315 research outputs found

    Network Supplier Credit Management: Models Based on Petri Net

    Get PDF
    In current credit evaluation methods, the credit condition of the network supplier and the credit degree of each index cannot be described well, and the credit evaluation data only source of the transaction platform have much limitation. This research proposes the method of calculating the importance and the value of the credit evaluation indexes, and proposes to put credit evaluation into big data environment. This research uses the transaction process of B2C as the case, and constructs multiple attribute weighted Petri net credit index subnet (CWPSN) for realizing the credit evaluation of the network supplier, and for presenting the correlations among the evaluation results of the credit evaluation indexes, and for presenting the importance of the indexes and the credit degree of each index, and describes the cost optimization process with credit cost optimization investment process Petri net (CCOIPPN). By the case to verify the credit evaluation method based on Petri net and the cost optimization method based on Petri net. The researches have provided methods for clearly and concretely describing the process of credit evaluation and cost optimization of network supplier, and have guidance significance for similar other researches

    EavesDroid: Eavesdropping User Behaviors via OS Side-Channels on Smartphones

    Full text link
    As the Internet of Things (IoT) continues to evolve, smartphones have become essential components of IoT systems. However, with the increasing amount of personal information stored on smartphones, user privacy is at risk of being compromised by malicious attackers. Although malware detection engines are commonly installed on smartphones against these attacks, attacks that can evade these defenses may still emerge. In this paper, we analyze the return values of system calls on Android smartphones and find two never-disclosed vulnerable return values that can leak fine-grained user behaviors. Based on this observation, we present EavesDroid, an application-embedded side-channel attack on Android smartphones that allows unprivileged attackers to accurately identify fine-grained user behaviors (e.g., viewing messages and playing videos) via on-screen operations. Our attack relies on the correlation between user behaviors and the return values associated with hardware and system resources. While this attack is challenging since these return values are susceptible to fluctuation and misalignment caused by many factors, we show that attackers can eavesdrop on fine-grained user behaviors using a CNN-GRU classification model that adopts min-max normalization and multiple return value fusion. Our experiments on different models and versions of Android smartphones demonstrate that EavesDroid can achieve 98% and 86% inference accuracy for 17 classes of user behaviors in the test set and real-world settings, highlighting the risk of our attack on user privacy. Finally, we recommend effective malware detection, carefully designed obfuscation methods, or restrictions on reading vulnerable return values to mitigate this attack.Comment: 15 pages, 25 figure

    Operation Mechanism for G2B System Based on Blockchain

    Get PDF
    The characteristics of blockchain as decentralization, transparency, business activity undeniable proof mechanism etc. have achieved extensive attention from the academic circles and industrial circles. In view of the current deficiency of poor data sharing in G2B system, data authenticity, data security, and transaction subject identity’s confidentiality cannot be effectively guaranteed, and the lack of authentication for government management departments (organization institutions) providing service or implementing management to enterprise businesses, this paper proposed to construct G2B system based on blockchain. Based on maintaining the architecture of traditional G2B system and the serviced or managed characteristics of enterprise businesses, was constructed respective G2B system based on blockchain for each section of enterprise business process. Each G2B system was based on blockchain correlated by the virtual links of enterprises and serviced or managed data for enterprises’ business, and constituted blockchain interconnection network. The protocol was designed and the characteristics of G2B system analyzed based on blockchain. Application mode for G2B system was designed based on blockchain. A case based on blockchain was designed, including business operation principle, consensus mechanism, and supervision to government (organization)

    Function risk assessment under memory leakage

    Get PDF

    CPS Information Security Risk Evaluation Based on Blockchain and Big Data

    Get PDF
    CPS (Cyber Physical Systems) have got wide application and research, and information security risk evaluation became the key for CPS greatly developing. In view of the physical structure and business characteristics of CPS, this paper constructs an information security risk evaluation system for CPS. In the process of risk evaluation, colligating the analysis results from experts and the analysis results of external data sources’ related big data for information security risk evaluation of CPS, by experts confirming the index system and indexes’ weight values for CPS information security risk evaluation, further through using evaluation model to realize the quantitative calculation to CPS information security risks. This paper proposes using blockchain technology to construct the data’s authenticity and reliability guarantee system for CPS and CPS related external systems, and constructing blockchain’s layered model structure based on CPS. In the part of case analysis, comparing and analysing the evaluation system based on blockchain and big data and the evaluation system based on traditional mode, to confirm the research value of this paper

    Enhancing Child Sexual Abuse Prevention Knowledge With an Educational Toolkit -Evaluation of the Chinese Doll Program

    Get PDF
    Objective: In countries with conservative attitudes towards sex and limited resources to prevent child sexual abuse, culturally adapted CSA prevention programs are essential. This study outlines a randomized controlled trial evaluating the effectiveness of the Doll program for preventing CSA in the specific context of China.Method: 181 children were pre-tested and post-tested (5 weeks later) for knowledge of sexual abuse prevention. Children were assigned to one of three groups; 1) child only (n = 60); 2) child and parent (n = 60); and 3) control (n = 61).Results: Children in groups 1 and 2 showed significant increases (p < 0.001) in scores on the Appropriate Touch Scale (ATS) and the Inappropriate Touch Scale (ITS), whereas those in the control group did not show a significant increase in ATS scores, but their scores on ITS significantly increased (p < 0.001). Children in group 2 showed significantly increased ITS scores compared to group 1 (p = 0.016).Conclusion: Doll program effectively enhances children’s CSA prevention knowledge, with parental engagement demonstrating a positive impact on the program
    • …
    corecore