首页 > 最新文献

2021 6th International Conference on Computer Science and Engineering (UBMK)最新文献

英文 中文
Pretrained Neural Models for Turkish Text Classification 土耳其语文本分类的预训练神经模型
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558878
Halil Ibrahim Okur, A. Sertbas
In the text classification process, which is a sub-task of NLP, the preprocessing and indexing of the text has a direct determining effect on the performance for NLP models. When the studies on pre-trained models are examined, it is seen that the changes made on the models developed for world languages or training the same model with a Turkish text dataset. Word-embedding is considered to be the most critical point of the text processing problem. The two most popular word embedding methods today are Word2Vec and Glove, which embed words into a corpus using multidimensional vectors. BERT, Electra and Fastext models, which have a contextual word representation method and a deep neural network architecture, have been frequently used in the creation of pre-trained models recently. In this study, the use and performance results of pre-trained models on TTC-3600 and TRT-Haber text sets prepared for Turkish text classification NLP task are shown. By using pre-trained models obtained with large corpus, a certain time and hardware cost, the text classification process is performed with less effort and high performance.
文本分类是自然语言处理的一个子任务,在文本分类过程中,文本的预处理和索引对自然语言处理模型的性能有直接的决定作用。当对预训练模型的研究进行检查时,可以看到对为世界语言开发的模型或使用土耳其文本数据集训练相同模型所做的更改。词嵌入被认为是文本处理中最关键的问题。目前最流行的两种词嵌入方法是Word2Vec和Glove,它们使用多维向量将词嵌入到语料库中。BERT、Electra和Fastext模型具有上下文词表示方法和深度神经网络架构,近年来被广泛用于预训练模型的创建。在本研究中,展示了预训练模型在为土耳其文本分类NLP任务准备的TTC-3600和TRT-Haber文本集上的使用和性能结果。通过使用大量语料库、一定的时间和硬件成本获得的预训练模型,实现了省力、高性能的文本分类过程。
{"title":"Pretrained Neural Models for Turkish Text Classification","authors":"Halil Ibrahim Okur, A. Sertbas","doi":"10.1109/UBMK52708.2021.9558878","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558878","url":null,"abstract":"In the text classification process, which is a sub-task of NLP, the preprocessing and indexing of the text has a direct determining effect on the performance for NLP models. When the studies on pre-trained models are examined, it is seen that the changes made on the models developed for world languages or training the same model with a Turkish text dataset. Word-embedding is considered to be the most critical point of the text processing problem. The two most popular word embedding methods today are Word2Vec and Glove, which embed words into a corpus using multidimensional vectors. BERT, Electra and Fastext models, which have a contextual word representation method and a deep neural network architecture, have been frequently used in the creation of pre-trained models recently. In this study, the use and performance results of pre-trained models on TTC-3600 and TRT-Haber text sets prepared for Turkish text classification NLP task are shown. By using pre-trained models obtained with large corpus, a certain time and hardware cost, the text classification process is performed with less effort and high performance.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121909260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvement of Machine Learning Models’ Performances based on Ensemble Learning for the detection of Alzheimer Disease 基于集成学习的阿尔茨海默病检测机器学习模型性能改进
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558994
Selim Buyrukoğlu
Failure to early detection of Alzheimer’s disease (AD) can lead memory deterioration. Therefore, early detection of AD is essential affecting the points of the brain that control vital functions. Various early AD detection approaches have been employed using machine learning. In literature, most of the early detection of AD approaches has been developed using single machine learning methods. Due to the importance of early detection of AD, the goal of this study is to improve the classification performance of the previous studies for early detection of AD applying ensemble learning methods including bagging, boosting and stacking. ADNI clinical dataset was used in this study with three target classes: Normal (CN), Mild Cognitive Impairment (MCI) and Alzheimer’s disease (AD). The proposed ensemble learning methods provided better classification performance compared to single machine learning methods. Besides, the best classification performance from the ensemble methods is obtained through the boosting (AdaBoost) ensemble (92.7%). This study revealed that the classification rate increased up to between 3.2% and 7.2% compared to single based machine learning approaches through the AdaBoost ensemble method.
