首页 > 最新文献

2007 International Conference on Computational Intelligence and Security (CIS 2007)最新文献

英文 中文
A Bayesian Network Based Approach for Root-Cause-Analysis in Manufacturing Process 基于贝叶斯网络的制造过程根本原因分析方法
Satyabrata Pradhan, Rajveer Singh, Komal Kachru, S. Narasimhamurthy
We describe an Early Warning System (EWS) which enables the root cause analysis for initiating quality improvements in the manufacturing shop floor and process engineering departments, at product OEMs as well as their tiered suppliers. The EWS combines the use of custom designed domain ontology of manufacturing processes and failure related knowledge, innovative application of domain knowledge in the form of probability constraints and a novel two step constrained optimization approach to causal network construction. Probabilistic reasoning is the main vehicle for inference from the causal network. This inference engine provides the capability to do a root cause analysis in manufacturing scenarios, and is thus a powerful weapon for an automotive EWS. This technique is widely applicable and can be used in various contexts in the broader manufacturing industry as well.
我们描述了一个早期预警系统(EWS),它能够对生产车间和工艺工程部门、产品oem及其分层供应商的质量改进进行根本原因分析。EWS结合了定制设计制造过程领域本体和失效相关知识的使用,以概率约束形式创新地应用领域知识,以及一种新的两步约束优化方法来构建因果网络。概率推理是从因果网络中进行推理的主要工具。该推理引擎提供了在制造场景中进行根本原因分析的能力,因此是汽车EWS的强大武器。该技术具有广泛的适用性,可以在更广泛的制造业的各种环境中使用。
{"title":"A Bayesian Network Based Approach for Root-Cause-Analysis in Manufacturing Process","authors":"Satyabrata Pradhan, Rajveer Singh, Komal Kachru, S. Narasimhamurthy","doi":"10.1109/CIS.2007.214","DOIUrl":"https://doi.org/10.1109/CIS.2007.214","url":null,"abstract":"We describe an Early Warning System (EWS) which enables the root cause analysis for initiating quality improvements in the manufacturing shop floor and process engineering departments, at product OEMs as well as their tiered suppliers. The EWS combines the use of custom designed domain ontology of manufacturing processes and failure related knowledge, innovative application of domain knowledge in the form of probability constraints and a novel two step constrained optimization approach to causal network construction. Probabilistic reasoning is the main vehicle for inference from the causal network. This inference engine provides the capability to do a root cause analysis in manufacturing scenarios, and is thus a powerful weapon for an automotive EWS. This technique is widely applicable and can be used in various contexts in the broader manufacturing industry as well.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134182313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Hybrid Approach for Real-Time Network Intrusion Detection Systems 一种实时网络入侵检测系统的混合方法
Jia Li, M. Xie
This paper proposes a hybrid approach for real- time Network Intrusion Detection Systems (NIDS). We adopt Random Forest (RF) for feature selection and Minimax Probability Machine (MPM) for intrusion detection. RF provides the variable importance by numeric values so that the irrelevant features can be eliminated. However, the NIDS based on RF is slow to build intrusion detection model. We employ MPM, since MPM has been shown a better performance, compared with RF in terms of model building time. To validate the feasibility, we carry out several times of experiments with KDD 1999 intrusion detection dataset. The experimental results show the proposed approach is faster and more lightweight than the previous approaches while guaranteeing high detection rates so that it is suitable for real-time NIDS.
