首页 > 最新文献

2012 Ninth International Conference on Information Technology - New Generations最新文献

英文 中文
Implementation of a Wavelength Division Multiplexing and Bidirectional Optic Fiber Link iLab 波分复用和双向光纤链路的实现
Doreen Orishaba, R. Besiga, A. T. Asiimwe, S. S. Tickodri-Togboa, P. I. Musasizi, Cosmas Mwikirize
An online laboratory that handles two critical concepts in Fiber Optic Communications: Bi-Directional Optic Fiber Link and Wavelength Division Multiplexing phenomena was developed at Makerere University. Designed using the EMONA Fiber Optics Telecommunications Experimenter (FOTEx), an add-on board for the National Instruments Educational Laboratory Virtual Instrumentation Suite (NI ELVIS II™) platform, it was deployed on the Interactive iLabs Shared Architecture (ISA). The laboratory supports curricula of Bachelor of Science in Computer, Electrical and Telecommunication Engineering Programmes.
马凯雷雷大学开发了一个在线实验室,处理光纤通信中的两个关键概念:双向光纤链路和波分复用现象。使用EMONA光纤通信实验员(FOTEx)设计,该实验员是国家仪器教育实验室虚拟仪器套件(NI ELVIS II™)平台的附加板,部署在交互式实验室共享架构(ISA)上。该实验室支持计算机、电气和电信工程理学学士课程。
{"title":"Implementation of a Wavelength Division Multiplexing and Bidirectional Optic Fiber Link iLab","authors":"Doreen Orishaba, R. Besiga, A. T. Asiimwe, S. S. Tickodri-Togboa, P. I. Musasizi, Cosmas Mwikirize","doi":"10.1109/ITNG.2012.173","DOIUrl":"https://doi.org/10.1109/ITNG.2012.173","url":null,"abstract":"An online laboratory that handles two critical concepts in Fiber Optic Communications: Bi-Directional Optic Fiber Link and Wavelength Division Multiplexing phenomena was developed at Makerere University. Designed using the EMONA Fiber Optics Telecommunications Experimenter (FOTEx), an add-on board for the National Instruments Educational Laboratory Virtual Instrumentation Suite (NI ELVIS II™) platform, it was deployed on the Interactive iLabs Shared Architecture (ISA). The laboratory supports curricula of Bachelor of Science in Computer, Electrical and Telecommunication Engineering Programmes.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124289180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Software Architecture for Mobile Computing 面向移动计算的安全软件体系结构
H. Reza, Narayana Mazumder
Mobile computing is considered as low-end computing systems. It currently dominates almost all aspects of our lives from mobile banking to mobile purchasing to mobile skypeing, etc. With the increasing demand of smart phones in today's world, making the system secure is very important. Software architecture plays an important role to achieve both functionalities and quality (e.g., security) of a system. This paper surveys the software architecture of five of the leading mobile operating systems such as Android (Linux), Blackberry, iPhone (Mac OS X), Symbian, and Windows Mobile. Our survey study indicates that Android is the most promising of al and identifies security issues with Android. The paper then proposes improved software architecture to resolve these issues. More specifically, our proposed software architecture attempts to enhance the security of Android without comprising it performance.
移动计算被认为是低端计算系统。它目前几乎支配着我们生活的方方面面,从手机银行到手机购物,再到手机通话等等。随着当今世界对智能手机的需求越来越大,确保系统的安全是非常重要的。软件架构在实现系统的功能和质量(例如,安全性)方面起着重要的作用。本文调查了五个领先的移动操作系统的软件架构,如Android (Linux),黑莓,iPhone (Mac OS X),塞班和Windows mobile。我们的调查研究表明,Android是最有前途的,并指出了Android的安全问题。然后提出了改进的软件体系结构来解决这些问题。更具体地说,我们提出的软件架构试图在不影响其性能的情况下增强Android的安全性。
{"title":"A Secure Software Architecture for Mobile Computing","authors":"H. Reza, Narayana Mazumder","doi":"10.1109/ITNG.2012.122","DOIUrl":"https://doi.org/10.1109/ITNG.2012.122","url":null,"abstract":"Mobile computing is considered as low-end computing systems. It currently dominates almost all aspects of our lives from mobile banking to mobile purchasing to mobile skypeing, etc. With the increasing demand of smart phones in today's world, making the system secure is very important. Software architecture plays an important role to achieve both functionalities and quality (e.g., security) of a system. This paper surveys the software architecture of five of the leading mobile operating systems such as Android (Linux), Blackberry, iPhone (Mac OS X), Symbian, and Windows Mobile. Our survey study indicates that Android is the most promising of al and identifies security issues with Android. The paper then proposes improved software architecture to resolve these issues. More specifically, our proposed software architecture attempts to enhance the security of Android without comprising it performance.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117003883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
When the Software Goes Beyond its Requirements -- A Software Security Perspective 当软件超出其需求时——一个软件安全的视角
Jing-Chiou Liou
Evidences from current events have shown that, in addition to virus and hacker attacks, many software systems have been embedded with "agents" that pose security threats such as allowing someone to "invade" into computers with such software installed. This will eventually grow into a more serious problem when Cluster and Cloud Computing becomes popular. As this is an area that few have been exploring, we discuss in this paper the issue of software security breaches resulting from embedded sleeping agents. We also investigate some patterns of embedded sleeping agents utilized in software industry. In addition, we review these patterns and propose a security model that identifies different scenarios. This security model will provide a foundation for further study on how to detect and prevent such patterns from becoming security breaches.
