首页 > 最新文献

2021 International Conference on Computing, Computational Modelling and Applications (ICCMA)最新文献

英文 中文
Cyberattack Ontology: A Knowledge Representation for Cyber Supply Chain Security 网络攻击本体:网络供应链安全的知识表示
Abel Yeboah-Ofori, Umar Mukhtar Ismail, Tymoteusz Swidurski, F. Opoku-Boateng
Cyberattacks on cyber supply chain (CSC) systems and the cascading impacts have brought many challenges and different threat levels with unpredictable consequences. The embedded networks nodes have various loopholes that could be exploited by the threat actors leading to various attacks, risks, and the threat of cascading attacks on the various systems. Key factors such as lack of common ontology vocabulary and semantic interoperability of cyberattack information, inadequate conceptualized ontology learning and hierarchical approach to representing the relationships in the CSC security domain has led to explicit knowledge representation. This paper explores cyberattack ontology learning to describe security concepts, properties and the relationships required to model security goal. Cyberattack ontology provides a semantic mapping between different organizational and vendor security goals has been inherently challenging. The contributions of this paper are threefold. First, we consider CSC security modelling such as goal, actor, attack, TTP, and requirements using semantic rules for logical representation. Secondly, we model a cyberattack ontology for semantic mapping and knowledge representation. Finally, we discuss concepts for threat intelligence and knowledge reuse. The results show that the cyberattack ontology concepts could be used to improve CSC security.
针对网络供应链系统的网络攻击及其连锁影响带来了诸多挑战和不同程度的威胁,其后果难以预测。嵌入式网络节点具有各种漏洞,威胁参与者可以利用这些漏洞,导致各种攻击、风险和对各种系统的级联攻击的威胁。缺乏共同的本体词汇和网络攻击信息的语义互操作性、概念化本体学习的不足以及在CSC安全领域中表示关系的分层方法等关键因素导致了显式知识表示。本文探讨了网络攻击本体学习,以描述安全概念、属性和建模安全目标所需的关系。网络攻击本体提供了不同组织和供应商安全目标之间的语义映射,这本身就具有挑战性。本文的贡献有三个方面。首先,我们考虑CSC安全建模,如目标、参与者、攻击、http和使用语义规则进行逻辑表示的需求。其次,建立了网络攻击本体的语义映射和知识表示模型。最后,讨论了威胁情报和知识重用的概念。结果表明,网络攻击本体概念可用于提高CSC的安全性。
{"title":"Cyberattack Ontology: A Knowledge Representation for Cyber Supply Chain Security","authors":"Abel Yeboah-Ofori, Umar Mukhtar Ismail, Tymoteusz Swidurski, F. Opoku-Boateng","doi":"10.1109/ICCMA53594.2021.00019","DOIUrl":"https://doi.org/10.1109/ICCMA53594.2021.00019","url":null,"abstract":"Cyberattacks on cyber supply chain (CSC) systems and the cascading impacts have brought many challenges and different threat levels with unpredictable consequences. The embedded networks nodes have various loopholes that could be exploited by the threat actors leading to various attacks, risks, and the threat of cascading attacks on the various systems. Key factors such as lack of common ontology vocabulary and semantic interoperability of cyberattack information, inadequate conceptualized ontology learning and hierarchical approach to representing the relationships in the CSC security domain has led to explicit knowledge representation. This paper explores cyberattack ontology learning to describe security concepts, properties and the relationships required to model security goal. Cyberattack ontology provides a semantic mapping between different organizational and vendor security goals has been inherently challenging. The contributions of this paper are threefold. First, we consider CSC security modelling such as goal, actor, attack, TTP, and requirements using semantic rules for logical representation. Secondly, we model a cyberattack ontology for semantic mapping and knowledge representation. Finally, we discuss concepts for threat intelligence and knowledge reuse. The results show that the cyberattack ontology concepts could be used to improve CSC security.","PeriodicalId":131082,"journal":{"name":"2021 International Conference on Computing, Computational Modelling and Applications (ICCMA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132995870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Emergent Design Approach to test the Quality of the Software System 一个测试软件系统质量的紧急设计方法
Hajarisena Razafimahatratra, Mihaela Ilie, Andrianjaka Miary Rapatsalahy, Thomas Mahatody, S. Ilie, N. Razafindrakoto
The organizations involved in software production have an interest in ensuring that the software developed conforms to a practice accepted by industry, namely compliance with standards, excellent quality control, efficiency and timeliness. Therefore, emergent design is an appropriate solution for acquiring higher quality software at low cost but meeting the production deadline. Indeed, it aims to reduce technical debt, accidental complexity as well as hyper-genericity contained in a software development process. In this article, we propose an approach supporting the modeling of emergent design, which is a way to make it easy for a designer to test the design quality of an object-oriented system. Our strategy is to define the necessary steps for the realization of emergent design within the software development process. Therefore, emergent design elements that make up our model are redundancy, readability, testability, cohesion, coupling and refactoring. As a case study, we instantiate in the proposed model a UML class diagram to test its design quality in order to improve the diagram if necessary. In order to validate our approach, we evaluated the performance of the UML class diagram obtained after the realization of emergent design proposed in this paper using the CM-Builder’s technique. The result of the performance evaluation with a high score of 93.61% concerning the accuracy of the proposed approach allows us to deduce that the method presented in this paper is essential for software designers in order to achieve a modular and easy to maintain system.