提出了一种用于实时网络入侵检测系统(NIDS)的混合方法。我们采用随机森林(RF)进行特征选择,采用极大极小概率机(MPM)进行入侵检测。RF通过数值提供可变的重要性,从而可以消除不相关的特征。然而,基于射频的入侵检测系统建立入侵检测模型的速度较慢。我们采用MPM,因为MPM在模型构建时间方面比RF表现出更好的性能。为了验证该方法的可行性,我们使用KDD 1999入侵检测数据集进行了多次实验。实验结果表明,该方法在保证高检测率的同时,速度更快,重量更轻,适用于实时NIDS。
{"title":"A Hybrid Approach for Real-Time Network Intrusion Detection Systems","authors":"Jia Li, M. Xie","doi":"10.1109/CIS.2007.10","DOIUrl":"https://doi.org/10.1109/CIS.2007.10","url":null,"abstract":"This paper proposes a hybrid approach for real- time Network Intrusion Detection Systems (NIDS). We adopt Random Forest (RF) for feature selection and Minimax Probability Machine (MPM) for intrusion detection. RF provides the variable importance by numeric values so that the irrelevant features can be eliminated. However, the NIDS based on RF is slow to build intrusion detection model. We employ MPM, since MPM has been shown a better performance, compared with RF in terms of model building time. To validate the feasibility, we carry out several times of experiments with KDD 1999 intrusion detection dataset. The experimental results show the proposed approach is faster and more lightweight than the previous approaches while guaranteeing high detection rates so that it is suitable for real-time NIDS.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"94 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122700595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
An Improved Algorithm for Iris Location 一种改进的虹膜定位算法
Xuehu Yan, Shenghong Chen, X. Niu
Biometric technologies have shown much more impor- tance in various application. Among them, iris recognition is considered as one of the most reliable and accurate tech- nologies. As the first step of iris recognition, the location of iris will affect the performance of the whole system. This paper proposes an improved algorithm to locate iris and eyelids. Morphological operation is applied to remove eye- lashes in process of iris boundary location. And optimal step length is calculated to reduce search time. Experimen- tal results demonstrate that the proposed iris location algo- rithm is able to achieve a good performance with accuracy more than 97.6%.
生物识别技术在各种应用中显示出越来越重要的作用。其中,虹膜识别被认为是最可靠、最准确的技术之一。作为虹膜识别的第一步,虹膜的位置将影响整个系统的性能。本文提出了一种改进的虹膜和眼睑定位算法。在虹膜边界定位过程中,采用形态学操作去除眼睫毛。并计算出最优步长以减少搜索时间。实验结果表明,本文提出的虹膜定位算法能够达到较好的定位效果,准确率达到97.6%以上。
{"title":"An Improved Algorithm for Iris Location","authors":"Xuehu Yan, Shenghong Chen, X. Niu","doi":"10.1109/CIS.2007.98","DOIUrl":"https://doi.org/10.1109/CIS.2007.98","url":null,"abstract":"Biometric technologies have shown much more impor- tance in various application. Among them, iris recognition is considered as one of the most reliable and accurate tech- nologies. As the first step of iris recognition, the location of iris will affect the performance of the whole system. This paper proposes an improved algorithm to locate iris and eyelids. Morphological operation is applied to remove eye- lashes in process of iris boundary location. And optimal step length is calculated to reduce search time. Experimen- tal results demonstrate that the proposed iris location algo- rithm is able to achieve a good performance with accuracy more than 97.6%.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128415277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks 移动无线传感器网络中的安全加密数据聚合
Shih-I Huang, S. Shieh
This paper proposes a Secure Encrypted-data Aggregation (SEA) scheme in mobile wireless sensor networks (MWSN) environment. Our design for data aggregation eliminates redundant sensor readings without using encryption and maintains data secrecy and privacy during transmission. In contrast to conventional schemes, our proposed scheme provides security and privacy, and duplicate instances of original readings will be aggregated into a single packet; therefore, more energy can be saved.
提出了一种移动无线传感器网络环境下的安全加密数据聚合(SEA)方案。我们的数据聚合设计消除了冗余的传感器读数,而无需使用加密,并在传输过程中保持数据保密和隐私。与传统方案相比,我们提出的方案提供了安全性和隐私性,并且原始读数的重复实例将聚合到单个数据包中;因此,可以节省更多的能源。
{"title":"SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks","authors":"Shih-I Huang, S. Shieh","doi":"10.1109/CIS.2007.207","DOIUrl":"https://doi.org/10.1109/CIS.2007.207","url":null,"abstract":"This paper proposes a Secure Encrypted-data Aggregation (SEA) scheme in mobile wireless sensor networks (MWSN) environment. Our design for data aggregation eliminates redundant sensor readings without using encryption and maintains data secrecy and privacy during transmission. In contrast to conventional schemes, our proposed scheme provides security and privacy, and duplicate instances of original readings will be aggregated into a single packet; therefore, more energy can be saved.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116021312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Improvement on a Generalized Scheme of Proxy Signature Based on Elliptic Curves 基于椭圆曲线的代理签名广义方案的改进
Zuowen Tan
In a generalized (t1/n1-t2/n2) proxy signature scheme with known signers, any t1 or more original signers out of n1 original signers (1 t1 n1) can represent the original group to delegate the signing capability, and t2 or more proxy signers out of n2 proxy signers (1 t2 n2) can represent the proxy group to sign message on behalf of the original group. In the paper, we show that Hwang et al.'s generalized proxy signature scheme is vulnerable to the original signers' forgery attack. After a malicious original group of t1 (t1 t1 n1) signers obtains a proxy sig- nature (Mw, K, AOSID, M, R, S, AP SID), the original signer group can collude to generate a generalized proxy signature without the agreement of the proxy group with the identities AP SID. Hwang et al.'s generalized proxy signa- ture scheme is unable to meet nonrepudiation. We propose an improved generalized proxy signature scheme which can resist our original signer group's collusion attack.
