A Personalized search system aims to provide tailor-made results for each user's query according to his preferences. Building such a system depends mainly on creating profiles that represent real user interests. In this paper, we present a method for modeling users and creating accurate profiles by implicitly tracking and collecting user-browsing data. Furthermore, we examine techniques to enhance profile accuracy through combining multiple browsing data sources, distinguishing important concepts from irrelevant ones in a user profile, and the concept levels required from a reference ontology to describe user's interests.
{"title":"An improved modeling method for profile-based personalized search","authors":"Anas El-Ansari, A. B. Hssane, M. Saadi","doi":"10.1145/3386723.3387874","DOIUrl":"https://doi.org/10.1145/3386723.3387874","url":null,"abstract":"A Personalized search system aims to provide tailor-made results for each user's query according to his preferences. Building such a system depends mainly on creating profiles that represent real user interests. In this paper, we present a method for modeling users and creating accurate profiles by implicitly tracking and collecting user-browsing data. Furthermore, we examine techniques to enhance profile accuracy through combining multiple browsing data sources, distinguishing important concepts from irrelevant ones in a user profile, and the concept levels required from a reference ontology to describe user's interests.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123847045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Credit risk is one of the main risks facing banks and credit institutions, with the current progress in machine learning, artificial intelligence and big data. Recent research has proposed several systems for improving credit rating. In this paper, a new scalable credit scoring multi-agent system called "CSMAS" is introduced for the prediction of problems in data mining of credit scoring domain. This engine is built using a seven-layer multi-agent system architecture to generate a data mining process based on the coordination of intelligent agents. CSMAS performance is based on preprocessing and data forecasting. The first layer is designed to retrieve any data from various core banking systems, payment systems, credit Bureaus and external databases and data sources and to store it in big data platform. The second layer is devoted to three different subtasks; feature engineering, pre-processing data and integrating diverse datasets. While the third layer is dedicated to dealing with missing Values and treating outliers. In the fourth layer, the techniques of dimensionality reduction are used to reduce the number of features in the original set of features. The fifth layer is dedicated to build a model using the new generation of Gradient Boosting Algorithms (XGBoost, LightGBM and CatBoost) and make predictions. The sixth layer is designed for the model's evaluation. The seventh layer is made to perform the rating of new credit applicants. The performance of CSMAS is assessed using a large dataset of Home Credit Default Risk from Kaggle Challenge (307511 records) to evaluate the risk of a loan applicant as a major problem for banks. The results show that the CSMAS give relevant results. Therefore, the results indicated that the CSMAS can be further employed as a reliable tool to predict more complicated case in credit scoring.
{"title":"CSMAS","authors":"Youssef Tounsi, H. Anoun, L. Hassouni","doi":"10.1145/3386723.3387851","DOIUrl":"https://doi.org/10.1145/3386723.3387851","url":null,"abstract":"Credit risk is one of the main risks facing banks and credit institutions, with the current progress in machine learning, artificial intelligence and big data. Recent research has proposed several systems for improving credit rating. In this paper, a new scalable credit scoring multi-agent system called \"CSMAS\" is introduced for the prediction of problems in data mining of credit scoring domain. This engine is built using a seven-layer multi-agent system architecture to generate a data mining process based on the coordination of intelligent agents. CSMAS performance is based on preprocessing and data forecasting. The first layer is designed to retrieve any data from various core banking systems, payment systems, credit Bureaus and external databases and data sources and to store it in big data platform. The second layer is devoted to three different subtasks; feature engineering, pre-processing data and integrating diverse datasets. While the third layer is dedicated to dealing with missing Values and treating outliers. In the fourth layer, the techniques of dimensionality reduction are used to reduce the number of features in the original set of features. The fifth layer is dedicated to build a model using the new generation of Gradient Boosting Algorithms (XGBoost, LightGBM and CatBoost) and make predictions. The sixth layer is designed for the model's evaluation. The seventh layer is made to perform the rating of new credit applicants. The performance of CSMAS is assessed using a large dataset of Home Credit Default Risk from Kaggle Challenge (307511 records) to evaluate the risk of a loan applicant as a major problem for banks. The results show that the CSMAS give relevant results. Therefore, the results indicated that the CSMAS can be further employed as a reliable tool to predict more complicated case in credit scoring.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123874488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nowadays Information technologies have caused irreversible changes in many parts of our society. This development reached its climax with the advent of 'Big Data', whose economic and social benefits should not be neglected. However, 'Big Data' inherently threatens security as well as the founding pillars of personal data law, and for this reason many techniques are invented in parallel with the development of big data. in this article we will present what Big Data is, the challenges it faces in terms of privacy and security, as well as privacy and security techniques for Big Data at the level of anonymization encryption and Differential Privacy, by describing, analyzing, and comparing these methods
