首页 > 最新文献

2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)最新文献

英文 中文
Measurement of edge detection algorithms in clean and noisy environment 清洁和噪声环境下的测量边缘检测算法
Alaa Mohammed Mahmood, H. H. Maraş, E. Elbasi
The subject of identification edge in images has a wide application in various fields for that it's considered one of the important topics in a digital image processing. There are many algorithms to detect the edge in images, but the performance of these algorithms depends on the type of image, the environment of the image and the threshold value of the edge algorithm. The objective of this paper is to evaluate five algorithms of edge detection which are Roberts, Sobel, Prewitt, LOG, and Canny in multi environments clean and noisy by using several types of original images (binary image, graphic image, high frequency image, low frequency image, median frequency image, and texture image) and then determine the best algorithm. In noisy environment the following noises was used Gaussian, salt and pepper and speckle. It's known that each edge detection algorithm has a threshold value, if the current pixel value is less than the defined threshold in strength, it will be considered an edge pixel. The change rate of the threshold value in all environments is also explained through this study.
图像边缘识别是数字图像处理中的一个重要课题,在各个领域有着广泛的应用。检测图像中边缘的算法有很多,但这些算法的性能取决于图像的类型、图像的环境和边缘算法的阈值。本文的目的是利用几种类型的原始图像(二值图像、图形图像、高频图像、低频图像、中频图像和纹理图像),在多干净和有噪声的环境下,对Roberts、Sobel、Prewitt、LOG和Canny五种边缘检测算法进行评估,并确定最佳算法。在噪声环境下,分别采用高斯噪声、椒盐噪声和斑点噪声。众所周知,每一种边缘检测算法都有一个阈值,如果当前像素值在强度上小于定义的阈值,则认为是边缘像素。通过本研究也解释了阈值在各种环境下的变化率。
{"title":"Measurement of edge detection algorithms in clean and noisy environment","authors":"Alaa Mohammed Mahmood, H. H. Maraş, E. Elbasi","doi":"10.1109/ICAICT.2014.7035954","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035954","url":null,"abstract":"The subject of identification edge in images has a wide application in various fields for that it's considered one of the important topics in a digital image processing. There are many algorithms to detect the edge in images, but the performance of these algorithms depends on the type of image, the environment of the image and the threshold value of the edge algorithm. The objective of this paper is to evaluate five algorithms of edge detection which are Roberts, Sobel, Prewitt, LOG, and Canny in multi environments clean and noisy by using several types of original images (binary image, graphic image, high frequency image, low frequency image, median frequency image, and texture image) and then determine the best algorithm. In noisy environment the following noises was used Gaussian, salt and pepper and speckle. It's known that each edge detection algorithm has a threshold value, if the current pixel value is less than the defined threshold in strength, it will be considered an edge pixel. The change rate of the threshold value in all environments is also explained through this study.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130903703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Software implementation of the nonpositional cryptography algorithms 非位置密码算法的软件实现
R. Biyashev, N. Kapalova, R. Khakimov, S. Nyssanbayeva
The software implementation results of the development for the system of cryptographic protection of information (SCPI) with the given characteristics are presented in the paper. This system is intended for using in systems and networks of information transmission and storage. In the created system of cryptographic protection of information, the nonconventional algorithms of encryption and digital signature formation developed on the basis of nonpositional polynominal notations (NPNs) are implemented. Synonyms of NPNs are notations in residual classes. Given characteristics are the length of the message or the digital signature, as well as cryptostrength of algorithms.