参与软件生产的组织有兴趣确保开发的软件符合行业所接受的实践,即符合标准、优秀的质量控制、效率和及时性。因此,紧急设计是一种以低成本获得高质量软件但满足生产期限的合适解决方案。实际上,它旨在减少软件开发过程中包含的技术债务、意外复杂性和超泛型。在本文中,我们提出了一种支持紧急设计建模的方法,这种方法使设计人员能够轻松地测试面向对象系统的设计质量。我们的策略是定义在软件开发过程中实现紧急设计的必要步骤。因此,组成我们模型的紧急设计元素是冗余、可读性、可测试性、内聚性、耦合性和重构性。作为一个案例研究,我们在提议的模型中实例化一个UML类图来测试它的设计质量,以便在必要时改进图。为了验证我们的方法,我们使用CM-Builder技术对本文提出的紧急设计实现后获得的UML类图的性能进行了评估。该方法的准确性获得了93.61%的高分,这使得我们可以推断,为了实现模块化和易于维护的系统,本文提出的方法对于软件设计师来说是必不可少的。
{"title":"An Emergent Design Approach to test the Quality of the Software System","authors":"Hajarisena Razafimahatratra, Mihaela Ilie, Andrianjaka Miary Rapatsalahy, Thomas Mahatody, S. Ilie, N. Razafindrakoto","doi":"10.1109/ICCMA53594.2021.00016","DOIUrl":"https://doi.org/10.1109/ICCMA53594.2021.00016","url":null,"abstract":"The organizations involved in software production have an interest in ensuring that the software developed conforms to a practice accepted by industry, namely compliance with standards, excellent quality control, efficiency and timeliness. Therefore, emergent design is an appropriate solution for acquiring higher quality software at low cost but meeting the production deadline. Indeed, it aims to reduce technical debt, accidental complexity as well as hyper-genericity contained in a software development process. In this article, we propose an approach supporting the modeling of emergent design, which is a way to make it easy for a designer to test the design quality of an object-oriented system. Our strategy is to define the necessary steps for the realization of emergent design within the software development process. Therefore, emergent design elements that make up our model are redundancy, readability, testability, cohesion, coupling and refactoring. As a case study, we instantiate in the proposed model a UML class diagram to test its design quality in order to improve the diagram if necessary. In order to validate our approach, we evaluated the performance of the UML class diagram obtained after the realization of emergent design proposed in this paper using the CM-Builder’s technique. The result of the performance evaluation with a high score of 93.61% concerning the accuracy of the proposed approach allows us to deduce that the method presented in this paper is essential for software designers in order to achieve a modular and easy to maintain system.","PeriodicalId":131082,"journal":{"name":"2021 International Conference on Computing, Computational Modelling and Applications (ICCMA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126459486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Collocated Base Transceiver Stations And Associated Risks in Erecting Base Stations 基站收发台配置及架设风险分析
Owusu Agyeman Antwi, Albert Osei Owusu, Joseph Wumboranaan Nanjo, Gabriel Blanton Gidisu, Dennis Sackey, Haruna Mohammed
This paper deals with the study of collocation base station and the risk associated in mounting and erecting base stations (towers). The deployment and positioning of the base stations in the same geographic area (collocation zone) has been a prime concern resulting in interference and high radiation exposure. To reduce cost and the risk of erecting this tower. The research aims at analyzing the collocated base transceiver and carefully exploring the dangers in erecting the base stations. Data were collected on Collocated base transceiver station by different operators in Korley klotte on a particular site as collocated base station, the location of each base transceiver station was captured in the study area using the Ghana Post GPS mobile application. However, this data collected were analyzed using Microsoft excel and Statistical Package for Social Scientist’s (SPSS). The findings of the study showed that the radiofrequency power density exposure hazard index in Korley Klotte was observed to be within the allowable 4.5w/m2 and 9w/m2 with corresponding frequencies of 10KHz and 30GHz exposure limit to the public as recommended by International Commission on Non-Ionizing Radiation Protection (ICNIRP).
