26 research outputs found

    An Improved Lower Bound of The Spark With Application

    Full text link
    Spark plays a great role in studying uniqueness of sparse solutions of the underdetermined linear equations. In this article, we derive a new lower bound of spark. As an application, we obtain a new criterion for the uniqueness of sparse solutions of linear equations.Comment: 8 page

    Symbian `vulnerability' and Mobile Threats

    Full text link
    Modern technologies are becoming ever more integrated with each other. Mobile phones are becoming increasing intelligent, and handsets are growing ever more like computers in functionality. We are entering a new era - the age of smart houses, global advanced networks which encompass a wide range of devices, all of them exchanging data with each other. Such trends clearly open new horizons to malicious users, and the potential threats are self evident. In this paper, we study and discuss one of the most famous mobile operating systems 'Symbian'; its vulnerabilities and recommended protection technologies.Comment: 4 pages; International Journal of Computer Science and Information Security (IJCSIS), Vol. 9, No. 10, (2011

    Some Recommended Protection Technologies for Cyber Crime Based on Social Engineering Techniques -- Phishing

    Full text link
    Phishing (password + fishing) is a form of cyber crime based on social engineering and site spoofing techniques. The name of 'phishing' is a conscious misspelling of the word 'fishing' and involves stealing confidential data from a user's computer and subsequently using the data to steal the user's money. In this paper, we study, discuss and propose the phishing attack stages and types, technologies for detection of phishing web pages, and conclude our paper with some important recommendations for preventing phishing for both consumer and company.Comment: 5 pages; Journal of Communication and Computer, USA, Vol. 8, No. 7, (2011

    Software Vulnerabilities, Banking Threats, Botnets and Malware Self-Protection Technologies

    Full text link
    Information security is the protection of information from a wide range of threats in order to ensure success business continuity by minimizing risks and maximizing the return of investments and business opportunities. In this paper, we study and discuss the software vulnerabilities, banking threats, botnets and propose the malware self-protection technologies.Comment: 5 page

    Cyber threats in social networking websites

    Full text link
    A social network is a social structure made up of individuals or organizations called nodes, which are connected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sources, including foreign nations engaged in espionage and information warfare, criminals, hackers, virus writers, disgruntled employees and contractors working within an organization. Social networking sites are not only to communicate or interact with other people globally, but also one effective way for business promotion. In this paper, we investigate and study the cyber threats in social networking websites. We go through the amassing history of online social websites, classify their types and also discuss the cyber threats, suggest the anti-threats strategies and visualize the future trends of such hoppy popular websites.Comment: 8 pages; International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January 201

    A Dual Approach for Solving Nonlinear Infinite-Norm Minimization Problems with Applications in Separable Cases

    Full text link
    In this paper, we focus on nonlinear infinite-norm minimization problems that have many applications, especially in computer science and operations research. We set a reliable Lagrangian dual aproach for solving this kind of problems in general, and based on this method, we propose an algorithm for the mixed linear and nonlinear infinite-norm minimization cases with numerical results.Comment: 10 page

    A Tight Linearization Strategy for Zero-One Quadratic Programming Problems

    Full text link
    In this paper, we present a new approach to linearizing zero-one quadratic minimization problem which has many applications in computer science and communications. Our algorithm is based on the observation that the quadratic term of zero-one variables has two equivalent piece-wise formulations, convex and concave cases. The convex piece-wise objective function and/or constraints play a great role in deducing small linearization. Further tight strategies are also discussed.Comment: 6 page

    Security Risks and Modern Cyber Security Technologies for Corporate Networks

    Full text link
    This article aims to highlight current trends on the market of corporate antivirus solutions. Brief overview of modern security threats that can destroy IT environment is provided as well as a typical structure and features of antivirus suits for corporate users presented on the market. The general requirements for corporate products are determined according to the last report from av-comparatives.org [1]. The detailed analysis of new features is provided based on an overview of products available on the market nowadays. At the end, an enumeration of modern trends in antivirus industry for corporate users completes this article. Finally, the main goal of this article is to stress an attention about new trends suggested by AV vendors in their solutions in order to protect customers against newest security threats.Comment: 5 page

    Studying and Classification of the Most Significant Malicious Software

    Full text link
    As the cost of information processing and Internet accessibility falls, most organizations are becoming increasingly vulnerable to potential cyber threats which its rate has been dramatically increasing every year in recent times. In this paper, we study, discuss and classify the most significant malicious software: viruses, Trojans, worms, adware and pornware which have made step forward in the science of Virology.Comment: 5 page

    Protein Threading Based on Nonlinear Integer Programming

    Full text link
    Protein threading is a method of computational protein structure prediction used for protein sequences which have the same fold as proteins of known structures but do not have homologous proteins with known structure. The most popular algorithm is based on linear integer programming. In this paper, we consider methods based on nonlinear integer programming. Actually, the existing linear integer programming is directly linearized from the original quadratic integer programming. We then develop corresponding efficient algorithms.Comment: 5 pages. arXiv admin note: substantial text overlap with arXiv:1204.456
    corecore