{"title":"Big Data security and privacy techniques","authors":"Lamia El Haourani, A. A. E. Kalam, A. A. Ouahman","doi":"10.1145/3386723.3387841","DOIUrl":"https://doi.org/10.1145/3386723.3387841","url":null,"abstract":"Nowadays Information technologies have caused irreversible changes in many parts of our society. This development reached its climax with the advent of 'Big Data', whose economic and social benefits should not be neglected. However, 'Big Data' inherently threatens security as well as the founding pillars of personal data law, and for this reason many techniques are invented in parallel with the development of big data. in this article we will present what Big Data is, the challenges it faces in terms of privacy and security, as well as privacy and security techniques for Big Data at the level of anonymization encryption and Differential Privacy, by describing, analyzing, and comparing these methods","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"98 13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128001537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Ikuesan, S. Ganiyu, Muhammad Umar Majigi, Y. D. Opaluwa, H. Venter
The growing surge in urban-crime rate represents a global complex endemic that is beyond the immediate capability of the policing apparatus of nations. This trend is particularly prevalent in urban cities in developing nations, where crime-rate exhibits dynamic tendencies in contrast to the static policing apparatus being deployed. Thus, the policing apparatus in urban cities in developing nations often play catchups with crime; a phenomenon that further elicits crime complexity. As a way to ameliorate this societal menace, this study evaluates probable practical approaches that can be integrated into the modern policing modality in developing nations. The approach considers the development of a dynamic surveillance management system that considers the contextual peculiarity of developing nations. Through the use of a self-administered measurement instrument from Police respondents in developing nations, the implementation feasibility and the probable effectiveness of the proposition will be further evaluated. From the preliminary result from sampled Police officers, this practical approach could present a complementary paradigm that can leverage modern technology towards an effective urban-policing mechanism. Furthermore, this approach presents modalities for the maximization of the human capacity of the Policing service, as well as the management of policing response-rate in developing nations.
{"title":"Practical Approach to Urban Crime Prevention in Developing Nations","authors":"R. Ikuesan, S. Ganiyu, Muhammad Umar Majigi, Y. D. Opaluwa, H. Venter","doi":"10.1145/3386723.3387867","DOIUrl":"https://doi.org/10.1145/3386723.3387867","url":null,"abstract":"The growing surge in urban-crime rate represents a global complex endemic that is beyond the immediate capability of the policing apparatus of nations. This trend is particularly prevalent in urban cities in developing nations, where crime-rate exhibits dynamic tendencies in contrast to the static policing apparatus being deployed. Thus, the policing apparatus in urban cities in developing nations often play catchups with crime; a phenomenon that further elicits crime complexity. As a way to ameliorate this societal menace, this study evaluates probable practical approaches that can be integrated into the modern policing modality in developing nations. The approach considers the development of a dynamic surveillance management system that considers the contextual peculiarity of developing nations. Through the use of a self-administered measurement instrument from Police respondents in developing nations, the implementation feasibility and the probable effectiveness of the proposition will be further evaluated. From the preliminary result from sampled Police officers, this practical approach could present a complementary paradigm that can leverage modern technology towards an effective urban-policing mechanism. Furthermore, this approach presents modalities for the maximization of the human capacity of the Policing service, as well as the management of policing response-rate in developing nations.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117196126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the last few years, Mobile Cloud Computing has become an emerging area of research due to the important developments in mobile networks and Cloud Computing. Computing power and data storage are being moved away from mobile devices to be performed on Cloud servers in order to overcome mobile devices' limitations. In spite of this development, it still faces many challenges namely low bandwidth, energy consumption, and especially security threat. Furthermore, the nature of mobile devices and their operating systems make Mobile Cloud systems more susceptible to malicious attacks and the distributed storage in the Cloud may cause privacy issues. Security and privacy are being then arguably challenged facing its embracement. This paper overviews the Mobile Cloud Computing environment and systems. We focus on the main security issues related to the mobile device, networks and Cloud Computing.