在已知签名者的广义(t1/n1-t2/n2)代理签名方案中,n1个原始签名者(1 t1 n1)中任意t1个或多个原始签名者可以代表原始组来委托签名能力,n2个代理签名者(1 t2 n2)中任意t2个或多个代理签名者可以代表代理组来代表原始组对消息进行签名。本文证明了Hwang等人的广义代理签名方案容易受到原始签名者伪造攻击。当t1 (t1 t1 n1)个恶意原始签名组获得代理签名性质(Mw、K、AOSID、M、R、S、AP SID)后,原始签名组无需与代理组的身份AP SID达成一致即可合谋生成广义代理签名。Hwang等人的广义代理签名方案不能满足不可否认性。提出了一种改进的广义代理签名方案,该方案可以抵抗原始签名者群的合谋攻击。
{"title":"Improvement on a Generalized Scheme of Proxy Signature Based on Elliptic Curves","authors":"Zuowen Tan","doi":"10.1109/CIS.2007.78","DOIUrl":"https://doi.org/10.1109/CIS.2007.78","url":null,"abstract":"In a generalized (t1/n1-t2/n2) proxy signature scheme with known signers, any t1 or more original signers out of n1 original signers (1 t1 n1) can represent the original group to delegate the signing capability, and t2 or more proxy signers out of n2 proxy signers (1 t2 n2) can represent the proxy group to sign message on behalf of the original group. In the paper, we show that Hwang et al.'s generalized proxy signature scheme is vulnerable to the original signers' forgery attack. After a malicious original group of t1 (t1 t1 n1) signers obtains a proxy sig- nature (Mw, K, AOSID, M, R, S, AP SID), the original signer group can collude to generate a generalized proxy signature without the agreement of the proxy group with the identities AP SID. Hwang et al.'s generalized proxy signa- ture scheme is unable to meet nonrepudiation. We propose an improved generalized proxy signature scheme which can resist our original signer group's collusion attack.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117296760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Pruning Neighborhood Graph for Geodesic Distance Based Semi-Supervised Classification 基于测地线距离的半监督分类剪枝邻域图
Chun-Guang Li, Jun Guo, Honggang Zhang
Recently semi-supervised learning has been gain a surge of interests, but there is a few of research on semi- supervised learning using geodesic distance. The simplest semi-supervised classification algorithm is geodesic nearest neighbors (GNN). However the naive implementation of GNN algorithm is sensitive to the neighborhood scale parameter and suffers from the dilemma of neighborhood scale parameter selection. In this paper, instead of searching for the best neighborhood parameter, we propose a pruned-GNN, which utilize the non-negative reconstructing coefficients to prune the neighborhood graph in order to facilitate the selection of neighborhood scale parameter. Experimental results on several benchmark databases have shown that the proposed pruned-GNN can produce promising accuracies.
近年来,半监督学习引起了人们的极大兴趣,但对基于测地线距离的半监督学习的研究却很少。最简单的半监督分类算法是测地线最近邻(GNN)。然而,朴素实现的GNN算法对邻域尺度参数敏感,存在邻域尺度参数选择的困境。本文提出了一种利用非负重构系数对邻域图进行剪枝以方便邻域尺度参数选择的剪枝型gnn,而不是寻找最佳邻域参数。在几个基准数据库上的实验结果表明,所提出的修剪gnn具有良好的准确率。
{"title":"Pruning Neighborhood Graph for Geodesic Distance Based Semi-Supervised Classification","authors":"Chun-Guang Li, Jun Guo, Honggang Zhang","doi":"10.1109/CIS.2007.102","DOIUrl":"https://doi.org/10.1109/CIS.2007.102","url":null,"abstract":"Recently semi-supervised learning has been gain a surge of interests, but there is a few of research on semi- supervised learning using geodesic distance. The simplest semi-supervised classification algorithm is geodesic nearest neighbors (GNN). However the naive implementation of GNN algorithm is sensitive to the neighborhood scale parameter and suffers from the dilemma of neighborhood scale parameter selection. In this paper, instead of searching for the best neighborhood parameter, we propose a pruned-GNN, which utilize the non-negative reconstructing coefficients to prune the neighborhood graph in order to facilitate the selection of neighborhood scale parameter. Experimental results on several benchmark databases have shown that the proposed pruned-GNN can produce promising accuracies.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"47 28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115594368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fast and Robust People Counting Method in Video Surveillance 一种快速鲁棒的视频监控人员计数方法
Enwei Zhang, Feng Chen
Video surveillance has become more and more prevalent. It is a basic problem to get the number of access people in scenes. When occlusions occur, it becomes difficult to count people. We propose a fast and robust people counting method, and implement a system. In our system, we use group tracking to compensate weakness of multiple human segmentation, which can handle complete occlusion. Our system can run in real-time about 30fps for CIF video, with counting accuracy defined by frame above 95%.