本文研究了基站的配置问题,以及基站(塔)架设过程中的风险问题。在同一地理区域(并置区)部署和定位基站一直是造成干扰和高辐射暴露的主要问题。为了降低建塔的成本和风险。本研究的目的是分析基站收发机的配置,仔细探讨基站架设的危险。数据由Korley klotte的不同运营商在一个特定站点上的并置基站收集,每个基站的位置都是使用加纳邮政GPS移动应用程序在研究区域内捕获的。然而,这些收集的数据是用微软excel和社会科学家统计软件包(SPSS)进行分析的。研究结果表明,Korley Klotte的射频功率密度暴露危害指数在国际非电离辐射防护委员会(ICNIRP)建议的10KHz和30GHz频率下允许的4.5w/m2和9w/m2范围内。
{"title":"Analysis of Collocated Base Transceiver Stations And Associated Risks in Erecting Base Stations","authors":"Owusu Agyeman Antwi, Albert Osei Owusu, Joseph Wumboranaan Nanjo, Gabriel Blanton Gidisu, Dennis Sackey, Haruna Mohammed","doi":"10.1109/ICCMA53594.2021.00023","DOIUrl":"https://doi.org/10.1109/ICCMA53594.2021.00023","url":null,"abstract":"This paper deals with the study of collocation base station and the risk associated in mounting and erecting base stations (towers). The deployment and positioning of the base stations in the same geographic area (collocation zone) has been a prime concern resulting in interference and high radiation exposure. To reduce cost and the risk of erecting this tower. The research aims at analyzing the collocated base transceiver and carefully exploring the dangers in erecting the base stations. Data were collected on Collocated base transceiver station by different operators in Korley klotte on a particular site as collocated base station, the location of each base transceiver station was captured in the study area using the Ghana Post GPS mobile application. However, this data collected were analyzed using Microsoft excel and Statistical Package for Social Scientist’s (SPSS). The findings of the study showed that the radiofrequency power density exposure hazard index in Korley Klotte was observed to be within the allowable 4.5w/m2 and 9w/m2 with corresponding frequencies of 10KHz and 30GHz exposure limit to the public as recommended by International Commission on Non-Ionizing Radiation Protection (ICNIRP).","PeriodicalId":131082,"journal":{"name":"2021 International Conference on Computing, Computational Modelling and Applications (ICCMA)","volume":"824 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123291139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DDoS and Flash Event Detection in Higher Bandwidth SDN-IoT using Multiagent Reinforcement Learning 基于多智能体强化学习的高带宽SDN-IoT DDoS和Flash事件检测
D. K. Dake, J. Gadze, G. S. Klogo
The emergence of 5G, IoT, Big Data, and related technologies have necessitated a shift to SDN architectural design and DRL algorithms for network task automation. Without prompt intelligent detection, the volumetric UDP flooding attack from zombies in an SDN-IoT network tends to consume network resources and mix with flash crowd events from legitimate hosts. This paper proposes a multiagent reinforcement learning framework in SDN-IoT to detect and mitigate DDoS attacks and route flash crowd events in the network effectively without compromising benign traffic. We simulated a 200 nodes topology with higher bandwidth and transmission rate in Mininet and implemented a multiagent deep deterministic policy gradient (MADDPG) algorithm for the framework. From the simulation results, the proposed approach outperforms Deep Deterministic Policy Gradient (DDPG) algorithm for the following network metrics: delay; jitter; packet loss; intrusion detection; and bandwidth utilization of network flows
