基于大数据分析的 APT 攻击检测研究综述

付钰, **洪成, 吴晓**, 王甲生 - 通信学报, 2015 - infocomm-journal.com
高级持续性威胁(APT, advanced persistent threat) 已成为高安全等级网络的最主要威胁之一,
其极**的针对性, 伪装性和阶段性使传统检测技术无法有效识别, 因此新型攻击检测技术成为 …

[PDF][PDF] Detecting APT attacks: a survey from the perspective of big data analysis

Y Fu, H Li, X Wu, J Wang - Journal on Communications, 2015 - infocomm-journal.com
Advanced persistent threats have become the major threats of highly protected networks.
Traditional detecting technologies were not able to find out APT attacks which were targeted …

A trust-based collaborative access control model with policy aggregation for online social networks

NC Rathore, S Tripathy - Social Network Analysis and Mining, 2017 - Springer
Online social network (OSN) has become one of the primary means of interaction and digital
information sharing among individuals. Preserving information privacy is indispensable in …

IRIS: A novel method of direct trust computation for generating trusted social networks

S Hamdi, AL Gancarski, A Bouzeghoub… - 2012 IEEE 11th …, 2012 - ieeexplore.ieee.org
Improving trust in social networks appears as the first step toward addressing the existing
confidence and privacy concerns related to online social networks. Direct trust is used to …

Relationship strength based access control in online social networks

A Kumar, NC Rathore - Proceedings of First International Conference on …, 2016 - Springer
Online social networking site is a platform, where a person can communicate with others by
creating his own profile. Lots of contents (eg, photos, videos, etc.) are being generated every …

isac: Intimacy based access control for social network sites

Y Wang, E Zhai, EK Lua, J Hu… - 2012 9th International …, 2012 - ieeexplore.ieee.org
Participation in social networking sites has dramatically increased in recent years. Users on
social networking sites spend lots of time generating large quantities of various personal …

Access control in social networks: a reachability-based approach

IB Dhia - Proceedings of the 2012 Joint EDBT/ICDT Workshops, 2012 - dl.acm.org
Nowadays, social networks are attracting more and more users. These social network
subscribers may share personal and sensitive information with a large number of possibly …

Carte auto-organisatrice pour graphes étiquetés.

N Villa-Vialaneix, M Olteanu… - Atelier Fouilles de …, 2013 - hal.science
Dans de nombreux cas d'études concrets, l'analyse de données sur les graphes n'est pas
limitée à la seule connaissance du graphe. Il est courant que des informations …

Efficient sink-reachability analysis via graph reduction

J Dietrich, L Chang, L Qian, LM Henry… - … on Knowledge and …, 2021 - ieeexplore.ieee.org
The reachability problem on directed graphs, asking whether two vertices are connected via
a directed path, is an elementary problem that has been well-studied. In this paper, we study …

PePPer: Fine-grained personal access control via peer probing

Y Amsterdamer, O Drien - 2019 IEEE 35th International …, 2019 - ieeexplore.ieee.org
Users share data on multiple platforms where access control is managed according to the
platform-specific policy. However, some data is conceptually owned by peers in a manner …