{"title":"Mobile Cloud Computing: Architecture, Advantages and Security Issues","authors":"Hadjer Fellah, Chaker Mezioud, M. Batouche","doi":"10.1145/3386723.3387880","DOIUrl":"https://doi.org/10.1145/3386723.3387880","url":null,"abstract":"In the last few years, Mobile Cloud Computing has become an emerging area of research due to the important developments in mobile networks and Cloud Computing. Computing power and data storage are being moved away from mobile devices to be performed on Cloud servers in order to overcome mobile devices' limitations. In spite of this development, it still faces many challenges namely low bandwidth, energy consumption, and especially security threat. Furthermore, the nature of mobile devices and their operating systems make Mobile Cloud systems more susceptible to malicious attacks and the distributed storage in the Cloud may cause privacy issues. Security and privacy are being then arguably challenged facing its embracement. This paper overviews the Mobile Cloud Computing environment and systems. We focus on the main security issues related to the mobile device, networks and Cloud Computing.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121354088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper review and align IT Security (ITS) and IT Governance (ITG) that would address ITS strategic and its operational issues. These issues if not addressed accordingly, would lead to a financial aftermath that would put the business at risk and jeopardize the organization's sustainability in both short and long run. There have been studies that show, the lack of technical controls, lack of solid governance and improper oversight at the enterprise stakeholders' level would result to disastrous events. Thus, ITS and ITG has to go hand in hand in order to fortify the security posture of an enterprise. The goal is to roll out an ITS program that would have the best of ITG and ITS best practices. Rather than reinventing the wheel, the affected managers or organizations can adopt and adapt the existing frameworks available easily. There are a few common frameworks available, however there is lack of essential elements especially on ITS management and technical controls. This paper will look into these common ITS frameworks and lists its shortcomings to further understand the need for a better framework. In addition, frameworks that govern ITG will also be studied looking at its advantages and disadvantages. Thus, elements from ITS frameworks will be identified, analyzed and certain aspects extracted as common themes. The analysis shows, the themes depicted are strong management support, fit for purpose context that suits the organization, essential risk management, clearly defined of roles and responsibilities, the importance of training and awareness and the implementation of a quick win strategy. These five themes will be put into ITG practice blocks with respect to the Structure, Process and Relational Mechanisms that spans across People, Process and Technology domains. Finally, the construct named NORLI is proposed to align both ITG and ITS. In the future, NORLI will be tested for its ease of use, effectiveness and efficiency.