本文给出了具有给定特性的信息加密保护系统(SCPI)的软件开发结果。本系统适用于信息传输和存储的系统和网络。在所创建的信息密码保护系统中,实现了基于非位置多标称符号(npn)的非常规加密算法和数字签名生成算法。npn的同义词是残差类中的符号。给定的特征是消息或数字签名的长度,以及算法的密码强度。
{"title":"Software implementation of the nonpositional cryptography algorithms","authors":"R. Biyashev, N. Kapalova, R. Khakimov, S. Nyssanbayeva","doi":"10.1109/ICAICT.2014.7035908","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035908","url":null,"abstract":"The software implementation results of the development for the system of cryptographic protection of information (SCPI) with the given characteristics are presented in the paper. This system is intended for using in systems and networks of information transmission and storage. In the created system of cryptographic protection of information, the nonconventional algorithms of encryption and digital signature formation developed on the basis of nonpositional polynominal notations (NPNs) are implemented. Synonyms of NPNs are notations in residual classes. Given characteristics are the length of the message or the digital signature, as well as cryptostrength of algorithms.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131045723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of diversity method for reliability of cloud computing 分集方法在云计算可靠性中的应用
S. Boranbayev, A. Boranbayev, Sanzhar Altayev, Y. Seitkulov
The aim of the project is creation of methods increasing software reliability and fault tolerance in the cloud based systems. The aim to deliver a comprehensive framework for a substantial, cost-effective improvement in the dependability of application software run in the cloud, beyond the levels offered currently and in the foreseeable future by off-the-shelf (OTS) software products. This improvement will be achieved by using diverse redundancy in an innovative dynamic architecture.
该项目的目标是在基于云的系统中创建提高软件可靠性和容错性的方法。其目标是提供一个全面的框架,以大幅提高在云中运行的应用软件的可靠性,提高成本效益,超越当前和可预见的未来现货(OTS)软件产品所提供的水平。这种改进将通过在创新的动态架构中使用不同的冗余来实现。
{"title":"Application of diversity method for reliability of cloud computing","authors":"S. Boranbayev, A. Boranbayev, Sanzhar Altayev, Y. Seitkulov","doi":"10.1109/ICAICT.2014.7035955","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035955","url":null,"abstract":"The aim of the project is creation of methods increasing software reliability and fault tolerance in the cloud based systems. The aim to deliver a comprehensive framework for a substantial, cost-effective improvement in the dependability of application software run in the cloud, beyond the levels offered currently and in the foreseeable future by off-the-shelf (OTS) software products. This improvement will be achieved by using diverse redundancy in an innovative dynamic architecture.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128609474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Development of a hybrid web application firewall to prevent web based attacks 开发混合web应用防火墙,防止基于web的攻击
Adem Tekerek, Cemal Gemci, O. F. Bay
Firewall and intrusion detection systems are used by the purposes of preventing information loss and weakness on internet and providing security for web applications. However attacks to web applications do not only come from network layer. Web applications use Hyper Text Transfer Protocol (HTTP) and attacks come from this protocol to web pages. Tools used for providing security on network layer become inefficient for HTTP attacks. These attacks to web applications can be prevented by detection of HTTP. In this study, a hybrid web application firewall is developed by using proposed signature based detection and anomaly detection methods, to prevent attacks by detection of HTTP requests.
防火墙和入侵检测系统用于防止互联网上的信息丢失和漏洞,并为web应用程序提供安全保障。然而,对web应用程序的攻击并不仅仅来自网络层。Web应用程序使用超文本传输协议(HTTP),攻击来自该协议的网页。对于HTTP攻击,用于提供网络层安全的工具变得低效。这些针对web应用程序的攻击可以通过检测HTTP来阻止。本研究利用提出的基于签名的检测方法和异常检测方法开发了一种混合web应用防火墙,通过检测HTTP请求来防止攻击。
{"title":"Development of a hybrid web application firewall to prevent web based attacks","authors":"Adem Tekerek, Cemal Gemci, O. F. Bay","doi":"10.1109/ICAICT.2014.7035910","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035910","url":null,"abstract":"Firewall and intrusion detection systems are used by the purposes of preventing information loss and weakness on internet and providing security for web applications. However attacks to web applications do not only come from network layer. Web applications use Hyper Text Transfer Protocol (HTTP) and attacks come from this protocol to web pages. Tools used for providing security on network layer become inefficient for HTTP attacks. These attacks to web applications can be prevented by detection of HTTP. In this study, a hybrid web application firewall is developed by using proposed signature based detection and anomaly detection methods, to prevent attacks by detection of HTTP requests.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127201330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Evaluation of education in the field of database systems and technologies within the study programs of economic and managerial focus 在经济和管理重点研究项目中对数据库系统和技术领域的教育进行评估
J. Záhorec, R. Virágh, M. Hallová, Adriana Nagyová
The authors of this paper present their findings at the level of quantitative statistical analyses within wider international monitoring, in which one of the objectives was to determine the extent to which students of the economic and managerial profiling at ISCED level 5 considered their study points of selected educational topics interesting, which also form part of their educational portfolio from the field of informatics. Students rated to what extent is the topic of teaching relevant for education in the context of those study disciplines, respectively they evaluated through a scale in what extent is the educational content filled from their personal point of view with regard to education in the disciplines studied.