5G、物联网、大数据等相关技术的出现,使得网络任务自动化必须转向SDN架构设计和DRL算法。如果没有及时的智能检测,SDN-IoT网络中僵尸的海量UDP洪水攻击往往会消耗网络资源,并与合法主机的flash人群事件混合在一起。本文提出了一种SDN-IoT中的多智能体强化学习框架,以有效地检测和缓解DDoS攻击,并在不影响良性流量的情况下有效地路由网络中的flash人群事件。我们在Mininet中模拟了具有更高带宽和传输速率的200节点拓扑结构,并为该框架实现了多智能体深度确定性策略梯度(madpg)算法。从仿真结果来看,该方法在以下网络指标上优于深度确定性策略梯度(DDPG)算法:延迟;抖动;包丢失;入侵检测;以及网络流量的带宽利用率
{"title":"DDoS and Flash Event Detection in Higher Bandwidth SDN-IoT using Multiagent Reinforcement Learning","authors":"D. K. Dake, J. Gadze, G. S. Klogo","doi":"10.1109/ICCMA53594.2021.00011","DOIUrl":"https://doi.org/10.1109/ICCMA53594.2021.00011","url":null,"abstract":"The emergence of 5G, IoT, Big Data, and related technologies have necessitated a shift to SDN architectural design and DRL algorithms for network task automation. Without prompt intelligent detection, the volumetric UDP flooding attack from zombies in an SDN-IoT network tends to consume network resources and mix with flash crowd events from legitimate hosts. This paper proposes a multiagent reinforcement learning framework in SDN-IoT to detect and mitigate DDoS attacks and route flash crowd events in the network effectively without compromising benign traffic. We simulated a 200 nodes topology with higher bandwidth and transmission rate in Mininet and implemented a multiagent deep deterministic policy gradient (MADDPG) algorithm for the framework. From the simulation results, the proposed approach outperforms Deep Deterministic Policy Gradient (DDPG) algorithm for the following network metrics: delay; jitter; packet loss; intrusion detection; and bandwidth utilization of network flows","PeriodicalId":131082,"journal":{"name":"2021 International Conference on Computing, Computational Modelling and Applications (ICCMA)","volume":"125 17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127269732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Assessment of Challenges with Borrowing and Underlying Effects of MSMEs in Kaneshie, Greater Accra Region of Ghana 加纳大阿克拉地区Kaneshie中小微企业借款挑战及潜在影响评估
Emmanuel Kwabla Ocloo, R. Abubakar, G. Kumar
Challenges associated with borrowing have become a worldly topic worth researching. Most especially in sub-Saharan Africa due to the poverty rate which is associated with lack of capital to state businesses. Thus, this study seeks to investigate the issues with borrowing and its underlying effects on Micro Small and Medium Enterprise (MSMEs) in Kaneshie in the Greater Accra Region of Ghana. The entire population targeted for this research was 73 and same were sampled. But, 65 respondents were randomly drawn out of the 73 population for a mixed research approach.Some of the challenges associated with borrowing by MSMEs are collateral requirement, tedious loan procedures and long disbursal periods. Also, the effects established on borrowed funds are high interest rates, tax, inflation as well as the risk association.The research employed descriptive research design since it portrays accurate responses from owners that are targeted and MSMEs’ managers in the targeted population. Structured questionnaires were used to collect primary data through direct interview of entrepreneurs and governing body officials. Both qualitative and quantitative methods of data collection were applied in this study. Also, data collected was analyzed using Statistical Package for Social Sciences (SPSS). The findings of this research would assist MSMEs in selecting the appropriate funding sources. The study would also serve as a learning tool for students as well as a tool for entrepreneurial business development.