当前事件的证据表明,除了病毒和黑客攻击之外,许多软件系统还嵌入了构成安全威胁的“代理”,例如允许某人“侵入”安装了此类软件的计算机。当集群和云计算变得流行时,这将最终成为一个更严重的问题。由于这是一个很少有人探索的领域,我们在本文中讨论了由嵌入式休眠代理导致的软件安全漏洞问题。我们还研究了软件行业中使用的嵌入式睡眠剂的一些模式。此外,我们将回顾这些模式,并提出一个识别不同场景的安全模型。该安全模型将为进一步研究如何检测和防止此类模式成为安全漏洞提供基础。
{"title":"When the Software Goes Beyond its Requirements -- A Software Security Perspective","authors":"Jing-Chiou Liou","doi":"10.1109/ITNG.2012.98","DOIUrl":"https://doi.org/10.1109/ITNG.2012.98","url":null,"abstract":"Evidences from current events have shown that, in addition to virus and hacker attacks, many software systems have been embedded with \"agents\" that pose security threats such as allowing someone to \"invade\" into computers with such software installed. This will eventually grow into a more serious problem when Cluster and Cloud Computing becomes popular. As this is an area that few have been exploring, we discuss in this paper the issue of software security breaches resulting from embedded sleeping agents. We also investigate some patterns of embedded sleeping agents utilized in software industry. In addition, we review these patterns and propose a security model that identifies different scenarios. This security model will provide a foundation for further study on how to detect and prevent such patterns from becoming security breaches.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122659199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
How Can Social Networks Help Us Measure Trust Online? 社交网络如何帮助我们衡量在线信任?
Wei-Lun Chang, Arleen N. Diaz
Information overload is an increasing problem, and as information available continues to grow in volume, current filtering techniques are proving inefficient. Social network users, and people in general, tend to prioritize recommendations coming from people they are acquainted to. This research proposes a trust model that will estimate a trust value for content creators on an online rating system with social network capabilities. This research introduces the concept of social distance, which is drawn from clustering methods applied to the social network user base, and incorporates said distance in the estimation of trust, as well as user generated ratings. The trust value estimated will serve as a metric for filtering and sorting content of any kind based on the trustworthiness of the creator.