未能及早发现阿尔茨海默病(AD)会导致记忆力衰退。因此,早期发现阿尔茨海默病是至关重要的,它影响着大脑中控制重要功能的部位。各种早期AD检测方法都采用了机器学习。在文献中,大多数AD的早期检测方法都是使用单一的机器学习方法开发的。由于AD早期检测的重要性,本研究的目标是通过bagging、boosting和stacking等集成学习方法,提高以往AD早期检测研究的分类性能。本研究使用了ADNI临床数据集,有三个目标类别:正常(CN)、轻度认知障碍(MCI)和阿尔茨海默病(AD)。与单一机器学习方法相比,所提出的集成学习方法具有更好的分类性能。其中,增强(AdaBoost)集成的分类性能最好(92.7%)。该研究表明,通过AdaBoost集成方法,与基于单一的机器学习方法相比,分类率提高了3.2%至7.2%。
{"title":"Improvement of Machine Learning Models’ Performances based on Ensemble Learning for the detection of Alzheimer Disease","authors":"Selim Buyrukoğlu","doi":"10.1109/UBMK52708.2021.9558994","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558994","url":null,"abstract":"Failure to early detection of Alzheimer’s disease (AD) can lead memory deterioration. Therefore, early detection of AD is essential affecting the points of the brain that control vital functions. Various early AD detection approaches have been employed using machine learning. In literature, most of the early detection of AD approaches has been developed using single machine learning methods. Due to the importance of early detection of AD, the goal of this study is to improve the classification performance of the previous studies for early detection of AD applying ensemble learning methods including bagging, boosting and stacking. ADNI clinical dataset was used in this study with three target classes: Normal (CN), Mild Cognitive Impairment (MCI) and Alzheimer’s disease (AD). The proposed ensemble learning methods provided better classification performance compared to single machine learning methods. Besides, the best classification performance from the ensemble methods is obtained through the boosting (AdaBoost) ensemble (92.7%). This study revealed that the classification rate increased up to between 3.2% and 7.2% compared to single based machine learning approaches through the AdaBoost ensemble method.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122674719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Machine Learning Approaches in Detecting Network Attacks 检测网络攻击的机器学习方法
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558930
Hasan Dalmaz, Erdal Erdal, H. Ünver
Developing technology brings many risk in terms of data security. In this regard, it is an important issue to detect attacks for network security. Intrusion detection systems developed due to technological developlments and increasing attack diversity have revealed the necessity of being more succesful in detecting attacks. Today, many studies are carried out on this subject. When the literature is examined, there are various studies with varying success rates in detecting network attacks using machine learning approaches. In this study, the NSL-KDD dataset was explained in detail, the positive aspects of the KDD Cup 99 dataset were specified, the classifier used, performance criteria and the success results obtained were evaluated. In addition, the developed GWO-MFO hybrid algorithm is mentioned and the result is shared.
技术的发展带来了数据安全方面的诸多风险。因此,检测攻击对网络安全至关重要。随着技术的发展和攻击多样性的增加,入侵检测系统的发展表明需要更成功地检测攻击。今天,许多研究都在这个问题上进行。当检查文献时,有各种研究使用机器学习方法检测网络攻击的成功率不同。在本研究中,详细解释了NSL-KDD数据集,指定了KDD Cup 99数据集的积极方面,评估了使用的分类器,性能标准和获得的成功结果。此外,还介绍了所开发的GWO-MFO混合算法,并对其结果进行了共享。
{"title":"Machine Learning Approaches in Detecting Network Attacks","authors":"Hasan Dalmaz, Erdal Erdal, H. Ünver","doi":"10.1109/UBMK52708.2021.9558930","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558930","url":null,"abstract":"Developing technology brings many risk in terms of data security. In this regard, it is an important issue to detect attacks for network security. Intrusion detection systems developed due to technological developlments and increasing attack diversity have revealed the necessity of being more succesful in detecting attacks. Today, many studies are carried out on this subject. When the literature is examined, there are various studies with varying success rates in detecting network attacks using machine learning approaches. In this study, the NSL-KDD dataset was explained in detail, the positive aspects of the KDD Cup 99 dataset were specified, the classifier used, performance criteria and the success results obtained were evaluated. In addition, the developed GWO-MFO hybrid algorithm is mentioned and the result is shared.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131604122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Improvement with Decision Tree in Predicting Heart Failure 决策树在预测心力衰竭中的应用
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558939
A. Karaoglu, Hasan Caglar, A. Değirmenci, Omer Karal
Cardiovascular diseases is a general term given to the group of diseases that includes heart failure, heart attack, stroke. They are quite dangerous for human health. Various studies have been conducted in the literature to predict the survival of patients with heart failure. In this study, user-defined parameters of three different machine learning methods (logistic regression-LR, K nearest neighbor-KNN, and decision tree-DT) used in existing studies are optimized to make predictions with higher accuracy. In terms of objectivity and reliability of the experimental results, k-fold cross validation technique is applied. As a result, the performance results of this study are observed to be 10% and 3% higher than the literature in the DT and KNN algorithms, respectively. In particular, the proposed KNN method has shown that it can guide physicians in the decision-making process.