视频监控已经变得越来越普遍。如何获取场景中的访问人数是一个基本问题。当发生闭塞时,计数就变得困难了。提出了一种快速、鲁棒的人数统计方法,并实现了一个系统。在我们的系统中,我们使用群体跟踪来弥补多人分割的缺点,可以处理完全遮挡。我们的系统可以实时运行30fps左右的CIF视频,帧数定义的计数精度在95%以上。
{"title":"A Fast and Robust People Counting Method in Video Surveillance","authors":"Enwei Zhang, Feng Chen","doi":"10.1109/CIS.2007.85","DOIUrl":"https://doi.org/10.1109/CIS.2007.85","url":null,"abstract":"Video surveillance has become more and more prevalent. It is a basic problem to get the number of access people in scenes. When occlusions occur, it becomes difficult to count people. We propose a fast and robust people counting method, and implement a system. In our system, we use group tracking to compensate weakness of multiple human segmentation, which can handle complete occlusion. Our system can run in real-time about 30fps for CIF video, with counting accuracy defined by frame above 95%.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114927178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Design of a New Selective Video Encryption Scheme Based on H.264 一种新的基于H.264的选择性视频加密方案设计
Yajun Wang, Mian Cai, Feng Tang
With the development and application of H.264 standard, the technology of H.264-based video data security becomes increasingly important. This paper proposes a new selective encryption scheme based on H.264, it combines the AES OFB mode with the sign encryption algorithm, and encrypts DCs and parts of ACs respectively. This method not only keeps advantages of former selective encryption algorithms in computational complexity and error-propagation prevention, but also efficiently make up for the deficiency in security and compression performance. Experimental results show that the proposed method exhibits low complexity and good security, and it has little effect on compression ratio and supports error- propagation prevention. Moreover, it is suitable for secure transmission of mobile multimedia and wireless multimedia network based on H.264.
随着H.264标准的发展和应用,基于H.264的视频数据安全技术变得越来越重要。本文提出了一种基于H.264的选择性加密方案,该方案将AES OFB模式与符号加密算法相结合,分别对dc和部分ac进行加密。该方法既保留了以往选择性加密算法在计算复杂度和防止错误传播方面的优点,又有效地弥补了安全性和压缩性能方面的不足。实验结果表明,该方法具有复杂度低、安全性好、对压缩比影响小、防止错误传播等优点。此外,它还适用于基于H.264的移动多媒体和无线多媒体网络的安全传输。
{"title":"Design of a New Selective Video Encryption Scheme Based on H.264","authors":"Yajun Wang, Mian Cai, Feng Tang","doi":"10.1109/CIS.2007.99","DOIUrl":"https://doi.org/10.1109/CIS.2007.99","url":null,"abstract":"With the development and application of H.264 standard, the technology of H.264-based video data security becomes increasingly important. This paper proposes a new selective encryption scheme based on H.264, it combines the AES OFB mode with the sign encryption algorithm, and encrypts DCs and parts of ACs respectively. This method not only keeps advantages of former selective encryption algorithms in computational complexity and error-propagation prevention, but also efficiently make up for the deficiency in security and compression performance. Experimental results show that the proposed method exhibits low complexity and good security, and it has little effect on compression ratio and supports error- propagation prevention. Moreover, it is suitable for secure transmission of mobile multimedia and wireless multimedia network based on H.264.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127600528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
An Artificial Intelligence Based Approach for Risk Management Using Attack Graph 基于人工智能的攻击图风险管理方法
Ye Ji, Ting Liu, Lequan Min, Geng Zhao, Xiaohong Qin
In today's large complex organizational network, security is a challenging task for most of the administrators. The typical means by which an attacker breaks into a network is through a series of exploits, where each exploit in the series satisfies the pre-condition for subsequent exploits and makes a causal relationship among them. Such a series of exploits constitutes an attack path and the set of all possible attack paths form an attack graph. Present day vulnerability scanners are able to identify the vulnerabilities in isolation but there is a need for correlation among these vulnerabilities to identify overall risk of the network. In this paper we propose a novel approach by finding out an attack path consisting of logically connected exploits and extends it to an attack graph. The solution also finds out the set of root cause vulnerabilities for overall security threat while taking care the inherent time and scalability problem of attack graph generation.
