Loading...
Toggle navigation
Home
About
About Journal
Editorial Board
Author Center
Current Issue
Just Accepted
Archive
Most Read Articles
Most Download Articles
Most Cited Articles
E-mail Alert
RSS
Reader Center
Online Submission
Manuscript Tracking
Instruction
Download
Review Center
Peer Review
Office Work
Editor-in-Chief
Subscription
Contact Us
中文
Table of Content
15 October 2016, Volume 2 Issue 10
Previous Issue
Next Issue
“Internet +”Power: Overview of Westone Secruity’s Cyber Secruity
2016, 2(10): 862-875.
Asbtract
(
)
PDF
(2788KB) (
)
Related Articles
|
Metrics
Development of Authenticated Encryption
2016, 2(10): 876-882.
Asbtract
(
)
PDF
(5382KB) (
)
Related Articles
|
Metrics
Authenticated encryption scheme achieves both confidentiality and integrity, which brings a wide range of research and application scenarios. Its design involves block ciphers, hash functions, stream ciphers and other research. It covers all aspects of symmetric cryptography and has good theoretical study and practical value. The design and analysis methods of authenticated encryption are becoming maturer. In recent years, CAESAR competition set off a new round of research upsurge of authenticated encryption scheme. A large number of new design are springing up, providing some good study models to related fields. While there are still some unresolved issues and challenges for future research, worthy of further analysis and discussion. This paper discusses advances in authenticated encryption schemes, design patterns, related problems and challenges and future study trends and makes the corresponding overview and summary.
The Definition, Understandings and Responses of Cyberterrorism
2016, 2(10): 882-887.
Asbtract
(
)
PDF
(5506KB) (
)
Related Articles
|
Metrics
Cyberterrorism is a major issue of cyber security. However, due to the combination of cyberspace and terrorism, cyberterrorism is also a controversial term. It covers not only terrorism targeting cyberspace but also usage of cyberspace for terrorist activities; currently, the former is still not a real threat while the latter is quite common, and most of the terrorist activities now in the digital age can be grouped into the second category. To counter cyberterrorism, IT and cyberspace can also be used to spy on and gain advantage over terrorist activities, while the real data of terrorist activities can be employed to make adaptive responses.
Research on Stegnanlytic Techniques Under the Condition of Limited Prior Knowledge
2016, 2(10): 888-895.
Asbtract
(
)
PDF
(7081KB) (
)
Related Articles
|
Metrics
Steganalysis, as the countermeasure of steganography, mainly concentrates on the detection, prevention and destruction of the possible steganography based on covert communication behaviors on the Internet. Research in practical steganographic analysis technology plays an important role in fighting against the steganography abuse by terrorist groups and criminals and maintaining national security and social stability. This paper firstly introduces the research significance and related works in the past, and then proposes the new steganalysis framework to address urgently needed image steganalysis with limited prior knowledge. Taking plentiful, multiple and typical data as study objects, this paper focuses on studying the methods to construct over?completed steganographic analysis feature bases, using these feature bases to represent testing samples and predicting the steganography method of testing samples according to the representing coefficients, which provides theoretical and technical support for developing steganalysis schemes with higher accuracy and better practicality.
Research on Privacy Protection Reference Architecture for Personal Data Under Information Propagation
2016, 2(10): 896-902.
Asbtract
(
)
PDF
(6698KB) (
)
Related Articles
|
Metrics
With the explosive expansion of big data, personal data has become important resource of data industry. The indiscriminate collection of personal data, data abuse, and widespread black market transactions make the protection of personal data privacy become a very pressing issue. In this context, we make a close study of privacy protection of personal data. For the particular characteristics of privacy leakage, we investigate the sources and the pathways of personal data, to obtain the model of data collection, data transmission, data diffusion and data derivatives. Then we present privacy protection reference architecture for personal data under information propagation, composed of technology, management, and legal regulations. Furthermore, we present the future study issue, namely privacy protection reference architecture for personal data under data mining.
The Detecting Algorithm of Pornographic Image Based on Deep Learning and Model Cascade
2016, 2(10): 903-908.
