A new source coding method based on LZW adopting the least recently used deletion heuristic

Author(s):  
S. Hayashi ◽  
J.-i. Kubo ◽  
T. Yamazato ◽  
I. Sasase
Keyword(s):  
2022 ◽  
Author(s):  
Arash Mahboubi ◽  
Keyvan Ansari ◽  
Seyit Camtepe ◽  
Jarek Duda ◽  
Paweł Morawiecki ◽  
...  

Unwanted data encryption, such as ransomware attacks, continues to be a significant cybersecurity threat. Ransomware is a preferred weapon of cybercriminals who target small to large organizations' computer systems and data centres. It is malicious software that infects a victim's computer system and encrypts all its valuable data files. The victim needs to pay a ransom, often in cryptocurrency, in return for a decryption key. Many solutions use methods, including the inspection of file signatures, runtime process behaviors, API calls, and network traffic, to detect ransomware code. However, unwanted data encryption is still a top threat. This paper presents the first immunity solution, called the digital immunity module (DIM). DIM focuses on protecting valuable business-related data files from unwanted encryption rather than detecting malicious codes or processes. We show that methods such as file entropy and fuzzy hashing can be effectively used to sense unwanted encryption on a protected file, triggering our novel source coding method to paralyze the malicious manipulation of data such as ransomware encryption. Specifically, maliciously encrypted data blocks consume exponentially larger space and longer writing time on the DIM-protected file system. As a result, DIM creates enough time for system/human intervention and forensics analysis. Unlike the existing solutions, DIM protects the data regardless of ransomware families and variants. Additionally, DIM can defend against simultaneously active multiple ransomware, including the most recent hard to detect and stop fileless ones. We tested our solution on 39 ransomware families, including the most recent ransomware attacks. DIM successfully defended our sample file dataset (1335 pdf, jpg, and tiff files) against those ransomware attacks with zero file loss.


2022 ◽  
Author(s):  
Arash Mahboubi ◽  
Keyvan Ansari ◽  
Seyit Camtepe ◽  
Jarek Duda ◽  
Paweł Morawiecki ◽  
...  

Unwanted data encryption, such as ransomware attacks, continues to be a significant cybersecurity threat. Ransomware is a preferred weapon of cybercriminals who target small to large organizations' computer systems and data centres. It is malicious software that infects a victim's computer system and encrypts all its valuable data files. The victim needs to pay a ransom, often in cryptocurrency, in return for a decryption key. Many solutions use methods, including the inspection of file signatures, runtime process behaviors, API calls, and network traffic, to detect ransomware code. However, unwanted data encryption is still a top threat. This paper presents the first immunity solution, called the digital immunity module (DIM). DIM focuses on protecting valuable business-related data files from unwanted encryption rather than detecting malicious codes or processes. We show that methods such as file entropy and fuzzy hashing can be effectively used to sense unwanted encryption on a protected file, triggering our novel source coding method to paralyze the malicious manipulation of data such as ransomware encryption. Specifically, maliciously encrypted data blocks consume exponentially larger space and longer writing time on the DIM-protected file system. As a result, DIM creates enough time for system/human intervention and forensics analysis. Unlike the existing solutions, DIM protects the data regardless of ransomware families and variants. Additionally, DIM can defend against simultaneously active multiple ransomware, including the most recent hard to detect and stop fileless ones. We tested our solution on 39 ransomware families, including the most recent ransomware attacks. DIM successfully defended our sample file dataset (1335 pdf, jpg, and tiff files) against those ransomware attacks with zero file loss.


2019 ◽  
Vol 35 (6) ◽  
pp. 855-867 ◽  
Author(s):  
John T. Kulas ◽  
Rachael Klahr ◽  
Lindsey Knights

Abstract. Many investigators have noted “reverse-coding” method factors when exploring response pattern structure with psychological inventory data. The current article probes for the existence of a confound in these investigations, whereby an item’s level of saturation with socially desirable content tends to covary with the item’s substantive scale keying. We first investigate its existence, demonstrating that 15 of 16 measures that have been previously implicated as exhibiting a reverse-scoring method effect can also be reasonably characterized as exhibiting a scoring key/social desirability confound. A second set of analyses targets the extent to which the confounding variable may confuse interpretation of factor analytic results and documents strong social desirability associations. The results suggest that assessment developers perhaps consider the social desirability scale value of indicators when constructing scale aggregates (and possibly scales when investigating inter-construct associations). Future investigations would ideally disentangle the confound via experimental manipulation.


Author(s):  
Minghui WANG ◽  
Xun HE ◽  
Xin JIN ◽  
Satoshi GOTO
Keyword(s):  

2019 ◽  
Vol 118 (1) ◽  
pp. 1-7
Author(s):  
Byung-Moon Seol ◽  
Young-Lag KIM

Background/Objectives: This paper investigated and analyzed the phenomena in implementing the curriculum and characteristics of an entrepreneurship education model existing technology-driven agri-food industry. Methods/Statistical analysis: The line-by-line coding method of grounded theory approach by Strauss & Corbin was applied for this study and the collected data was analyzed with the NVIVO 12 program from QSR which is a tool for analyzing quality comparative analysis for better efficiency in open coding. Findings: The contents and the design of education are drawn from founders who are participants of the education, education supply organizations and lecturers and traits in an education model were derived by analyzing the structural relationship between them. This study reveals that entrepreneurial education with contextual knowledge in the agri-food industry strengthens achievements in boosting up competitiveness for industry, local areas, sales and enhancing the field response-ability. Yet, unbalanced educational contents can be caused by a biased education devoted to technologies only for production and cultivation and a lack of diversity and professionalism. Phenomena in implementing curriculum and characteristics of an education model also reveal a lack of support for educational institutions and trainees and unsatisfactory of overall administration system due to an insufficient post management system. In this paper, an essential education contents needed by the agri-food sector entrepreneur are related to information competency enhancement.


2019 ◽  
Vol 118 (8) ◽  
pp. 266-274
Author(s):  
Byung- MoonSeol ◽  
Young-Lag KIM

Background/Objectives: This paper investigated and analyzed the phenomena in implementing the curriculum and characteristics of an entrepreneurship education model existing technology-driven agri-food industry. Methods/Statistical analysis: The line-by-line coding method of grounded theory approach by Strauss & Corbin was applied for this study and the collected data was analyzed with the NVIVO 12 program from QSR which is a tool for analyzing quality comparative analysis for better efficiency in open coding.


Sign in / Sign up

Export Citation Format

Share Document