本文的作者在更广泛的国际监测范围内提出了他们在定量统计分析一级的研究结果,其中一个目标是确定科学与发展委员会第5级经济和管理概况的学生在多大程度上认为他们所选择的教育主题的研究点是有趣的,这也是他们信息学领域教育组合的一部分。学生们评估教学主题在多大程度上与所研究学科的教育相关,他们分别通过一个量表来评估教育内容在多大程度上从他们个人的角度来看待所研究学科的教育。
{"title":"Evaluation of education in the field of database systems and technologies within the study programs of economic and managerial focus","authors":"J. Záhorec, R. Virágh, M. Hallová, Adriana Nagyová","doi":"10.1109/ICAICT.2014.7036010","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7036010","url":null,"abstract":"The authors of this paper present their findings at the level of quantitative statistical analyses within wider international monitoring, in which one of the objectives was to determine the extent to which students of the economic and managerial profiling at ISCED level 5 considered their study points of selected educational topics interesting, which also form part of their educational portfolio from the field of informatics. Students rated to what extent is the topic of teaching relevant for education in the context of those study disciplines, respectively they evaluated through a scale in what extent is the educational content filled from their personal point of view with regard to education in the disciplines studied.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124268184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TOFI technology capabilities for data processing and visualization TOFI技术的数据处理和可视化能力
M. Gabbasov
Technology of modeling and monitoring of the complex systems TOFI used to develop information and analytical systems to support decision-making process of almost any subject area. This article describes that processes such as data processing and data visualization on TOFI.
复杂系统的建模和监测技术,TOFI用于开发信息和分析系统,以支持几乎任何学科领域的决策过程。本文描述了TOFI的数据处理和数据可视化等过程。
{"title":"TOFI technology capabilities for data processing and visualization","authors":"M. Gabbasov","doi":"10.1109/ICAICT.2014.7035961","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035961","url":null,"abstract":"Technology of modeling and monitoring of the complex systems TOFI used to develop information and analytical systems to support decision-making process of almost any subject area. This article describes that processes such as data processing and data visualization on TOFI.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114376876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Channel estimation for SM systems over time-varying Rayleigh fading channels 时变瑞利衰落信道中SM系统的信道估计
Yusuf Acar, H. Dogan, E. Panayirci
This paper is concerned with the challenging and timely problem of channel estimation for spatial modulated systems in the presence of time varying channels. Recently, estimation of channel state information for SM systems is investigated by the recursive least square (RLS) algorithm for slow fading channels. However, it is clear that the RLS based receiver will have a performance degradation for fast fading channels. Therefore, we developed iterative channel estimation based on detected symbols and curve fitting to track the channel variations for SM systems. Simulation results have demonstrated that the proposed iterative channel estimation offer substantial performance gains over the RLS channel estimation. In particular, a savings of about 4dB is obtained at BER = 10-7, as compared with RLS based receiver at 150km/h for 2 × 4 single carrier SM systems.