Asbtract
(
)
PDF
(5764KB) (
)
Related Articles
|
Metrics
In the Internet era, as people communicating and data exchanging frequently, the spread of malicious information is becoming more and more serious. Therefore, it is particularly important to identify and filter pornographic images on the Internet. In recent years, the appearance of deep learning has greatly pushed forward the frontier of computer vision research, and computer vision tasks like image classification and recognition have greatly benefited from it. Compared with traditional methods, the features automatically extracted by deep model have better representing power. In this paper, we propose a pornographic image detection method based on the deep learning and model cascade. For the sake of getting better features, the strategy of fine?to?coarse classification is adopted to deal with the diversification of data distribution. Specifically, faced with the problem of pornographic cover detection, we combine traditional image processing methods and deep learning model. As a result, it improves the performance of cover detection effectively.
Research on the Audio Information Hiding Algorithms Based on Mean Quantization
2016, 2(10): 909-912.
Asbtract
(
)
PDF
(3215KB) (
)
Related Articles
|
Metrics
We presented a new blind digital audio information hiding algorithms based on DWT and mean quantization. In order to achieve the high imperceptibility, the modification of wavelet coefficients was reduced by piecewise adjustment the quantized area. The ability of resisting attack was also improved by adjustment the boundary value with poor resistance to attack. Experimental results demonstrate that the proposed method has a better Signal Noise Ratio (SNR) than the current mean quantization algorithm, and the Normalized Cross?Correlation (NC) has also a certain amount of improvement.
Research and Implementation of Access Control Method for Big Data Platform
2016, 2(10): 913-919.
Asbtract
(
)
PDF
(7525KB) (
)
Related Articles
|
Metrics
The emergence and development of big data technology, in the gradual impact of the development of the operator?s business at the same time, its security issues can not be ignored. Under this background, the study of unified access and centralized management of entrance account permissions for big data platform, big data platform interface to provide centralized, centralized management of user access to big data platform, big data platform to access the user?s identity authentication and access control, to enhance the data security access platform objective. In the process of access control method research of big data platform using agent technology, according using agent of Hadoop, HBase, Hive to the different components of big data platform, the agent is able to hide the real target and execute the safety strategy and operation risk blocking effect, improve the safety of big data platform.
The Key Questions and Development of Studies on Cyber Deterrence
2016, 2(10): 920-925.
Asbtract
(
)
PDF
(5617KB) (
)
Related Articles
|
Metrics
As a strategy of defense, deterrence doctrine is usually used in traditional strategic spaces including the land, sea, air and outer space, and is deemed to be valid. But, in consideration that cyberspace is fundamentally different in all aspects from traditional strategic spaces, it is so controversial whether deterrence theory can be used to secure cyberspace. Based on these considerations above, this paper combed and summarized academic debates on cyber deterrence among American, European and Chinese scholars. The authors think: 1) cyber deterrence research is not only valuable on policy decision?making but also on security theory development; 2) if deterrence as a strategy to secure cyberspace can be enforced, two questions must be studied firstly: ① we must engage and understand the role of punishment in different kinds of cyber attacks; ② we must clarify the responsibility of the third parties, work and promote security cooperation with all stakeholders.
Research and Implementation of Access Control Method for Big Data Platform
2016, 2(10): 926-930.
Asbtract
(
)
PDF
(4271KB) (
)
Related Articles
|
Metrics
The emergence and development of big data technology, in the gradual impact of the development of the operator?s business at the same time, its security issues can not be ignored. Under this background, the study of unified access and centralized management of entrance account permissions for big data platform, big data platform interface to provide centralized, centralized management of user access to big data platform, big data platform to access the user?s identity authentication and access control, to enhance the data security access platform objective. In the process of access control method research of big data platform using agent technology, according using agent of Hadoop, HBase, Hive to the different components of big data platform, the agent is able to hide the real target and execute the safety strategy and operation risk blocking effect, improve the safety of big data platform.
Research on Network Trusted Identity Management System
2016, 2(10): 931-935.
Asbtract
(
)
PDF
(3845KB) (
)
Related Articles
|
Metrics
The General Theory of Security(16) — Bionomics of Hacker
2016, 2(10): 936-945.
Asbtract
(
)
PDF
(1197KB) (
)
Related Articles
|
Metrics
The Totlal Solution of Cyber Security in Critical Information Infrastructure
2016, 2(10): 946-951.
Asbtract
(
)
PDF
(1455KB) (
)
Related Articles
|
Metrics
The Approach and Strategy of Qingdao Municipal Government Big Data Security System Construction
2016, 2(10): 952-956.
Asbtract
(
)
PDF
(940KB) (
)
Related Articles
|
Metrics
Author Center
Online Submission
Instruction
Template
Copyright Agreement
Review Center
Peer Review
Editor Work
Editor-in-Chief
Office Work