在当今大型复杂的组织网络中,安全是大多数管理员面临的一项具有挑战性的任务。攻击者侵入网络的典型手段是通过一系列漏洞利用,其中每个漏洞利用都满足后续漏洞利用的先决条件,并在它们之间建立因果关系。这样一系列的漏洞构成了一条攻击路径,所有可能的攻击路径的集合形成了一个攻击图。目前的漏洞扫描器能够孤立地识别漏洞,但需要将这些漏洞关联起来,以识别网络的整体风险。本文提出了一种新的方法,即找出由逻辑连接的漏洞组成的攻击路径,并将其扩展为攻击图。该方案在解决攻击图生成固有的时间和可扩展性问题的同时,还能找出整体安全威胁的根源漏洞集。
{"title":"An Artificial Intelligence Based Approach for Risk Management Using Attack Graph","authors":"Ye Ji, Ting Liu, Lequan Min, Geng Zhao, Xiaohong Qin","doi":"10.1109/CIS.2007.145","DOIUrl":"https://doi.org/10.1109/CIS.2007.145","url":null,"abstract":"In today's large complex organizational network, security is a challenging task for most of the administrators. The typical means by which an attacker breaks into a network is through a series of exploits, where each exploit in the series satisfies the pre-condition for subsequent exploits and makes a causal relationship among them. Such a series of exploits constitutes an attack path and the set of all possible attack paths form an attack graph. Present day vulnerability scanners are able to identify the vulnerabilities in isolation but there is a need for correlation among these vulnerabilities to identify overall risk of the network. In this paper we propose a novel approach by finding out an attack path consisting of logically connected exploits and extends it to an attack graph. The solution also finds out the set of root cause vulnerabilities for overall security threat while taking care the inherent time and scalability problem of attack graph generation.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125279517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Level Set Method for License Plate Localization Technology 车牌定位技术的水平集方法
Yuwang Yang, Jun Tao, Jing-Yu Yang
Level set method is being applied actively in image field due to its mathematical perfection and maturity. In this paper, based on Mumford-Shah model with Level Set method, the finite difference and third order TVD (total variation diminishing) Runge-Kutta schemes are employed for space and time discretization respectively to solve the model equation. The computation of license plate localization shows that better edge detection results from level set method are obtained compared to those from other edge detection methods such as Roberts, Sobel and Canny. This study result is very valuable to edge detection, object localization and tracing. Keywords: level set method; license plate recognition; object localization
水平集方法以其数学上的完善和成熟,在图像领域得到了积极的应用。本文基于水平集方法的Mumford-Shah模型,分别采用有限差分和三阶TVD(全变差递减)龙格-库塔格式进行空间和时间离散化求解模型方程。车牌定位的计算表明,与Roberts、Sobel和Canny等边缘检测方法相比,水平集方法的边缘检测效果更好。研究结果对边缘检测、目标定位和跟踪具有重要的指导意义。关键词:水平集法;车牌识别;对象定位
{"title":"Level Set Method for License Plate Localization Technology","authors":"Yuwang Yang, Jun Tao, Jing-Yu Yang","doi":"10.1109/CIS.2007.65","DOIUrl":"https://doi.org/10.1109/CIS.2007.65","url":null,"abstract":"Level set method is being applied actively in image field due to its mathematical perfection and maturity. In this paper, based on Mumford-Shah model with Level Set method, the finite difference and third order TVD (total variation diminishing) Runge-Kutta schemes are employed for space and time discretization respectively to solve the model equation. The computation of license plate localization shows that better edge detection results from level set method are obtained compared to those from other edge detection methods such as Roberts, Sobel and Canny. This study result is very valuable to edge detection, object localization and tracing. Keywords: level set method; license plate recognition; object localization","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125371966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2007 International Conference on Computational Intelligence and Security (CIS 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1