{"title":"IT Security and IT Governance Alignment: A Review","authors":"Norli Shariffuddin, A. Mohamed","doi":"10.1145/3386723.3387843","DOIUrl":"https://doi.org/10.1145/3386723.3387843","url":null,"abstract":"This paper review and align IT Security (ITS) and IT Governance (ITG) that would address ITS strategic and its operational issues. These issues if not addressed accordingly, would lead to a financial aftermath that would put the business at risk and jeopardize the organization's sustainability in both short and long run. There have been studies that show, the lack of technical controls, lack of solid governance and improper oversight at the enterprise stakeholders' level would result to disastrous events. Thus, ITS and ITG has to go hand in hand in order to fortify the security posture of an enterprise. The goal is to roll out an ITS program that would have the best of ITG and ITS best practices. Rather than reinventing the wheel, the affected managers or organizations can adopt and adapt the existing frameworks available easily. There are a few common frameworks available, however there is lack of essential elements especially on ITS management and technical controls. This paper will look into these common ITS frameworks and lists its shortcomings to further understand the need for a better framework. In addition, frameworks that govern ITG will also be studied looking at its advantages and disadvantages. Thus, elements from ITS frameworks will be identified, analyzed and certain aspects extracted as common themes. The analysis shows, the themes depicted are strong management support, fit for purpose context that suits the organization, essential risk management, clearly defined of roles and responsibilities, the importance of training and awareness and the implementation of a quick win strategy. These five themes will be put into ITG practice blocks with respect to the Structure, Process and Relational Mechanisms that spans across People, Process and Technology domains. Finally, the construct named NORLI is proposed to align both ITG and ITS. In the future, NORLI will be tested for its ease of use, effectiveness and efficiency.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122823141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years the cybersecurity has evolved significantly in order to cater to the changes that occur within the cyberspace. Cybersecurity is the means by which a country or organization can utilize to protect its products and information that operate within the cyberspace. With this research study, the aim was to identify challenges to cybersecurity in aspects of governance, risk management, culture and awareness as well as emerging threats. Through analysis of 33 research articles we have defined the critical components of cybersecurity and the significance of challenges and emerging threats. We have also extracted some key factors that represent the state of cybersecurity in order to convey its necessity. From the analyzed data we have identified some key challenges that is critical to cybersecurity and classified the significance of emerging threats. Furthermore, the order of relevance has been detailed based on the perception of significance. The study yields the necessity for a more comprehensive approach to ensure cybersecurity, the challenges and emerging threats that we need to be aware of and how societal perception plays a part in ensuring cybersecurity.
{"title":"A Review on Cybersecurity: Challenges & Emerging Threats","authors":"A. Hussain, A. Mohamed, Suriyati Razali","doi":"10.1145/3386723.3387847","DOIUrl":"https://doi.org/10.1145/3386723.3387847","url":null,"abstract":"In recent years the cybersecurity has evolved significantly in order to cater to the changes that occur within the cyberspace. Cybersecurity is the means by which a country or organization can utilize to protect its products and information that operate within the cyberspace. With this research study, the aim was to identify challenges to cybersecurity in aspects of governance, risk management, culture and awareness as well as emerging threats. Through analysis of 33 research articles we have defined the critical components of cybersecurity and the significance of challenges and emerging threats. We have also extracted some key factors that represent the state of cybersecurity in order to convey its necessity. From the analyzed data we have identified some key challenges that is critical to cybersecurity and classified the significance of emerging threats. Furthermore, the order of relevance has been detailed based on the perception of significance. The study yields the necessity for a more comprehensive approach to ensure cybersecurity, the challenges and emerging threats that we need to be aware of and how societal perception plays a part in ensuring cybersecurity.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115421335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MOOCs are currently facing a major problem, namely the decrease in the rate of certified at the end of a MOOC. The main cause of this problem is due to the difficulty of detecting user behaviors in the platform which does not help tutors in their follow-up and their educational supervision of learners as well as to interact easily with them. In this work, to solve this problem we will propose an information system capable of automatically analyzing and detecting the behavior of users who follow a distance training and subsequently, to classify their profiles according to predefined parameters to facilitate teachers choose courses and activities based on the behavior of each user.
{"title":"Towards a new approach to reduce the dropout rate in e-learning","authors":"Ilham Dhaiouir, M. Ezziyyani, Mohamed Khaldi","doi":"10.1145/3386723.3387846","DOIUrl":"https://doi.org/10.1145/3386723.3387846","url":null,"abstract":"MOOCs are currently facing a major problem, namely the decrease in the rate of certified at the end of a MOOC. The main cause of this problem is due to the difficulty of detecting user behaviors in the platform which does not help tutors in their follow-up and their educational supervision of learners as well as to interact easily with them. In this work, to solve this problem we will propose an information system capable of automatically analyzing and detecting the behavior of users who follow a distance training and subsequently, to classify their profiles according to predefined parameters to facilitate teachers choose courses and activities based on the behavior of each user.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124282837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Competency-based learning assessment has recently undergone an important development in the field of education. Its objective lies on offering learners the necessary skills to follow the enormous development of their environment, and to acquire the essentials capacities for various forms of interaction. This type of assessment is characterized by a diagnosis, remediation and improvement of the learners' skills without being limited to the assessment of knowledge. In this work, we propose an evaluation approach which is based on skills assessment strategy with interesting precision. Thus, the intelligent system detects the degree of learning skills C1 (Appropriate), C2 (Analyze and Reason), C3 (Realize), C4 (Validate) and C5 (communicate). In fact, the system used detects the level of the class in the different skills mentioned above, and offers educational situations to remedy the shortcomings that are encountered. Likewise, it offers the necessary support for each student by offering pedagogical situations whose objective is to increase the level of each learner skills (individualized assessment). The system also helps the teacher to make decisions to provide adequate supports. This device allows complete training for students, and it contributes to the development of a balanced (harmonized) personality in learning skills. This artificial intelligence that is involved allows performance while permanently monitoring each student. In fact, it allows a judicious evaluation which follows the enormous progress by adopting an automated method which takes into account the competence level of each pupil.