信息过载是一个日益严重的问题,随着可用信息数量的不断增长,目前的过滤技术被证明是低效的。社交网络用户和一般人倾向于优先考虑来自他们熟悉的人的推荐。本研究提出了一个信任模型,该模型将在具有社交网络功能的在线评级系统上估计内容创作者的信任值。本研究引入了社交距离的概念,该概念来自于应用于社交网络用户群的聚类方法,并将所述距离纳入信任估计以及用户生成评级中。估计的信任值将作为基于创建者的可信度对任何类型的内容进行过滤和排序的度量。
{"title":"How Can Social Networks Help Us Measure Trust Online?","authors":"Wei-Lun Chang, Arleen N. Diaz","doi":"10.1109/ITNG.2012.76","DOIUrl":"https://doi.org/10.1109/ITNG.2012.76","url":null,"abstract":"Information overload is an increasing problem, and as information available continues to grow in volume, current filtering techniques are proving inefficient. Social network users, and people in general, tend to prioritize recommendations coming from people they are acquainted to. This research proposes a trust model that will estimate a trust value for content creators on an online rating system with social network capabilities. This research introduces the concept of social distance, which is drawn from clustering methods applied to the social network user base, and incorporates said distance in the estimation of trust, as well as user generated ratings. The trust value estimated will serve as a metric for filtering and sorting content of any kind based on the trustworthiness of the creator.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"35 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122453094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cultural Impact on e-service Use in Saudi Arabia: Results from Focus Groups 沙特阿拉伯对电子服务使用的文化影响:焦点小组的结果
M. Aldraehim, Sylvia Lauretta Edwards, J. Watson
This paper reports the results of focus groups obtained as part of a full study that uses a mixed method approach to answer the following question: what are the cultural values that impact on e-service use in Saudi Arabia? In order to answer this question we reviewed culture theories, dimensions, and models that have been identified in the literature. Four focus groups interviewing experts and general users (customers) of online services in Saudi Arabia have been completed aiming at the end to identify the uncovered elements of Saudi culture in the literature, which hopefully will result in developing a framework of cultural values that affect e-service use in Saudi context. This paper will firstly, introduce the importance of culture and define the aspects of Saudi culture. It will then describe the method used, and finally discussing the findings of the focus groups. Findings revealed four factors that have not been covered in the literature and need to be investigated namely: nepotism, the lack of human interaction, services oriented culture, and the career path.
本文报告了作为一项全面研究的一部分获得的焦点小组的结果,该研究使用混合方法来回答以下问题:什么是影响沙特阿拉伯电子服务使用的文化价值观?为了回答这个问题,我们回顾了文献中已经确定的文化理论、维度和模型。已经完成了四个焦点小组访谈专家和沙特阿拉伯在线服务的一般用户(客户),目的是最终确定文献中未发现的沙特文化元素,希望能够建立一个影响沙特背景下电子服务使用的文化价值观框架。本文将首先介绍文化的重要性,并定义沙特文化的各个方面。然后将描述所使用的方法,最后讨论焦点小组的发现。研究结果揭示了文献中未涉及的四个因素,需要进行调查:裙带关系、缺乏人际互动、服务导向的文化和职业道路。
{"title":"Cultural Impact on e-service Use in Saudi Arabia: Results from Focus Groups","authors":"M. Aldraehim, Sylvia Lauretta Edwards, J. Watson","doi":"10.1109/ITNG.2012.146","DOIUrl":"https://doi.org/10.1109/ITNG.2012.146","url":null,"abstract":"This paper reports the results of focus groups obtained as part of a full study that uses a mixed method approach to answer the following question: what are the cultural values that impact on e-service use in Saudi Arabia? In order to answer this question we reviewed culture theories, dimensions, and models that have been identified in the literature. Four focus groups interviewing experts and general users (customers) of online services in Saudi Arabia have been completed aiming at the end to identify the uncovered elements of Saudi culture in the literature, which hopefully will result in developing a framework of cultural values that affect e-service use in Saudi context. This paper will firstly, introduce the importance of culture and define the aspects of Saudi culture. It will then describe the method used, and finally discussing the findings of the focus groups. Findings revealed four factors that have not been covered in the literature and need to be investigated namely: nepotism, the lack of human interaction, services oriented culture, and the career path.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115793979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The Building of a Large Government Digital Library 大型政府数字图书馆的建设
K. Taghva
This paper reports on the methodology of building an electronic digital library. In particular, it addresses the issues involving OCR errors and conversion. It also reports on data mining applications required for filtering sensitive information.
本文介绍了电子数字图书馆的建设方法。特别是,它解决了涉及OCR错误和转换的问题。它还报告了过滤敏感信息所需的数据挖掘应用程序。
{"title":"The Building of a Large Government Digital Library","authors":"K. Taghva","doi":"10.1109/ITNG.2012.176","DOIUrl":"https://doi.org/10.1109/ITNG.2012.176","url":null,"abstract":"This paper reports on the methodology of building an electronic digital library. In particular, it addresses the issues involving OCR errors and conversion. It also reports on data mining applications required for filtering sensitive information.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126298612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perceived Privacy 认为隐私
S. Al-Fedaghi
To understand the notion of perceived privacy, this paper explores and proposes a model of the relationship between privacy and security. Security is measured in terms of the preparedness required to meet a certain level of threat. Privacy is measured in terms of level of exposure at a certain point of threat. With this understanding, perceived privacy is viewed as a proprietor (the person the information is about) perceiving the broker (handler of information) in his/her place with respect to valuing the sensitivity of the information, and taking care when handling this information. Transparency between proprietor and broker leads to trust.
