency (HF) Radio-Frequency (RF) Alpha Beta Gamma Ultrasonic X-Band Active Radar Kinematics Aerodynamics Luminous Spheroids Robert Moses State Park (RMSP)
下载PDF
Reviewing the Adjustment of Japan’s National Security Strategy
15
作者 Meng Xiaoxu 《China International Studies》 2023年第2期83-106,共24页
In December 2022,the government of Japan’s Prime Minister,Fumio Kishida,adopted the National Security Strategy(NSS),the National Defense Strategy(NDS),and the Defense Buildup Program.The documents are collectively re... In December 2022,the government of Japan’s Prime Minister,Fumio Kishida,adopted the National Security Strategy(NSS),the National Defense Strategy(NDS),and the Defense Buildup Program.The documents are collectively referred to as the“three security documents,”and their formulation is based on Japan’s national interests and security requirements. 展开更多
关键词 STRATEGY PRIME security
下载PDF
Modeling and Implementation of a Data Security and Protection Medium Using the Generated Key Based on Electromagnetic Wave Propagation Theories
16
作者 Vincent Mbonigaba Fulgence Nahayo +3 位作者 Octave Moutsinga Dieudonné Okalas-Ossami Romeo Nibitanga Thérence Niyonsaba 《Journal of Computer and Communications》 2024年第9期131-140,共10页
Today, the advent of quantum computers and algorithms is calling into question the semantic security of symmetrical and asymmetrical cryptosystems. The security of objects connected to the network, which must provide ... Today, the advent of quantum computers and algorithms is calling into question the semantic security of symmetrical and asymmetrical cryptosystems. The security of objects connected to the network, which must provide a security service and protect the privacy of users by providing protection against attacks such as identity theft, denial of service, eavesdropping and unauthorised access to personal and sensitive data. It is therefore necessary to find a robust method of using the key that is effective in protecting and preventing data tampering. In this paper, we design and implement a security and data protection method using a key generated on the basis of electromagnetic wave propagation theories. Modelling and implementation of a data security and protection method using a key generated on the basis of electromagnetic wave propagation theories. 展开更多
关键词 MODELING security CRYPTOGRAPHY Algorithm CODING Quantum Post Bytes System WAVES
下载PDF
RESEARCH ON THE SECURITY OF NATIONAL GEOSPATIAL DATA CLEARINGHOUSE BASED ON ASP
17
作者 Zhang Li Gong Jianya Zhu Qing 《Geo-Spatial Information Science》 2000年第3期47-51,共5页
On the basis of the authors’ experiences of setting up an NGDC Web site,this paper attempts to present some significant aspects about the security of NGDC based on ASP.They include data storing,database maintenance,n... On the basis of the authors’ experiences of setting up an NGDC Web site,this paper attempts to present some significant aspects about the security of NGDC based on ASP.They include data storing,database maintenance,new technical support and so on.Firstly,this paper discusses how to provide the security of data which is saved in the hosts of NGDC.The security model of "Networks_DB Server_DB_DB Object" is also presented.In Windows NT Server,Internet Information Server (i.e.,IIS) is in charge of transferring message and the management of Web sites.ASP is also based on IIS.The advantages of virtual directory technique provided by IIS are emphasized. An NGDC Web site,at the Research Center of GIS in Wuhan Technical University of Surveying and Mapping is also mentioned in this paper.Because it is only an analoge used for case study,the transmission of digital spatial products is not included in the functions in this NGDC Web site.However,the management of spatial metadata is more important and some functions of metadata query are implemented in it.It is illustrated clearly in the functional diagram of the NGDC Web site. 展开更多
关键词 active server PAGES (ASP) national GEOSPATIAL data CLEARINGHOUSE (NGDC) GEOGRAPHIC information system (GIS) Internet
下载PDF
The New Military Revolution and International Security 被引量:1
18
作者 Feng Yujun Chen Yu 《Contemporary International Relations》 2019年第2期62-83,共22页
The fourth wave science and technology revolution is quickly ushering in a worldwide military revolution.The major powers such as the United States,Russia and China are all striving to catch up with the wave by accele... The fourth wave science and technology revolution is quickly ushering in a worldwide military revolution.The major powers such as the United States,Russia and China are all striving to catch up with the wave by accelerating their own research on new military technology and the deployment of new military equipment.This presents significant changes to the international security system:the existing disarmament and arms control system is on the brink of collapse,strategic competition among the big powers has intensified,and the risk of global turbulence is on the rise.The future of international security and its mechanism depends both on the method and direction of the technology revolution,and on the ability of the big powers to put aside their differences and avoid conflict in the major arenas of competition.In this process,China should seek to play a bigger and more constructive role.This would not only be conducive to world peace and development,but is also the only way for China to secure a seat in the future international system. 展开更多
关键词 new MILITARY REVOLUTION inter national security international strategy ARMS RACE DISARMAMENT and ARMS control
下载PDF
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
19
作者 Islam Zada Mohammed Naif Alatawi +4 位作者 Syed Muhammad Saqlain Abdullah Alshahrani Adel Alshamran Kanwal Imran Hessa Alfraihi 《Computers, Materials & Continua》 SCIE EI 2024年第8期2917-2939,共23页
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention mechanisms.Supervised machine learning classifiers have emerged as promising tools for malwar... Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention mechanisms.Supervised machine learning classifiers have emerged as promising tools for malware detection.However,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware detection.Addressing this gap can provide valuable insights for enhancing cybersecurity strategies.While numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware detection.Understanding the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security measures.This study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows systems.The objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows malware.Evaluating the accuracy,efficiency,and suitability of each classifier for real-world malware detection scenarios.Identifying the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and researchers.Offering recommendations for selecting the most effective classifier for Windows malware detection based on empirical evidence.The study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and evaluation.Exploratory data analysis involves understanding the dataset’s characteristics and identifying preprocessing requirements.Data preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for training.Model training utilizes various supervised classifiers,and their performance is evaluated using metrics such as accuracy,precision,recall,and F1 score.The study’s outcomes comprise a comparative analysis of supervised machine learning classifiers for Windows malware detection.Results reveal the effectiveness and efficiency of each classifier in detecting different types of malware.Additionally,insights into their strengths and limitations provide practical guidance for enhancing cybersecurity defenses.Overall,this research contributes to advancing malware detection techniques and bolstering the security posture of Windows systems against evolving cyber threats. 展开更多
关键词 security and privacy challenges in the context of requirements engineering supervisedmachine learning malware detection windows systems comparative analysis Gaussian Naive Bayes K Nearest Neighbors Stochastic Gradient Descent Classifier Decision Tree
下载PDF
Influence of Quantum Information Technology on International Security
20
作者 ZHAO Dongqian 《International Relations and Diplomacy》 2024年第1期26-33,共8页
Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technologic... Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technological revolution is poised to have a profound impact on the world.Quantum information technology encompasses both quantum computing and the transmission of quantum information.This article aims to integrate quantum information technology with international security concerns,exploring its implications for international security and envisioning its groundbreaking significance. 展开更多
关键词 quantum information technology quantum communication quantum computing international security
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部