{"title":"Artificial Intelligence in Learning Skills Assessment: A Pedagogical Innovation","authors":"Okacha Diyer, N. Achtaich, Khalid Najib","doi":"10.1145/3386723.3387901","DOIUrl":"https://doi.org/10.1145/3386723.3387901","url":null,"abstract":"Competency-based learning assessment has recently undergone an important development in the field of education. Its objective lies on offering learners the necessary skills to follow the enormous development of their environment, and to acquire the essentials capacities for various forms of interaction. This type of assessment is characterized by a diagnosis, remediation and improvement of the learners' skills without being limited to the assessment of knowledge. In this work, we propose an evaluation approach which is based on skills assessment strategy with interesting precision. Thus, the intelligent system detects the degree of learning skills C1 (Appropriate), C2 (Analyze and Reason), C3 (Realize), C4 (Validate) and C5 (communicate). In fact, the system used detects the level of the class in the different skills mentioned above, and offers educational situations to remedy the shortcomings that are encountered. Likewise, it offers the necessary support for each student by offering pedagogical situations whose objective is to increase the level of each learner skills (individualized assessment). The system also helps the teacher to make decisions to provide adequate supports. This device allows complete training for students, and it contributes to the development of a balanced (harmonized) personality in learning skills. This artificial intelligence that is involved allows performance while permanently monitoring each student. In fact, it allows a judicious evaluation which follows the enormous progress by adopting an automated method which takes into account the competence level of each pupil.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117271331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vehicular Ad Hoc Networks (VANET) had incredible potential in improving road security, diminishing mishap rates and making the travel experience valuable for passengers. Like any other network, VANET too has problems and vulnerabilities that threaten its inherent nodes, and by implication, its reliability. In order to solve the security problems involving the VANET network, a lot of studies in machine learning algorithms have been undergone to improve the reliability of VANET by means of detecting intrusions and making prediction, ultimately, they have achieved satisfactory results. Therefore, the establishment of powerful VANET networks is significantly dependent on their security and protection alternatives, which is the subject of the present paper. This article starts with an overview of VANET Networks, then it proceeds to highlighting a variety of attacks that can threaten them. Next, we introduce the major concepts of machine learning before we conclude with the most frequently adopted artificial intelligence algorithms in the VANET networks
{"title":"A comparative study of Machine learning algorithms for VANET networks","authors":"Sara Ftaimi, T. Mazri","doi":"10.1145/3386723.3387829","DOIUrl":"https://doi.org/10.1145/3386723.3387829","url":null,"abstract":"Vehicular Ad Hoc Networks (VANET) had incredible potential in improving road security, diminishing mishap rates and making the travel experience valuable for passengers. Like any other network, VANET too has problems and vulnerabilities that threaten its inherent nodes, and by implication, its reliability. In order to solve the security problems involving the VANET network, a lot of studies in machine learning algorithms have been undergone to improve the reliability of VANET by means of detecting intrusions and making prediction, ultimately, they have achieved satisfactory results. Therefore, the establishment of powerful VANET networks is significantly dependent on their security and protection alternatives, which is the subject of the present paper. This article starts with an overview of VANET Networks, then it proceeds to highlighting a variety of attacks that can threaten them. Next, we introduce the major concepts of machine learning before we conclude with the most frequently adopted artificial intelligence algorithms in the VANET networks","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123282455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}