首页 > 最新文献

2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)最新文献

英文 中文
Evaluation of the ARCore Indoor Localization Technology ARCore室内定位技术评价
Pub Date : 2020-12-11 DOI: 10.1109/RoEduNet51892.2020.9324849
A. Morar, Maria Anca Balutoiu, A. Moldoveanu, F. Moldoveanu, Alexandru Butean, V. Asavei
Augmented reality has become a very powerful tool nowadays. With the recent technological advance, smartphones have the ability to display augmented content on the screen. What makes the difference is the naturalness with which the multimedia content is superimposed over the video stream acquired with the phone's camera. This perfect overlay depends on the accurate estimation of the position and orientation of the smartphone's camera relative to the 3D representation of the space. ARCore is an augmented reality framework that computes the position and orientation of the smartphone. In order to assess the possibility of integrating ARCore within a virtual and augmented reality platform, we evaluated the accuracy of the ARCore localization technology, using the HTC Vive system as a reference. We designed an evaluation methodology, along with visualization tools that enable a thorough comparison between these two technologies.
如今,增强现实已经成为一种非常强大的工具。随着最近的技术进步,智能手机有能力在屏幕上显示增强内容。不同之处在于,多媒体内容自然地叠加在手机摄像头获取的视频流上。这种完美的叠加依赖于对智能手机摄像头相对于空间3D表现的位置和方向的准确估计。ARCore是一个增强现实框架,可以计算智能手机的位置和方向。为了评估在虚拟和增强现实平台中集成ARCore的可能性,我们使用HTC Vive系统作为参考,评估了ARCore定位技术的准确性。我们设计了一种评估方法,以及能够在这两种技术之间进行彻底比较的可视化工具。
{"title":"Evaluation of the ARCore Indoor Localization Technology","authors":"A. Morar, Maria Anca Balutoiu, A. Moldoveanu, F. Moldoveanu, Alexandru Butean, V. Asavei","doi":"10.1109/RoEduNet51892.2020.9324849","DOIUrl":"https://doi.org/10.1109/RoEduNet51892.2020.9324849","url":null,"abstract":"Augmented reality has become a very powerful tool nowadays. With the recent technological advance, smartphones have the ability to display augmented content on the screen. What makes the difference is the naturalness with which the multimedia content is superimposed over the video stream acquired with the phone's camera. This perfect overlay depends on the accurate estimation of the position and orientation of the smartphone's camera relative to the 3D representation of the space. ARCore is an augmented reality framework that computes the position and orientation of the smartphone. In order to assess the possibility of integrating ARCore within a virtual and augmented reality platform, we evaluated the accuracy of the ARCore localization technology, using the HTC Vive system as a reference. We designed an evaluation methodology, along with visualization tools that enable a thorough comparison between these two technologies.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"21 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124468291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Multi-Layer Security Framework for IoT Devices 物联网设备的多层安全框架
Pub Date : 2020-12-11 DOI: 10.1109/RoEduNet51892.2020.9324871
Alexandru Vochescu, Ioana Culic, Alexandru Radovici
One of the most engaging domains in the IT technology is represented by the Internet of Things (loT) area. IoT solution are more and more present in our lives: from the daily-use devices such as smart watches or rings, to more peculiar applications such as smart tables or smart home fragrances. As a result of this development, IoT technologies can become intrusive as they have access to a lot of our personal data and are able to control an increasing number of aspects of our lives. As a result, IoT is currently viewed by many individuals and companies from a security issue perspective. Many of the security threats related to the IoT technologies come from the way software and applications are implemented or from the programming frameworks used. What is more, as the applications become increasingly complex and the hardware devices increasingly constrained, many security mechanisms cannot be applied. The purpose of this paper is to present a multi-layer secure framework dedicated to hardware-constrained devices.
