A survey of browser fingerprint research and application

D Zhang, J Zhang, Y Bu, B Chen… - … and Mobile Computing, 2022 - Wiley Online Library
With the development of modern browsing, the convenience brought by rich browser
features has also produced a large number of features, which are called browser …

Adaptive authentication system based on unsupervised learning for web-oriented platforms

AY Iskhakov, YY Khazanova, MV Mamchenko… - Mobile Computing and …, 2023 - Springer
This paper considers the problem of internal threats caused by the actions that are
performed by the employees who have legal access to the company's data or by the …

Blockchain-Based Decentralized Federated Learning Model

H Wang, D Mao, Z Chen, H Rao… - 2023 4th International …, 2023 - ieeexplore.ieee.org
As a decentralized technology, blockchain has the characteristics of traceability and
immutability. Using blockchain technology, each model update of federation information can …

Power data attribution revocation searchable encrypted cloud storage

J Li, T Zhang - 2023 3rd International Conference on Consumer …, 2023 - ieeexplore.ieee.org
Grid business data contains a large amount of electricity data customer privacy data, serving
more than 1.1 billion people, involving personnel, financial, material, assets and other ten …

Been Here Already? Detecting Synchronized Browsers in the Wild

P Ioannou, E Athanasopoulos - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Browsers have become the most popular and used platform for accessing the web. Their
wide and exclusive usage as a medium for doing several tasks in the Internet comes with …

The TaintDroid Based Honeypot Monitoring System for Embedded Device

K Cheng, Z Wu, D Li, X Li, M Ren - Journal of Physics …, 2022 - iopscience.iop.org
Honeypot is a proactive defense technology introduced by defenders. Through the
honeypots, defenders can deceive attackers to illegally take advantage of the honeypots …

Sucurity Protection Framework for Power 5G Services Based on Zero-Trust Model

P Zhou, Y Guo, X Chen, L Chen… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
The Energy Internet is one of the core components of the Industrial Internet, with trillions of
terminals connected to the network, linking all aspects of energy production, transmission …

Browser Fingerprinting: Overview and Open Challenges

M Hölbl, V Zadorozhny… - Information …, 2024 - ebooks.iospress.nl
The central concept of browser fingerprinting is the collection of device-specific information
for identification or security purposes. This chapter provides an overview of the research …

Application of Advanced Systems of User Identification in APCS Control Subsystems

RV Meshcheryakov, AY Iskhakov… - … Management of large …, 2023 - ieeexplore.ieee.org
This paper presents research on applying the user identification subsystem for industrial
automation systems. Within the framework of this study, we propose software and hardware …

Secure Access for Massive Devices in the Industrial Internet of Things (IIoT)

B Zhang, Z Xi, J Zhou, C He, B Lu… - 2023 4th International …, 2023 - ieeexplore.ieee.org
In the context of the widespread adoption of Industrial Internet of Things (IIoT) technology,
the number of IoT devices is rapidly increasing, leading to a significant security concern in …