与借贷相关的挑战已经成为一个值得研究的世界性话题。尤其是在撒哈拉以南的非洲地区,因为贫困率与国有企业缺乏资本有关。因此,本研究旨在调查借款问题及其对加纳大阿克拉地区Kaneshie中小微企业(MSMEs)的潜在影响。本次研究的目标人群总数为73人,样本相同。但是,为了采用混合研究方法,从73人中随机抽取了65名受访者。与中小微企业借款相关的一些挑战是抵押品要求、繁琐的贷款程序和较长的支付周期。此外,对借入资金的影响是高利率、税收、通货膨胀以及风险关联。该研究采用描述性研究设计,因为它描绘了目标人群中的业主和中小微企业经理的准确反应。通过对企业家和理事机构官员的直接访谈,采用结构化问卷收集原始数据。本研究采用定性与定量相结合的数据收集方法。此外,收集的数据使用社会科学统计软件包(SPSS)进行分析。这项研究的结果将有助于中小微企业选择适当的资金来源。这项研究也将成为学生的学习工具,以及创业企业发展的工具。
{"title":"Assessment of Challenges with Borrowing and Underlying Effects of MSMEs in Kaneshie, Greater Accra Region of Ghana","authors":"Emmanuel Kwabla Ocloo, R. Abubakar, G. Kumar","doi":"10.1109/ICCMA53594.2021.00022","DOIUrl":"https://doi.org/10.1109/ICCMA53594.2021.00022","url":null,"abstract":"Challenges associated with borrowing have become a worldly topic worth researching. Most especially in sub-Saharan Africa due to the poverty rate which is associated with lack of capital to state businesses. Thus, this study seeks to investigate the issues with borrowing and its underlying effects on Micro Small and Medium Enterprise (MSMEs) in Kaneshie in the Greater Accra Region of Ghana. The entire population targeted for this research was 73 and same were sampled. But, 65 respondents were randomly drawn out of the 73 population for a mixed research approach.Some of the challenges associated with borrowing by MSMEs are collateral requirement, tedious loan procedures and long disbursal periods. Also, the effects established on borrowed funds are high interest rates, tax, inflation as well as the risk association.The research employed descriptive research design since it portrays accurate responses from owners that are targeted and MSMEs’ managers in the targeted population. Structured questionnaires were used to collect primary data through direct interview of entrepreneurs and governing body officials. Both qualitative and quantitative methods of data collection were applied in this study. Also, data collected was analyzed using Statistical Package for Social Sciences (SPSS). The findings of this research would assist MSMEs in selecting the appropriate funding sources. The study would also serve as a learning tool for students as well as a tool for entrepreneurial business development.","PeriodicalId":131082,"journal":{"name":"2021 International Conference on Computing, Computational Modelling and Applications (ICCMA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123635805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Lane Change Prediction based on Trajectory Analysis and Driver Actions Tracking 基于轨迹分析和驾驶员动作跟踪的变道预测
A. Dixit, Shreya Oak, Shaney Mantri, Anant V. Nimkar, Meghana Naik
With the ever burgeoning traffic and increasing unwarranted lane changes, safety of commuters and driving practices have been compromised. Most of the accidents that take place are due to unforeseen traffic and road conditions or misjudgement by the drivers. To aid the decision making of drivers to maneuver the vehicle safely, this paper proposes ELaNES, a novel system focusing on the lane changing behaviour of a vehicle. It posits a method to predict the lane change and state the characteristics associated with it. Along with this, a degree of safe lane change is calculated by taking into consideration the neighbouring vehicles’ dynamics and the driver’s intentions. The results obtained are promising, accurate and can help make decisions in the real world scenario, along with giving deep insights into human driving practices.