心血管疾病是一组疾病的总称,包括心力衰竭、心脏病发作、中风。它们对人体健康相当危险。文献中已经进行了各种研究来预测心力衰竭患者的生存率。本研究对现有研究中使用的三种不同机器学习方法(logistic回归- lr、K近邻- knn和决策树- dt)的用户自定义参数进行优化,使预测精度更高。为了保证实验结果的客观性和可靠性,采用了k-fold交叉验证技术。因此,本研究的性能结果分别比DT和KNN算法的文献高10%和3%。特别是,提出的KNN方法已经表明,它可以指导医生的决策过程。
{"title":"Performance Improvement with Decision Tree in Predicting Heart Failure","authors":"A. Karaoglu, Hasan Caglar, A. Değirmenci, Omer Karal","doi":"10.1109/UBMK52708.2021.9558939","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558939","url":null,"abstract":"Cardiovascular diseases is a general term given to the group of diseases that includes heart failure, heart attack, stroke. They are quite dangerous for human health. Various studies have been conducted in the literature to predict the survival of patients with heart failure. In this study, user-defined parameters of three different machine learning methods (logistic regression-LR, K nearest neighbor-KNN, and decision tree-DT) used in existing studies are optimized to make predictions with higher accuracy. In terms of objectivity and reliability of the experimental results, k-fold cross validation technique is applied. As a result, the performance results of this study are observed to be 10% and 3% higher than the literature in the DT and KNN algorithms, respectively. In particular, the proposed KNN method has shown that it can guide physicians in the decision-making process.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126453358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis of Honey Production with Environmental Variables 含环境变量的蜂蜜生产分析
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558933
Ercan Atagün, Ahmet Aalbayrak
Regression algorithms are included in the supervised learning techniques of machine learning. Regression covers the operations of estimating the variable with the class label (output variable) by using the numerical values in a data with regression algorithms. When the desired performances cannot be achieved with the existing regression algorithms for a problem, Ensemble Learning models are applied. In the Ensemble Learning model, multiple predictive algorithms come together and aim to achieve a higher success than the success of an algorithm alone. In this study, honey production problem was estimated with Support vector machines, Multi-layer Perceptron Regressor, KNeighborsRegressor, Voting Regressor, RandomForestRegressor, AdaBoostRegressor, BaggingRegressor, GradientBoostingRegressor and the results were compared. It was observed that the ensemble learning models increased the prediction success with the regression processes.
回归算法包含在机器学习的监督学习技术中。回归涵盖了通过使用回归算法中的数据中的数值来估计带有类标签(输出变量)的变量的操作。当现有的回归算法无法达到预期的性能时,可以应用集成学习模型。在集成学习模型中,多个预测算法结合在一起,旨在获得比单独算法更高的成功。本研究采用支持向量机、多层感知器回归器、KNeighborsRegressor、Voting Regressor、RandomForestRegressor、AdaBoostRegressor、bagingregressor、GradientBoostingRegressor对蜂蜜生产问题进行了估计,并对结果进行了比较。结果表明,集成学习模型在回归过程中提高了预测成功率。
{"title":"Analysis of Honey Production with Environmental Variables","authors":"Ercan Atagün, Ahmet Aalbayrak","doi":"10.1109/UBMK52708.2021.9558933","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558933","url":null,"abstract":"Regression algorithms are included in the supervised learning techniques of machine learning. Regression covers the operations of estimating the variable with the class label (output variable) by using the numerical values in a data with regression algorithms. When the desired performances cannot be achieved with the existing regression algorithms for a problem, Ensemble Learning models are applied. In the Ensemble Learning model, multiple predictive algorithms come together and aim to achieve a higher success than the success of an algorithm alone. In this study, honey production problem was estimated with Support vector machines, Multi-layer Perceptron Regressor, KNeighborsRegressor, Voting Regressor, RandomForestRegressor, AdaBoostRegressor, BaggingRegressor, GradientBoostingRegressor and the results were compared. It was observed that the ensemble learning models increased the prediction success with the regression processes.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125307230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review of Spam Detection in Social Media 社交媒体垃圾邮件检测研究综述
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558993
Ilke Yurtseven, Selami Bagriyanik, S. Ayvaz
With significant usage of social media to socialize in virtual environments, bad actors are now able to use these platforms to spread their malicious activities such as hate speech, spam, and even phishing to very large crowds. Especially, Twitter is suitable for these types of activities because it is one of the most common social media platforms for microblogging with millions of active users. Moreover, since the end of 2019, Covid-19 has changed the lives of individuals in many ways. While it increased social media usage due to free time, the number of cyber-attacks soared too. To prevent these activities, detection is a very crucial phase. Thus, the main goal of this study is to review the state-of-art in the detection of malicious content and the contribution of AI algorithms for detecting spam and scams effectively in social media.