物联网(loT)是IT技术中最具吸引力的领域之一。物联网解决方案越来越多地出现在我们的生活中:从日常使用的设备,如智能手表或戒指,到更特殊的应用,如智能桌子或智能家居香水。由于这种发展,物联网技术可能会变得具有侵入性,因为它们可以访问我们的大量个人数据,并能够控制我们生活中越来越多的方面。因此,物联网目前被许多个人和公司从安全问题的角度看待。与物联网技术相关的许多安全威胁来自软件和应用程序的实现方式或所使用的编程框架。此外,随着应用程序的日益复杂和硬件设备的日益受限,许多安全机制无法应用。本文的目的是提出一个专用于硬件受限设备的多层安全框架。
{"title":"Multi-Layer Security Framework for IoT Devices","authors":"Alexandru Vochescu, Ioana Culic, Alexandru Radovici","doi":"10.1109/RoEduNet51892.2020.9324871","DOIUrl":"https://doi.org/10.1109/RoEduNet51892.2020.9324871","url":null,"abstract":"One of the most engaging domains in the IT technology is represented by the Internet of Things (loT) area. IoT solution are more and more present in our lives: from the daily-use devices such as smart watches or rings, to more peculiar applications such as smart tables or smart home fragrances. As a result of this development, IoT technologies can become intrusive as they have access to a lot of our personal data and are able to control an increasing number of aspects of our lives. As a result, IoT is currently viewed by many individuals and companies from a security issue perspective. Many of the security threats related to the IoT technologies come from the way software and applications are implemented or from the programming frameworks used. What is more, as the applications become increasingly complex and the hardware devices increasingly constrained, many security mechanisms cannot be applied. The purpose of this paper is to present a multi-layer secure framework dedicated to hardware-constrained devices.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"31 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114661383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability Remediation in ICS Infrastructure Based on Source Code Analysis 基于源代码分析的ICS基础设施漏洞修复
Pub Date : 2020-12-11 DOI: 10.1109/RoEduNet51892.2020.9324845
Lucian Florin Ilca, T. Balan
The Industrial Control Systems (ICS) and its sub-processes, hardware and software, make possible the management and operation of industrial critical infrastructure and services such as: energy, water, defense, transportation. Nowadays, the biggest vendors on the market started developing for the ICS marketplace new systems with more power, control, stability, but these complex systems are susceptible to different threats such as: insider attack, third-party, technical or physical failure, external attacks. Therefore, is critical to protect ICS assets. Paying attention to the ISA/IEC 62443 standard, this paper is proposing methods for source code analysis using open source tools that can be used in development or testing phase by ICS professionals in order to detect new vulnerabilities and bugs (e.g. weak encryption, code disclosure, clear text passwords) using a vulnerability remediation management tool in order to have a complete view of new and existing security breaches. The purpose of this research paper is providing valuable information to ICS developers to increase security level in the production area with very little effort for the Internet exposed Programmable Logic Controllers (PLC).
工业控制系统(ICS)及其子过程,硬件和软件,使工业关键基础设施和服务的管理和运营成为可能,例如:能源,水,国防,运输。如今,市场上最大的供应商开始为ICS市场开发更强大、更可控、更稳定的新系统,但这些复杂的系统容易受到不同威胁的影响,例如:内部攻击、第三方、技术或物理故障、外部攻击。因此,保护ICS资产至关重要。关注ISA/IEC 62443标准,本文提出了使用开源工具进行源代码分析的方法,ICS专业人员可以在开发或测试阶段使用这些开源工具,以便使用漏洞修复管理工具检测新的漏洞和错误(例如弱加密,代码泄露,明文密码),以便对新的和现有的安全漏洞有一个完整的视图。本研究论文的目的是为ICS开发人员提供有价值的信息,以便为Internet暴露的可编程逻辑控制器(PLC)增加生产领域的安全级别。
