2023
DOI: 10.1016/j.dcan.2022.04.030
|View full text |Cite
|
Sign up to set email alerts
|

Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(11 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…The process of transmitting key information for authentication between AGj$$ {AG}_j $$ and SMi$$ {SM}_i $$ has been implemented in the simulation. In the simulated environment, the total simulation time is 1500 s. The routing protocol is set to Destination‐Sequenced Distance Vector (DSDV) and the medium access control (MAC) is considered as the standard IEEE 802.11 as in Reference 41. Cell radius is set as 200 m. The SG environments is divided into 19 small cells and the distance between the two AG is set as 300 m.…”
Section: Performance Analysismentioning
confidence: 99%
“…The process of transmitting key information for authentication between AGj$$ {AG}_j $$ and SMi$$ {SM}_i $$ has been implemented in the simulation. In the simulated environment, the total simulation time is 1500 s. The routing protocol is set to Destination‐Sequenced Distance Vector (DSDV) and the medium access control (MAC) is considered as the standard IEEE 802.11 as in Reference 41. Cell radius is set as 200 m. The SG environments is divided into 19 small cells and the distance between the two AG is set as 300 m.…”
Section: Performance Analysismentioning
confidence: 99%
“…As technology evolves, data security is facing more and more attacks [14,15]. The current data privacy protection technologies for wearable devices are mainly based on cryptography and perturbation [16].…”
Section: Related Workmentioning
confidence: 99%
“…If the derivatives of adjacent data points are opposite, and the time interval (t int ) between the former point and the starting point (i.e., t cur and t sta respectively) is greater than α, the former is kept and the latter is compared with the next data point. Repeat the previous steps until the list1 is traversed, and the retained points together with the starting and ending points are the salient points, which are stored in list2 (lines [10][11][12][13][14][15][16][17][18][19][20][21][22].…”
Section: Plos Onementioning
confidence: 99%
“…Ma et al [39] presented an adaptive large neighborhood search algorithm to find nearoptimal solutions for larger-size time-dependent VRPs. In addition, some other algorithms are also presented for solving VRPs and the other optimization problems [40][41][42][43][44][45][46][47][48][49][50][51].…”
Section: Related Workmentioning
confidence: 99%