本文研究了时变信道下空间调制系统的信道估计问题。近年来,研究了用递推最小二乘(RLS)算法估计慢衰落信道的信道状态信息。然而,很明显,基于RLS的接收机在快速衰落信道中会有性能下降。因此,我们开发了基于检测符号和曲线拟合的迭代信道估计来跟踪SM系统的信道变化。仿真结果表明,所提出的迭代信道估计比RLS信道估计具有显著的性能提升。特别是,在BER = 10-7时,与基于RLS的接收器在150km/h下的2 × 4单载波SM系统相比,节省了约4dB。
{"title":"Channel estimation for SM systems over time-varying Rayleigh fading channels","authors":"Yusuf Acar, H. Dogan, E. Panayirci","doi":"10.1109/ICAICT.2014.7035975","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035975","url":null,"abstract":"This paper is concerned with the challenging and timely problem of channel estimation for spatial modulated systems in the presence of time varying channels. Recently, estimation of channel state information for SM systems is investigated by the recursive least square (RLS) algorithm for slow fading channels. However, it is clear that the RLS based receiver will have a performance degradation for fast fading channels. Therefore, we developed iterative channel estimation based on detected symbols and curve fitting to track the channel variations for SM systems. Simulation results have demonstrated that the proposed iterative channel estimation offer substantial performance gains over the RLS channel estimation. In particular, a savings of about 4dB is obtained at BER = 10-7, as compared with RLS based receiver at 150km/h for 2 × 4 single carrier SM systems.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124305705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System for sign language modeling and learning 手语建模与学习系统
I. Krak, M. P. Lisnyak, G. N. Ermagambetova, S. Kudubayeva
An approach to the software system development dedicated to the interactive learning of sign language is proposed. A basic architecture of the system, its modules, format and transmission protocol of the data are created. The article also describes the main module of the system responsible for the synthesis and the animation of the gestures and facial expressions of the emotions based on the three-dimensional pattern of a human body. It describes main requirements for the module, analyzing basic problems and the implementations for their solution, architecture and components, especially the ones that are responsible for the generation of the animation, its structure, the algorithm of gestures' combination and their graphical processing.
提出了一种用于手语交互学习的软件系统开发方法。给出了系统的基本架构、模块、数据格式和传输协议。文章还介绍了系统的主要模块,主要负责基于人体三维图形的情绪的手势和面部表情的合成和动画。描述了该模块的主要需求,分析了基本问题及其解决方案、体系结构和组件的实现,特别是负责动画生成、动画结构、手势组合算法和图形处理的模块。
{"title":"System for sign language modeling and learning","authors":"I. Krak, M. P. Lisnyak, G. N. Ermagambetova, S. Kudubayeva","doi":"10.1109/ICAICT.2014.7035997","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035997","url":null,"abstract":"An approach to the software system development dedicated to the interactive learning of sign language is proposed. A basic architecture of the system, its modules, format and transmission protocol of the data are created. The article also describes the main module of the system responsible for the synthesis and the animation of the gestures and facial expressions of the emotions based on the three-dimensional pattern of a human body. It describes main requirements for the module, analyzing basic problems and the implementations for their solution, architecture and components, especially the ones that are responsible for the generation of the animation, its structure, the algorithm of gestures' combination and their graphical processing.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117019253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
tBox: A system to protect a "bad" user from targeted and user-oriented attacks tBox:保护“坏”用户免受定向和面向用户的攻击的系统
Amur G. Tokhtabayev, Batyrulan Aimyshev, Y. Seitkulov
We introduce tBox system that enables protection from targeted and user-oriented attacks. Such attacks relay on users mistakes such as misinterpreting or ignoring security alerts, which leads to proliferation of malicious objects inside trusted perimeter of cyber-security systems (e.g. exclusion list of AV). These attacks include strategic web compromise, spear phishing, insider threat and social network malware. Moreover, targeted attacks often deliver zero-day malware that is made difficult to be detected, e.g. due to distributed malicious payload. The tBox system allows for protecting even a "bad" user who does not cooperate with security products. To accomplish this, tBox seamlessly transfers user activity with vulnerable applications into specific virtual environment that provides three key factors: user-activity isolation, behavior self-monitoring and security inheritance for user-carried objects. To provide self-monitoring, our team developed a novel technology for deep dynamic analysis of system-wide behavior, which allows for run-time recognition of malicious functionalities including obfuscated and distributed ones. We evaluate the tBox prototype with corpus of real malware families. Results show high efficiency of tBox in detecting and blocking malware while having low system overhead.