随着日益增长的交通和越来越多的无理由的车道变化,通勤者的安全和驾驶习惯已经受到损害。发生的大多数事故都是由于无法预见的交通和道路状况或司机的错误判断。为了帮助驾驶员做出安全机动车辆的决策,本文提出了一种关注车辆变道行为的新系统ELaNES。提出了一种预测变道的方法,并描述了与变道相关的特征。与此同时,通过考虑相邻车辆的动态和驾驶员的意图来计算安全变道的程度。获得的结果是有希望的、准确的,可以帮助在现实世界的场景中做出决策,同时对人类驾驶实践提供深刻的见解。
{"title":"Lane Change Prediction based on Trajectory Analysis and Driver Actions Tracking","authors":"A. Dixit, Shreya Oak, Shaney Mantri, Anant V. Nimkar, Meghana Naik","doi":"10.1109/ICCMA53594.2021.00012","DOIUrl":"https://doi.org/10.1109/ICCMA53594.2021.00012","url":null,"abstract":"With the ever burgeoning traffic and increasing unwarranted lane changes, safety of commuters and driving practices have been compromised. Most of the accidents that take place are due to unforeseen traffic and road conditions or misjudgement by the drivers. To aid the decision making of drivers to maneuver the vehicle safely, this paper proposes ELaNES, a novel system focusing on the lane changing behaviour of a vehicle. It posits a method to predict the lane change and state the characteristics associated with it. Along with this, a degree of safe lane change is calculated by taking into consideration the neighbouring vehicles’ dynamics and the driver’s intentions. The results obtained are promising, accurate and can help make decisions in the real world scenario, along with giving deep insights into human driving practices.","PeriodicalId":131082,"journal":{"name":"2021 International Conference on Computing, Computational Modelling and Applications (ICCMA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126620963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crime Predictive Model in Cybercrime based on Social and Economic Factors Using the Bayesian and Markov Theories 基于贝叶斯和马尔可夫理论的社会经济因素的网络犯罪预测模型
Q. Kester, Emeh Jennifer Afoma
If financial institutions cannot detect incidents effectively, it cannot succeed in responding to incidents. This implies that the detection of incidents, is the most important aspect of incident response. A stochastic process with a first order dependence in discrete state and time is described as Markov chain, in the same way, Bayesian theory is a mathematical framework for reasoning and performing inference using probability. These two theories when based on socioeconomic factors can be used to predict cybercrime occurrence in Management Information Systems (MIS). The advancement of technology in banking has made banking business processes very convenient, but as the technology advances, cybercrimes of different nature emerges and equally at its peak. In as much as there are different measures already in place to combat these crimes, there still lies so many vulnerabilities which cannot be evitable in any information systems. Financial institutions need to develop predictive models that can be used to combat this cybercrime activities.In this paper, the application of Markov chain and Bayesian inference was used to analyze the nature of cybercrime and the probability of its occurrence, and the results were used to analyze the possibility of occurrence of cybercrimes based on the factors considered.
如果金融机构不能有效地发现事件,它就不能成功地应对事件。这意味着事件的检测,是事件响应中最重要的方面。一个在离散状态和时间上具有一阶依赖的随机过程被描述为马尔可夫链,同样,贝叶斯理论是一个推理和使用概率进行推理的数学框架。这两种理论基于社会经济因素,可用于预测管理信息系统(MIS)中网络犯罪的发生。银行业技术的进步使银行业务流程变得非常便利,但随着技术的进步,不同性质的网络犯罪层出不穷,并同样达到高峰。尽管已经采取了许多不同的措施来打击这些罪行,但仍然存在许多在任何信息系统中都无法避免的漏洞。金融机构需要开发可用于打击网络犯罪活动的预测模型。本文运用马尔可夫链和贝叶斯推理对网络犯罪的性质及其发生的概率进行分析,并利用分析结果根据所考虑的因素分析网络犯罪发生的可能性。
{"title":"Crime Predictive Model in Cybercrime based on Social and Economic Factors Using the Bayesian and Markov Theories","authors":"Q. Kester, Emeh Jennifer Afoma","doi":"10.1109/ICCMA53594.2021.00034","DOIUrl":"https://doi.org/10.1109/ICCMA53594.2021.00034","url":null,"abstract":"If financial institutions cannot detect incidents effectively, it cannot succeed in responding to incidents. This implies that the detection of incidents, is the most important aspect of incident response. A stochastic process with a first order dependence in discrete state and time is described as Markov chain, in the same way, Bayesian theory is a mathematical framework for reasoning and performing inference using probability. These two theories when based on socioeconomic factors can be used to predict cybercrime occurrence in Management Information Systems (MIS). The advancement of technology in banking has made banking business processes very convenient, but as the technology advances, cybercrimes of different nature emerges and equally at its peak. In as much as there are different measures already in place to combat these crimes, there still lies so many vulnerabilities which cannot be evitable in any information systems. Financial institutions need to develop predictive models that