27 research outputs found
An Improved Lower Bound of The Spark With Application
Spark plays a great role in studying uniqueness of sparse solutions of the
underdetermined linear equations. In this article, we derive a new lower bound
of spark. As an application, we obtain a new criterion for the uniqueness of
sparse solutions of linear equations.Comment: 8 page
Symbian `vulnerability' and Mobile Threats
Modern technologies are becoming ever more integrated with each other. Mobile
phones are becoming increasing intelligent, and handsets are growing ever more
like computers in functionality. We are entering a new era - the age of smart
houses, global advanced networks which encompass a wide range of devices, all
of them exchanging data with each other. Such trends clearly open new horizons
to malicious users, and the potential threats are self evident. In this paper,
we study and discuss one of the most famous mobile operating systems 'Symbian';
its vulnerabilities and recommended protection technologies.Comment: 4 pages; International Journal of Computer Science and Information
Security (IJCSIS), Vol. 9, No. 10, (2011
Some Recommended Protection Technologies for Cyber Crime Based on Social Engineering Techniques -- Phishing
Phishing (password + fishing) is a form of cyber crime based on social
engineering and site spoofing techniques. The name of 'phishing' is a conscious
misspelling of the word 'fishing' and involves stealing confidential data from
a user's computer and subsequently using the data to steal the user's money. In
this paper, we study, discuss and propose the phishing attack stages and types,
technologies for detection of phishing web pages, and conclude our paper with
some important recommendations for preventing phishing for both consumer and
company.Comment: 5 pages; Journal of Communication and Computer, USA, Vol. 8, No. 7,
(2011
Software Vulnerabilities, Banking Threats, Botnets and Malware Self-Protection Technologies
Information security is the protection of information from a wide range of
threats in order to ensure success business continuity by minimizing risks and
maximizing the return of investments and business opportunities. In this paper,
we study and discuss the software vulnerabilities, banking threats, botnets and
propose the malware self-protection technologies.Comment: 5 page
Cyber threats in social networking websites
A social network is a social structure made up of individuals or
organizations called nodes, which are connected by one or more specific types
of interdependency, such as friendship, common interest, and exchange of
finance, relationships of beliefs, knowledge or prestige. A cyber threat can be
both unintentional and intentional, targeted or non targeted, and it can come
from a variety of sources, including foreign nations engaged in espionage and
information warfare, criminals, hackers, virus writers, disgruntled employees
and contractors working within an organization. Social networking sites are not
only to communicate or interact with other people globally, but also one
effective way for business promotion. In this paper, we investigate and study
the cyber threats in social networking websites. We go through the amassing
history of online social websites, classify their types and also discuss the
cyber threats, suggest the anti-threats strategies and visualize the future
trends of such hoppy popular websites.Comment: 8 pages; International Journal of Distributed and Parallel Systems
(IJDPS) Vol.3, No.1, January 201
A Dual Approach for Solving Nonlinear Infinite-Norm Minimization Problems with Applications in Separable Cases
In this paper, we focus on nonlinear infinite-norm minimization problems that
have many applications, especially in computer science and operations research.
We set a reliable Lagrangian dual aproach for solving this kind of problems in
general, and based on this method, we propose an algorithm for the mixed linear
and nonlinear infinite-norm minimization cases with numerical results.Comment: 10 page
A Tight Linearization Strategy for Zero-One Quadratic Programming Problems
In this paper, we present a new approach to linearizing zero-one quadratic
minimization problem which has many applications in computer science and
communications. Our algorithm is based on the observation that the quadratic
term of zero-one variables has two equivalent piece-wise formulations, convex
and concave cases. The convex piece-wise objective function and/or constraints
play a great role in deducing small linearization. Further tight strategies are
also discussed.Comment: 6 page
Security Risks and Modern Cyber Security Technologies for Corporate Networks
This article aims to highlight current trends on the market of corporate
antivirus solutions. Brief overview of modern security threats that can destroy
IT environment is provided as well as a typical structure and features of
antivirus suits for corporate users presented on the market. The general
requirements for corporate products are determined according to the last report
from av-comparatives.org [1]. The detailed analysis of new features is provided
based on an overview of products available on the market nowadays. At the end,
an enumeration of modern trends in antivirus industry for corporate users
completes this article. Finally, the main goal of this article is to stress an
attention about new trends suggested by AV vendors in their solutions in order
to protect customers against newest security threats.Comment: 5 page
Studying and Classification of the Most Significant Malicious Software
As the cost of information processing and Internet accessibility falls, most
organizations are becoming increasingly vulnerable to potential cyber threats
which its rate has been dramatically increasing every year in recent times. In
this paper, we study, discuss and classify the most significant malicious
software: viruses, Trojans, worms, adware and pornware which have made step
forward in the science of Virology.Comment: 5 page
Protein Threading Based on Nonlinear Integer Programming
Protein threading is a method of computational protein structure prediction
used for protein sequences which have the same fold as proteins of known
structures but do not have homologous proteins with known structure. The most
popular algorithm is based on linear integer programming. In this paper, we
consider methods based on nonlinear integer programming. Actually, the existing
linear integer programming is directly linearized from the original quadratic
integer programming. We then develop corresponding efficient algorithms.Comment: 5 pages. arXiv admin note: substantial text overlap with
arXiv:1204.456