随着社交媒体在虚拟环境中的大量使用,不良行为者现在能够利用这些平台传播他们的恶意活动,如仇恨言论、垃圾邮件,甚至网络钓鱼。Twitter尤其适合这些类型的活动,因为它是最常见的微博社交媒体平台之一,拥有数百万活跃用户。此外,自2019年底以来,Covid-19在许多方面改变了人们的生活。由于有空闲时间,社交媒体的使用量增加了,但网络攻击的数量也大幅增加。为了防止这些活动,检测是一个非常关键的阶段。因此,本研究的主要目标是回顾恶意内容检测的最新进展,以及人工智能算法在有效检测社交媒体中的垃圾邮件和诈骗方面的贡献。
{"title":"A Review of Spam Detection in Social Media","authors":"Ilke Yurtseven, Selami Bagriyanik, S. Ayvaz","doi":"10.1109/UBMK52708.2021.9558993","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558993","url":null,"abstract":"With significant usage of social media to socialize in virtual environments, bad actors are now able to use these platforms to spread their malicious activities such as hate speech, spam, and even phishing to very large crowds. Especially, Twitter is suitable for these types of activities because it is one of the most common social media platforms for microblogging with millions of active users. Moreover, since the end of 2019, Covid-19 has changed the lives of individuals in many ways. While it increased social media usage due to free time, the number of cyber-attacks soared too. To prevent these activities, detection is a very crucial phase. Thus, the main goal of this study is to review the state-of-art in the detection of malicious content and the contribution of AI algorithms for detecting spam and scams effectively in social media.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130482252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Wormhole Attacks in IoT Based Networks 基于物联网网络中的虫洞攻击
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558996
Ekin Ecem Tatar, Murat Dener
Wireless sensor networks (WSNs) from the IoT subset consist of small sensor nodes with limited energy. Such nodes are capable of monitoring physical conditions and transmitting information between nodes without the need for physical media. Due to the lack of central authority and the deployment of random nodes on the network, WSNs and IoTs are prone to security threats and there are many attacks against these networks. Wormhole attack is a serious type of attack that can be resolved smoothly in networks but is difficult to observe. In this study, wormhole attack was shown and interpreted simulation results with simulated graphics in the NS2 simulation program.