我们介绍了tBox系统,使保护免受针对性和面向用户的攻击。此类攻击依赖于用户的错误,例如误解或忽视安全警报,从而导致恶意对象在网络安全系统的可信范围内扩散(例如AV排除列表)。这些攻击包括战略性网络入侵、鱼叉式网络钓鱼、内部威胁和社交网络恶意软件。此外,有针对性的攻击通常会提供难以检测到的零日恶意软件,例如由于分布式恶意负载。tBox系统甚至可以保护不配合安全产品的“坏”用户。为此,tBox将带有易受攻击应用程序的用户活动无缝转移到特定的虚拟环境中,该环境提供了三个关键因素:用户活动隔离、行为自我监控和用户携带对象的安全继承。为了提供自我监控,我们的团队开发了一种新的技术,用于对系统范围内的行为进行深度动态分析,该技术允许在运行时识别恶意功能,包括混淆和分布式功能。我们用真实恶意软件家族的语料库对tBox原型进行了评估。结果表明,tBox在检测和拦截恶意软件方面效率高,且系统开销低。
{"title":"tBox: A system to protect a \"bad\" user from targeted and user-oriented attacks","authors":"Amur G. Tokhtabayev, Batyrulan Aimyshev, Y. Seitkulov","doi":"10.1109/ICAICT.2014.7035913","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035913","url":null,"abstract":"We introduce tBox system that enables protection from targeted and user-oriented attacks. Such attacks relay on users mistakes such as misinterpreting or ignoring security alerts, which leads to proliferation of malicious objects inside trusted perimeter of cyber-security systems (e.g. exclusion list of AV). These attacks include strategic web compromise, spear phishing, insider threat and social network malware. Moreover, targeted attacks often deliver zero-day malware that is made difficult to be detected, e.g. due to distributed malicious payload. The tBox system allows for protecting even a \"bad\" user who does not cooperate with security products. To accomplish this, tBox seamlessly transfers user activity with vulnerable applications into specific virtual environment that provides three key factors: user-activity isolation, behavior self-monitoring and security inheritance for user-carried objects. To provide self-monitoring, our team developed a novel technology for deep dynamic analysis of system-wide behavior, which allows for run-time recognition of malicious functionalities including obfuscated and distributed ones. We evaluate the tBox prototype with corpus of real malware families. Results show high efficiency of tBox in detecting and blocking malware while having low system overhead.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127623739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
e-Government services vulnerability 电子政府服务漏洞
Ali Shahintash, Yashar Hajiyev
The employing of ICT applications into operational structure of public administrating is rapidly transforming societal interactions and the relationships among citizens, businesses, and state bodies. To strengthen the controllability and to expand of Internet-based services and processes it is necessary to establish more than just a developed interactive website that provides the right content and most demanded online services to citizen. There is strong demand among citizens for instant access to open public information, for high standards of improved services in a secure fashion. Behind every reliable and efficient application lie the critical elements as extensive infrastructure of digital networks, Internet and application servers, databases and support services. In paper the broad framework of measures that ensure protection of security of e-Government services. The focus of this paper is on results of exploration of two main issues vulnerability and security in e-government.
将信息通信技术应用于公共管理的运作结构正在迅速改变社会互动以及公民、企业和国家机构之间的关系。要加强互联网服务和流程的可控性,扩大互联网服务和流程的规模,就必须建立一个发达的互动网站,为公民提供合适的内容和最需要的在线服务。公民强烈要求立即获得公开的公共信息,要求以安全的方式提供高标准的改进服务。在每一个可靠和高效的应用程序背后,都有数字网络、互联网和应用服务器、数据库和支持服务等广泛的基础设施等关键要素。本文提出了保障电子政府服务安全的措施框架。本文的重点是对电子政务中脆弱性和安全性两个主要问题的研究结果。
{"title":"e-Government services vulnerability","authors":"Ali Shahintash, Yashar Hajiyev","doi":"10.1109/ICAICT.2014.7035990","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035990","url":null,"abstract":"The employing of ICT applications into operational structure of public administrating is rapidly transforming societal interactions and the relationships among citizens, businesses, and state bodies. To strengthen the controllability and to expand of Internet-based services and processes it is necessary to establish more than just a developed interactive website that provides the right content and most demanded online services to citizen. There is strong demand among citizens for instant access to open public information, for high standards of improved services in a secure fashion. Behind every reliable and efficient application lie the critical elements as extensive infrastructure of digital networks, Internet and application servers, databases and support services. In paper the broad framework of measures that ensure protection of security of e-Government services. The focus of this paper is on results of exploration of two main issues vulnerability and security in e-government.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121266468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1