PERMISSION

作品数:139被引量:68H指数:4
导出分析报告
相关作者:张中文王跃武雷灵光郑林娟邱道龙更多>>
相关机构:清华大学中国科学院山东大学江苏大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划高等学校学科创新引智计划江苏省教育厅自然科学基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure
《Computers, Materials & Continua》2024年第4期1705-1726,共22页Aodi Liu Na Wang Xuehui Du Dibin Shan Xiangyu Wu Wenjuan Wang 
Key Research and Development and Promotion Program of Henan Province(No.222102210069);Zhongyuan Science and Technology Innovation Leading Talent Project(224200510003);National Natural Science Foundation of China(No.62102449).
Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy...
关键词:Big data access control data security BiLSTM 
Covalent Bond Based Android Malware Detection Using Permission and System Call Pairs
《Computers, Materials & Continua》2024年第3期4283-4301,共19页Rahul Gupta Kapil Sharma R.K.Garg 
The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and...
关键词:ANDROID MALWARE android security hybrid analysis permission and system call pairs 
Explainable Classification Model for Android Malware Analysis Using API and Permission-Based Features
《Computers, Materials & Continua》2023年第9期3167-3188,共22页Nida Aslam Irfan Ullah Khan Salma Abdulrahman Bader Aisha Alansari Lama Abdullah Alaqeel Razan Mohammed Khormy Zahra Abdultawab AlKubaish Tariq Hussain 
funded by the SAUDI ARAMCO Cybersecurity Chair at Imam Abdulrahman Bin Faisal University,Saudi Arabia.
One of the most widely used smartphone operating systems,Android,is vulnerable to cutting-edge malware that employs sophisticated logic.Such malware attacks could lead to the execution of unauthorized acts on the vict...
关键词:Android malware machine learning malware detection explainable artificial intelligence cyber security 
ArgusDroid:detecting Android malware variants by mining permission-API knowledge graph被引量:3
《Science China(Information Sciences)》2023年第9期111-129,共19页Yude BAI Sen CHEN Zhenchang XING Xiaohong LI 
National Natural Science Foundation of China(Grant Nos.62102284,61872262)。
Malware family variants make minor and relevant changes of behaviors based on the original malware.To analyze and detect family variants,security experts must not only understand malware behaviors but also further obs...
关键词:malicious behavior Android document knowledge graph malware family variant machine learning 
Blockchain-based multi-hop permission delegation scheme with controllable delegation depth for electronic health record sharing
《High-Confidence Computing》2022年第4期14-22,共9页Ya Gao Aiqing Zhang Shu Wu Jindou Chen 
supported by the National Natural Science Foundation of China(No.62072005);Natural Science Foundation of Anhui Province,China(No.2108085Y22);Anhui Provincial Engineering Laboratory on Information Fusion and Control of Intelligent Rabot,China(No.IFCIR2020008).
Permission delegation has become a new way for data sharing by delegating the authorized permission to other users.A flexible authorization model with strict access control policies is promising for electronic health ...
关键词:Blockchain Data security Permission delegation Access control Smart contract 
A Traceable Capability-based Access Control for IoT
《Computers, Materials & Continua》2022年第9期4967-4982,共16页Chao Li Fan Li Cheng Huang Lihua Yin Tianjie Luo Bin Wang 
This work supports in part by National Key R&D Program of China(No.2018YFB2100400);National Science Foundation of China(No.61872100);Industrial Internet Innovation and Development Project of China(2019);State Grid Corporation of China Co.,Ltd.technology project(No.5700-202019187A-0-0-00).
Delegation mechanism in Internet of Things(IoT)allows users to share some of their permissions with others.Cloud-based delegation solutions require that only the user who has registered in the cloud can be delegated p...
关键词:IoT access control permission delegation delegation trajectory capability revocation capability modification 
Android Malware Detection Method Based on Permission Complement and API Calls被引量:2
《Chinese Journal of Electronics》2022年第4期773-785,共13页YANG Jiyun TANG Jiang YAN Ran XIANG Tao 
supported by the Technological Innovation and Application Projects of Chongqing(cstc2019jscx-msxmX0077).
The dynamic code loading mechanism of the Android system allows an application to load executable files externally at runtime.This mechanism makes the development of applications more convenient,but it also brings sec...
关键词:ANDROID Malware detection Dynamic code loading Permission complement 
基于API和Permission的Android恶意软件静态检测方法研究被引量:3
《计算机应用与软件》2020年第4期53-58,104,共7页杨鸣坤 罗锦光 欧跃发 慕德俊 
国家自然科学基金项目(61672433);桂林航天工业学院电子信息重点学科/物联网与大数据应用研究中心成果项目(KJPT201811);钦州市“互联网+先进制造”工程技术研究中心2017年重点开放课题(2017QGKZ03)。
当前大量的Android恶意软件在后台收集用户的位置信息、通话记录、电话号码及短信等信息并将其上传至指定服务器,造成了难以估量的危害。为解决此问题,提出一种Android恶意软件静态检测方法。对收集到的训练集中的所有APK文件进行静态...
关键词:ANDROID 恶意软件 静态检测 PERMISSION 机器学习 
Creeper:a tool for detecting permission creep in file system access controls被引量:1
《Cybersecurity》2019年第1期239-252,共14页Simon Parkinson Saad Khan James Bray Daiyaan Shreef 
This work was undertaken during a project funded by the UK’s Digital Catapult Researcher in Residency Fellowship programme(Grant Ref:EP/M029263/1).The funding supported the research,development,and empirical testing presented in this paper.
Access control mechanisms are widely used in multi-user IT systems where it is necessary to restrict access to computing resources.This is certainly true of file systems whereby information needs to be protected again...
关键词:Permission creep Access control AUDITING χ^2 statistics 
Permission to Fail
《初中生必读》2019年第11期37-38,共2页卢爱龙 
Each of us fails from time to time. If we are wise, we accept these failures as a necessary part of the learning process.Daniel, my youngest third-grader, was a shy, nervous kid. His fear of failure kept him from clas...
关键词:PERMISSION to Fail 
检索报告 对象比较 聚类工具 使用帮助 返回顶部