来自物联网子集的无线传感器网络(wsn)由能量有限的小型传感器节点组成。这种节点能够在不需要物理介质的情况下监测物理状况并在节点之间传输信息。无线传感器网络和物联网由于缺乏中央管理机构和网络中随机节点的部署,容易受到安全威胁,针对这些网络的攻击也很多。虫洞攻击是一种严重的攻击类型,可以在网络中顺利解决,但很难观察到。本研究在NS2仿真程序中,用仿真图形显示和解释了虫洞攻击的仿真结果。
{"title":"Wormhole Attacks in IoT Based Networks","authors":"Ekin Ecem Tatar, Murat Dener","doi":"10.1109/UBMK52708.2021.9558996","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558996","url":null,"abstract":"Wireless sensor networks (WSNs) from the IoT subset consist of small sensor nodes with limited energy. Such nodes are capable of monitoring physical conditions and transmitting information between nodes without the need for physical media. Due to the lack of central authority and the deployment of random nodes on the network, WSNs and IoTs are prone to security threats and there are many attacks against these networks. Wormhole attack is a serious type of attack that can be resolved smoothly in networks but is difficult to observe. In this study, wormhole attack was shown and interpreted simulation results with simulated graphics in the NS2 simulation program.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122334602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Investigation of Cyber Situation Awareness via SIEM tools: a constructive review 基于SIEM工具的网络态势感知研究:建设性回顾
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558964
U. Ünal, Ceyda Nur Kahya, Yaprak Kurtlutepe, H. Dağ
Awareness, in the sense of security, builds the backbone of operations understanding the current and future cyber activities. Situation awareness has become the focal point of securing systems due to dynamic nature of cyber domain. Technological advancements cause the volatility to transform into upcoming challenges. Understanding those is the key to keep cyber Situation Awareness (SA) progression. Earlier studies define required steps to administer cyber SA. These steps (perceive, comprehend, project, and resolve) are also adapted to cyber domain. Rapid technological changes redefine the content of those and thus, it creates demands improving automated tools, which play as systematic factor in nurturing SA. As a system factor, SIEM tools can be basis for comprehending cyber domain. In this work, we investigate recent studies contributed mainly to SIEM (Security Information and Event Management) tool’s enhancement to evaluate current state and help predict upcoming challenges for maintaining awareness. We use various criteria in our investigation such as; architecture improvement, affected SIEM process, utilized CTI (Cyber Threat Intelligence) artefact, implementation area, and type of produced result. In doing so, we aim to impart upward trends on CSA (Cyber Situation Awareness) to academia and industry professionals.
在安全意识方面,建立了了解当前和未来网络活动的运营支柱。由于网络域的动态性,态势感知已成为系统安全的重点。技术进步导致波动性转化为即将到来的挑战。了解这些是保持网络态势感知(SA)进展的关键。早期的研究定义了管理网络安全所需的步骤。这些步骤(感知、理解、计划和解决)也适用于网络领域。快速的技术变化重新定义了这些内容,因此,它创造了改进自动化工具的需求,这些工具在培养SA中扮演着系统因素。作为一个系统因素,SIEM工具可以作为理解网络域的基础。在这项工作中,我们调查了最近的研究,主要贡献了SIEM(安全信息和事件管理)工具的增强,以评估当前状态并帮助预测即将到来的挑战,以保持意识。我们在调查中使用各种标准,例如;架构改进、影响SIEM过程、利用CTI(网络威胁情报)工件、实现区域和产生结果的类型。为此,我们的目标是向学术界和业界专业人士介绍网络态势感知的上升趋势。
{"title":"Investigation of Cyber Situation Awareness via SIEM tools: a constructive review","authors":"U. Ünal, Ceyda Nur Kahya, Yaprak Kurtlutepe, H. Dağ","doi":"10.1109/UBMK52708.2021.9558964","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558964","url":null,"abstract":"Awareness, in the sense of security, builds the backbone of operations understanding the current and future cyber activities. Situation awareness has become the focal point of securing systems due to dynamic nature of cyber domain. Technological advancements cause the volatility to transform into upcoming challenges. Understanding those is the key to keep cyber Situation Awareness (SA) progression. Earlier studies define required steps to administer cyber SA. These steps (perceive, comprehend, project, and resolve) are also adapted to cyber domain. Rapid technological changes redefine the content of those and thus, it creates demands improving automated tools, which play as systematic factor in nurturing SA. As a system factor, SIEM tools can be basis for comprehending cyber domain. In this work, we investigate recent studies contributed mainly to SIEM (Security Information and Event Management) tool’s enhancement to evaluate current state and help predict upcoming challenges for maintaining awareness. We use various criteria in our investigation such as; architecture improvement, affected SIEM process, utilized CTI (Cyber Threat Intelligence) artefact, implementation area, and type of produced result. In doing so, we aim to impart upward trends on CSA (Cyber Situation Awareness) to academia and industry professionals.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123140030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
AI-Supported Cross and UP Sales Tendency Analysis System for Insurance Companies 基于ai的保险公司交叉向上销售趋势分析系统
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9559022
Tolgahan Satici, Recep Bayindir
Cross and up-selling models are sales models designed to deepen customers’ spending habits, segments and spending trends, and to increase the life span of the customer. Within the scope of the study, a software was created that presents all of the actionable value-added information production from raw data supported by artificial intelligence and machine learning in modular and automation form. Our study has enabled the rule-based customer base created with business knowledge to produce much more successful output with advanced analytical models such as k-means and apriori. With the technological infrastructure created with the big data infrastructure, an expanding infrastructure where voluminous data can be processed has been provided. Successful results were obtained by testing the outputs in Turkey's leading institutions.