为了理解感知隐私的概念,本文探索并提出了隐私与安全之间关系的模型。安全性是根据应对一定程度的威胁所需的准备程度来衡量的。隐私是根据在某个威胁点上的暴露程度来衡量的。有了这种理解,感知隐私被视为所有者(信息所涉及的人)在他/她的位置上感知经纪人(信息处理者)对信息敏感性的重视,并在处理这些信息时小心翼翼。业主和经纪人之间的透明导致信任。
{"title":"Perceived Privacy","authors":"S. Al-Fedaghi","doi":"10.1109/ITNG.2012.90","DOIUrl":"https://doi.org/10.1109/ITNG.2012.90","url":null,"abstract":"To understand the notion of perceived privacy, this paper explores and proposes a model of the relationship between privacy and security. Security is measured in terms of the preparedness required to meet a certain level of threat. Privacy is measured in terms of level of exposure at a certain point of threat. With this understanding, perceived privacy is viewed as a proprietor (the person the information is about) perceiving the broker (handler of information) in his/her place with respect to valuing the sensitivity of the information, and taking care when handling this information. Transparency between proprietor and broker leads to trust.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127408467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Serious Video Games: Games for Education and Health 严肃电子游戏:教育和健康游戏
V. Janarthanan
Every game in the market is made in an effort to play, produce, teach, motivate, socialize, communicate and educate different cultures. The gamer is exposed to different types of games that can be categorized into a casual game, serious game and advergame. Serious games include games for training, games for education, games for science and research, games for production and games for work. Serious games do not necessarily lead to the production of a game [1]. They are mainly used to ensure better health and educational environment. They also provide a tool for creating jobs and making life easier in arts, design, therapy, generic software engineering, healthcare and more. Serious games are made intentionally for learning. In this paper, I will be discussing in-depth the two most crucial categories of serious games namely games for education and games for health.
市场上的每一款游戏都致力于体验、创造、教育、激励、社交、交流和教育不同的文化。玩家会接触到不同类型的游戏,这些游戏可以分为休闲游戏、严肃游戏和广告游戏。严肃游戏包括训练游戏、教育游戏、科学研究游戏、生产游戏和工作游戏。严肃游戏并不一定会导致游戏的制作[1]。它们主要用于确保更好的健康和教育环境。它们还提供了一种工具,用于创造就业机会,使艺术、设计、治疗、通用软件工程、医疗保健等领域的生活更轻松。严肃游戏是为了学习而设计的。在本文中,我将深入讨论两个最重要的严肃游戏类别,即教育游戏和健康游戏。
{"title":"Serious Video Games: Games for Education and Health","authors":"V. Janarthanan","doi":"10.1109/ITNG.2012.79","DOIUrl":"https://doi.org/10.1109/ITNG.2012.79","url":null,"abstract":"Every game in the market is made in an effort to play, produce, teach, motivate, socialize, communicate and educate different cultures. The gamer is exposed to different types of games that can be categorized into a casual game, serious game and advergame. Serious games include games for training, games for education, games for science and research, games for production and games for work. Serious games do not necessarily lead to the production of a game [1]. They are mainly used to ensure better health and educational environment. They also provide a tool for creating jobs and making life easier in arts, design, therapy, generic software engineering, healthcare and more. Serious games are made intentionally for learning. In this paper, I will be discussing in-depth the two most crucial categories of serious games namely games for education and games for health.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130626059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Evaluating Students Online Discussion Performance by Using Social Network Analysis 运用社会网络分析评价学生在线讨论表现
Peng He
Online discussion forum is becoming an important part in college education nowadays. To evaluate student's online discussion performance is essential since more and more professors have included online participation as a part of their class grade. In this paper, we use social network analysis methods to help professors in evaluating individual student's online discussion performance. By applying degree centrality (out-Degree and in-Degree) and density metrics, we can identify students who have been actively involved in the discussion board and find out those who need to be encouraged to participate in. Also, SNA software tools are used to visualize students' online discussion participation networks and help to identify these active nodes. In addition, Page Rank algorithm has been applied to the same data to rank the prestige nodes in this social network and the results are compared with degree centrality metric one. The experimental data of students' online discussion threads are collected from one undergraduate course MIS at our University and results show that students who actively participate in online discussion have good academic performances.