can be used to combat this cybercrime activities.In this paper, the application of Markov chain and Bayesian inference was used to analyze the nature of cybercrime and the probability of its occurrence, and the results were used to analyze the possibility of occurrence of cybercrimes based on the factors considered.","PeriodicalId":131082,"journal":{"name":"2021 International Conference on Computing, Computational Modelling and Applications (ICCMA)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121741760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hyperspace Neighbor Penetration Approach to Dynamic Programming for Model-Based Reinforcement Learning Problems with Slowly Changing Variables in a Continuous State Space 连续状态空间中变量缓慢变化的基于模型的强化学习问题的超空间邻居渗透动态规划方法
Vincent Zha, Ivey Chiu, Alexandre Guilbault, Jaime Tatis
Slowly changing variables in a continuous state space constitute an important category of reinforcement learning and see their applications in many domains, such as modeling a climate control system where temperature, humidity, etc. change slowly over time. However, this subject is less addressed in relevant studies. Classical methods with certain variants, such as Dynamic Programming with Tile Coding which discretizes the state space, fail to handle slowly changing variables because those methods cannot capture the tiny changes in each transition step, as it is computationally expensive or impossible to establish an extremely granular grid system. In this paper, we introduce a Hyperspace Neighbor Penetration (HNP) approach that solves the problem. HNP captures in each transition step the state’s partial “penetration” into its neighboring hyper-tiles in the gridded hyperspace, thus does not require the transition to be inter-tile for the change to be captured. Therefore, HNP allows for a very coarse grid system, which makes the computation feasible. HNP assumes near linearity of the transition function in a local space, which is commonly satisfied. In summary, HNP can be orders of magnitude more efficient than classical method in handling slowly changing variables in reinforcement learning. We have successfully made an industrial implementation of NHP.
连续状态空间中缓慢变化的变量构成了强化学习的一个重要类别,并在许多领域中得到应用,例如对温度、湿度等随时间缓慢变化的气候控制系统进行建模。然而,这一主题在相关研究中较少涉及。具有某些变量的经典方法,如离散状态空间的动态编程(Dynamic Programming with Tile Coding),无法处理缓慢变化的变量,因为这些方法无法捕捉到每个过渡步骤中的微小变化,因为它的计算成本很高,或者不可能建立一个极细粒度的网格系统。在本文中,我们引入了一种超空间邻居渗透(HNP)方法来解决这个问题。HNP在每个转换步骤中捕获状态对网格超空间中相邻超块的部分“渗透”,因此不需要转换是块间的即可捕获更改。因此,HNP允许一个非常粗糙的网格系统,这使得计算可行。HNP假设过渡函数在局部空间近似线性,一般满足这一条件。总之,在处理强化学习中缓慢变化的变量时,HNP可以比经典方法效率高几个数量级。我们已经成功地实现了NHP的工业实施。
{"title":"Hyperspace Neighbor Penetration Approach to Dynamic Programming for Model-Based Reinforcement Learning Problems with Slowly Changing Variables in a Continuous State Space","authors":"Vincent Zha, Ivey Chiu, Alexandre Guilbault, Jaime Tatis","doi":"10.1109/ICCMA53594.2021.00018","DOIUrl":"https://doi.org/10.1109/ICCMA53594.2021.00018","url":null,"abstract":"Slowly changing variables in a continuous state space constitute an important category of reinforcement learning and see their applications in many domains, such as modeling a climate control system where temperature, humidity, etc. change slowly over time. However, this subject is less addressed in relevant studies. Classical methods with certain variants, such as Dynamic Programming with Tile Coding which discretizes the state space, fail to handle slowly changing variables because those methods cannot capture the tiny changes in each transition step, as it is computationally expensive or impossible to establish an extremely granular grid system. In this paper, we introduce a Hyperspace Neighbor Penetration (HNP) approach that solves the problem. HNP captures in each transition step the state’s partial “penetration” into its neighboring hyper-tiles in the gridded hyperspace, thus does not require the transition to be inter-tile for the change to be captured. Therefore, HNP allows for a very coarse grid system, which makes the computation feasible. HNP assumes near linearity of the transition function in a local space, which is commonly satisfied. In summary, HNP can be orders of magnitude more efficient than classical method in handling slowly changing variables in reinforcement learning. We have successfully made an industrial implementation of NHP.","PeriodicalId":131082,"journal":{"name":"2021 International Conference on Computing, Computational Modelling and Applications (ICCMA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126655197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Computing, Computational Modelling and Applications (ICCMA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1