Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits.It has been common since 2017,and in fact,it once beca...Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits.It has been common since 2017,and in fact,it once became the greatest threat to network security.To better prove the attack ability the harm caused by cryptojacking,this paper proposes a new covert browser-based mining attack model named Delay-CJ,this model was deployed in a simulation environment for evaluation.Based on the general framework of cryptojacking,Delay-CJ adds hybrid evasion detection techniques and applies the delayed execution strategy specifically for video websites in the prototype implementation.The results show that the existing detection methods used for testing may become invalid as result of this model.In view of this situation,to achieve a more general and robust detection scheme,we built a cryptojacking detection system named CJDetector,which is based on cryptojacking process features.Specifically,it identifies malicious mining by monitoring CPU usage and analyzing the function call information.This system not only effectively detects the attack in our example but also has universal applicability.The recognition accuracy of CJDetector reaches 99.33%.Finally,we tested the web pages in Alexa 50K websites to investigate cryptojacking activity in the real network.We found that although cryptojacking is indeed on the decline,it remains a part of network security threats that cannot be ignored.展开更多
Alzheimer's disease (AD), a fatal, progressive, neurodegener- ative disorder, is the most common cause of old-age demen- tia, accounting for 50-75% of dementia patients. Early stages of AD are marked by vocabulary ...Alzheimer's disease (AD), a fatal, progressive, neurodegener- ative disorder, is the most common cause of old-age demen- tia, accounting for 50-75% of dementia patients. Early stages of AD are marked by vocabulary shrinkage, spatial disori- entation, depression, apraxia, and deterioration of recent forms of declarative memory. In course of time, the patients require close supervision due to the loss of cognitive and functional abilities, and at the terminal stages of the disease, all forms of memory are severely impaired with the patients needing nursing home care (World Alzheimer Report, 2013).展开更多
This paper provides a mathematical model for the billet reheating process in furnace.A new optimum method is brought up that the objective function is the integral value of enthalpy increasing process of a billet.Diff...This paper provides a mathematical model for the billet reheating process in furnace.A new optimum method is brought up that the objective function is the integral value of enthalpy increasing process of a billet.Different delays are simulated and calculated,some proper delay strategies are ob- tained.The on-line computer control model is de- veloped.The real production conditions simulated, the temperature deviation of drop out billet from the target temperature is kept within±15℃.展开更多
In this paper, we study the protection strategies of domestic optical fiber networks in Taiwan. Delay time experiment of two one-link failed cases are also reported and compared. We can get best protection strategy an...In this paper, we study the protection strategies of domestic optical fiber networks in Taiwan. Delay time experiment of two one-link failed cases are also reported and compared. We can get best protection strategy and bypass the optical transmission signal at shortest delay time.展开更多
基金This work is partially sponsored by National Key R&D Program of China(No.2019YFB2101700)National Science Foundation of China(No.62172297,No.61902276)+1 种基金the Key Research and Development Project of Sichuan Province(No.2021YFSY0012)Tianjin Intelligent Manufacturing Special Fund Project(No.20211097,No.20201159).
文摘Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits.It has been common since 2017,and in fact,it once became the greatest threat to network security.To better prove the attack ability the harm caused by cryptojacking,this paper proposes a new covert browser-based mining attack model named Delay-CJ,this model was deployed in a simulation environment for evaluation.Based on the general framework of cryptojacking,Delay-CJ adds hybrid evasion detection techniques and applies the delayed execution strategy specifically for video websites in the prototype implementation.The results show that the existing detection methods used for testing may become invalid as result of this model.In view of this situation,to achieve a more general and robust detection scheme,we built a cryptojacking detection system named CJDetector,which is based on cryptojacking process features.Specifically,it identifies malicious mining by monitoring CPU usage and analyzing the function call information.This system not only effectively detects the attack in our example but also has universal applicability.The recognition accuracy of CJDetector reaches 99.33%.Finally,we tested the web pages in Alexa 50K websites to investigate cryptojacking activity in the real network.We found that although cryptojacking is indeed on the decline,it remains a part of network security threats that cannot be ignored.
基金in part supported by the German Ministry for Education and Research (BMBF) special network program KMU-Innovativ-2
文摘Alzheimer's disease (AD), a fatal, progressive, neurodegener- ative disorder, is the most common cause of old-age demen- tia, accounting for 50-75% of dementia patients. Early stages of AD are marked by vocabulary shrinkage, spatial disori- entation, depression, apraxia, and deterioration of recent forms of declarative memory. In course of time, the patients require close supervision due to the loss of cognitive and functional abilities, and at the terminal stages of the disease, all forms of memory are severely impaired with the patients needing nursing home care (World Alzheimer Report, 2013).
文摘This paper provides a mathematical model for the billet reheating process in furnace.A new optimum method is brought up that the objective function is the integral value of enthalpy increasing process of a billet.Different delays are simulated and calculated,some proper delay strategies are ob- tained.The on-line computer control model is de- veloped.The real production conditions simulated, the temperature deviation of drop out billet from the target temperature is kept within±15℃.
文摘In this paper, we study the protection strategies of domestic optical fiber networks in Taiwan. Delay time experiment of two one-link failed cases are also reported and compared. We can get best protection strategy and bypass the optical transmission signal at shortest delay time.