交叉和向上销售模式是旨在加深客户的消费习惯、细分和消费趋势,并延长客户寿命的销售模式。在研究范围内,创建了一个软件,该软件以模块化和自动化的形式从人工智能和机器学习支持的原始数据中呈现所有可操作的增值信息生产。我们的研究使基于规则的客户基础与商业知识创建,产生更成功的输出与先进的分析模型,如k-means和先验。随着大数据基础设施创造的技术基础设施,可以处理大量数据的基础设施不断扩大。通过对土耳其主要机构的产出进行测试,取得了成功的结果。
{"title":"AI-Supported Cross and UP Sales Tendency Analysis System for Insurance Companies","authors":"Tolgahan Satici, Recep Bayindir","doi":"10.1109/UBMK52708.2021.9559022","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9559022","url":null,"abstract":"Cross and up-selling models are sales models designed to deepen customers’ spending habits, segments and spending trends, and to increase the life span of the customer. Within the scope of the study, a software was created that presents all of the actionable value-added information production from raw data supported by artificial intelligence and machine learning in modular and automation form. Our study has enabled the rule-based customer base created with business knowledge to produce much more successful output with advanced analytical models such as k-means and apriori. With the technological infrastructure created with the big data infrastructure, an expanding infrastructure where voluminous data can be processed has been provided. Successful results were obtained by testing the outputs in Turkey's leading institutions.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129669387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strong Authentication Protocol for Identity Verification in Internet of Things (IoT) 面向物联网(IoT)身份验证的强认证协议
Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9559010
H. Dalkılıç, M. H. Özcanhan
The use of Internet of things (IoT) devices in smart cities has been increasing in recent years. The use of IoT devices, which facilitate the daily life of people living in the smart city, on wearable and mobile devices causes the vulnerability. Some countermeasures should be taken to prevent unauthorized access to IoT devices that contain personal data and to protect the data. In this study, the protocol created to ensure the security of the data communication of IoT devices in smart cities is explained. In the proposed design, IoT device-based secure data communication protocol with limited resources is presented. Data privacy methods that will work on IoT devices are designed to achieve high performance by consuming as few resources as possible. The proposed protocol provides secure data communication against 4 different attacks: Man-in-the-middle attack, malicious code injection attack, denial of service (DoS) attack, and replay attack. As a result of the formal analysis made with the Scyther tool, it is shown that data security is ensured.
近年来,智能城市中物联网(IoT)设备的使用一直在增加。物联网设备为智慧城市中人们的日常生活提供了便利,在可穿戴设备和移动设备上使用物联网设备导致了脆弱性。为了防止对包含个人数据的物联网设备进行未经授权的访问,并保护数据,应该采取一些对策。在本研究中,解释了为确保智慧城市中物联网设备数据通信安全而创建的协议。提出了一种基于物联网设备的有限资源安全数据通信协议。在物联网设备上工作的数据隐私方法旨在通过消耗尽可能少的资源来实现高性能。该协议提供了安全的数据通信,可抵御4种不同的攻击:中间人攻击、恶意代码注入攻击、拒绝服务攻击和重放攻击。使用Scyther工具进行形式化分析,结果表明数据的安全性得到了保证。
{"title":"Strong Authentication Protocol for Identity Verification in Internet of Things (IoT)","authors":"H. Dalkılıç, M. H. Özcanhan","doi":"10.1109/UBMK52708.2021.9559010","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9559010","url":null,"abstract":"The use of Internet of things (IoT) devices in smart cities has been increasing in recent years. The use of IoT devices, which facilitate the daily life of people living in the smart city, on wearable and mobile devices causes the vulnerability. Some countermeasures should be taken to prevent unauthorized access to IoT devices that contain personal data and to protect the data. In this study, the protocol created to ensure the security of the data communication of IoT devices in smart cities is explained. In the proposed design, IoT device-based secure data communication protocol with limited resources is presented. Data privacy methods that will work on IoT devices are designed to achieve high performance by consuming as few resources as possible. The proposed protocol provides secure data communication against 4 different attacks: Man-in-the-middle attack, malicious code injection attack, denial of service (DoS) attack, and replay attack. As a result of the formal analysis made with the Scyther tool, it is shown that data security is ensured.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133723603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 6th International Conference on Computer Science and Engineering (UBMK)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1