网络论坛正在成为当今大学教育的重要组成部分。评估学生的在线讨论表现是必不可少的,因为越来越多的教授将在线参与作为他们课堂成绩的一部分。在本文中,我们使用社会网络分析方法来帮助教授评估个别学生的在线讨论表现。通过应用学位中心性(out- degree和in- degree)和密度指标,我们可以确定积极参与讨论板的学生,并找出需要鼓励参与的学生。此外,SNA软件工具用于可视化学生的在线讨论参与网络,并帮助识别这些活动节点。此外,对同一数据应用Page Rank算法对该社交网络中的威望节点进行排名,并将结果与度中心性度量1进行比较。在我校某本科管理信息系统中收集了学生在线讨论线程的实验数据,结果表明,积极参与在线讨论的学生具有良好的学习成绩。
{"title":"Evaluating Students Online Discussion Performance by Using Social Network Analysis","authors":"Peng He","doi":"10.1109/ITNG.2012.72","DOIUrl":"https://doi.org/10.1109/ITNG.2012.72","url":null,"abstract":"Online discussion forum is becoming an important part in college education nowadays. To evaluate student's online discussion performance is essential since more and more professors have included online participation as a part of their class grade. In this paper, we use social network analysis methods to help professors in evaluating individual student's online discussion performance. By applying degree centrality (out-Degree and in-Degree) and density metrics, we can identify students who have been actively involved in the discussion board and find out those who need to be encouraged to participate in. Also, SNA software tools are used to visualize students' online discussion participation networks and help to identify these active nodes. In addition, Page Rank algorithm has been applied to the same data to rank the prestige nodes in this social network and the results are compared with degree centrality metric one. The experimental data of students' online discussion threads are collected from one undergraduate course MIS at our University and results show that students who actively participate in online discussion have good academic performances.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131404214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
MASID: Multi-Agent System for Intrusion Detection in MANET 基于多智能体的MANET入侵检测系统
Leila Mechtri, Fatiha Djemili Tolba, S. Ghanemi
In this paper we focus on intrusion detection in the mobile ad hoc networks (MANETs). Starting by an overview of the existing work in this field, and ending up with the proposal of a new distributed and cooperative architecture for intrusion detection. In order to overcome the weaknesses and flaws of the existing MANET intrusion detection systems (IDSs), this architecture integrates an agent-based detection process. So, the main principle of the proposed architecture is based on: (a) the distribution which is achieved through the implementation of a local intrusion detection system on each network node, and (b) the cooperation that is guaranteed by mobile and stationary agents' collaboration. In that way we were able to have an IDS with so many interesting features such as: flexibility, distribution and cooperation, autonomy, lightweight, reactivity and fault tolerance which are extremely desired for any MANET intrusion detection system.
本文主要研究移动自组网(manet)中的入侵检测问题。本文首先概述了该领域的现有工作,最后提出了一种新的分布式协作入侵检测体系结构。为了克服现有MANET入侵检测系统的弱点和缺陷,该体系结构集成了基于agent的检测过程。因此,所提出的体系结构的主要原理是:(a)通过在每个网络节点上实现本地入侵检测系统来实现分布;(b)通过移动和固定代理的协作来保证协作。通过这种方式,我们能够拥有一个具有许多有趣特性的IDS,例如:灵活性,分布和合作,自主性,轻量级,反应性和容错性,这些都是任何MANET入侵检测系统非常需要的。
{"title":"MASID: Multi-Agent System for Intrusion Detection in MANET","authors":"Leila Mechtri, Fatiha Djemili Tolba, S. Ghanemi","doi":"10.1109/ITNG.2012.18","DOIUrl":"https://doi.org/10.1109/ITNG.2012.18","url":null,"abstract":"In this paper we focus on intrusion detection in the mobile ad hoc networks (MANETs). Starting by an overview of the existing work in this field, and ending up with the proposal of a new distributed and cooperative architecture for intrusion detection. In order to overcome the weaknesses and flaws of the existing MANET intrusion detection systems (IDSs), this architecture integrates an agent-based detection process. So, the main principle of the proposed architecture is based on: (a) the distribution which is achieved through the implementation of a local intrusion detection system on each network node, and (b) the cooperation that is guaranteed by mobile and stationary agents' collaboration. In that way we were able to have an IDS with so many interesting features such as: flexibility, distribution and cooperation, autonomy, lightweight, reactivity and fault tolerance which are extremely desired for any MANET intrusion detection system.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"112 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131811620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
期刊
2012 Ninth International Conference on Information Technology - New Generations
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1