{"title":"Vulnerability Remediation in ICS Infrastructure Based on Source Code Analysis","authors":"Lucian Florin Ilca, T. Balan","doi":"10.1109/RoEduNet51892.2020.9324845","DOIUrl":"https://doi.org/10.1109/RoEduNet51892.2020.9324845","url":null,"abstract":"The Industrial Control Systems (ICS) and its sub-processes, hardware and software, make possible the management and operation of industrial critical infrastructure and services such as: energy, water, defense, transportation. Nowadays, the biggest vendors on the market started developing for the ICS marketplace new systems with more power, control, stability, but these complex systems are susceptible to different threats such as: insider attack, third-party, technical or physical failure, external attacks. Therefore, is critical to protect ICS assets. Paying attention to the ISA/IEC 62443 standard, this paper is proposing methods for source code analysis using open source tools that can be used in development or testing phase by ICS professionals in order to detect new vulnerabilities and bugs (e.g. weak encryption, code disclosure, clear text passwords) using a vulnerability remediation management tool in order to have a complete view of new and existing security breaches. The purpose of this research paper is providing valuable information to ICS developers to increase security level in the production area with very little effort for the Internet exposed Programmable Logic Controllers (PLC).","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121065986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web Application Honeypot Published in the Wild Web应用程序蜜罐在野外发布
Pub Date : 2020-12-11 DOI: 10.1109/RoEduNet51892.2020.9324870
Octavian Grigorescu, Cristian Sandescu, Alexandru Caba
The goal of this project is to create an intelligent system that will be installed under a cybernetic infrastructure, with the purpose of detecting cyber-attacks and learning about their methods of scanning and penetrating. For this project, we aim to examine data generated by the attacker's actions and highlight the value of information provided by them. Thus, we create honeypots that hold “Capture the Flag” type of games in the area of web applications. These games have multiple challenges of varying difficulties aiming to keep the attacker busy in order to learn his behavior. We created a web application with multiple vulnerabilities and published the honeypot in the exposed internet for about 2 months. During this period, we discovered a lot of noise produced by the bots and scrappers that tried to find out relevant information from the machine. Besides this, we found 2 attempts of human interaction that succeeded to solve a couple of vulnerabilities and gave up at one point leaving the challenges unfinished.
该项目的目标是创建一个智能系统,该系统将安装在控制论基础设施下,目的是检测网络攻击并了解其扫描和渗透方法。对于这个项目,我们的目标是检查由攻击者的行为产生的数据,并强调他们提供的信息的价值。因此,我们在web应用领域创建了蜜罐来容纳“夺旗”类型的游戏。这些游戏具有不同难度的多重挑战,旨在让攻击者忙于学习自己的行为。我们创建了一个有多个漏洞的web应用程序,并在暴露的互联网上发布了大约2个月的蜜罐。在此期间,我们发现机器人和拾取者试图从机器中找到相关信息时产生了很多噪音。除此之外,我们还发现了2次人类交互的尝试,成功地解决了几个漏洞,并在某一点上放弃了,导致挑战未完成。
{"title":"Web Application Honeypot Published in the Wild","authors":"Octavian Grigorescu, Cristian Sandescu, Alexandru Caba","doi":"10.1109/RoEduNet51892.2020.9324870","DOIUrl":"https://doi.org/10.1109/RoEduNet51892.2020.9324870","url":null,"abstract":"The goal of this project is to create an intelligent system that will be installed under a cybernetic infrastructure, with the purpose of detecting cyber-attacks and learning about their methods of scanning and penetrating. For this project, we aim to examine data generated by the attacker's actions and highlight the value of information provided by them. Thus, we create honeypots that hold “Capture the Flag” type of games in the area of web applications. These games have multiple challenges of varying difficulties aiming to keep the attacker busy in order to learn his behavior. We created a web application with multiple vulnerabilities and published the honeypot in the exposed internet for about 2 months. During this period, we discovered a lot of noise produced by the bots and scrappers that tried to find out relevant information from the machine. Besides this, we found 2 attempts of human interaction that succeeded to solve a couple of vulnerabilities and gave up at one point leaving the challenges unfinished.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114578265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Compute framework aspects for integrated GPUs 集成gpu的计算框架方面
Pub Date : 2020-12-11 DOI: 10.1109/roedunet51892.2020.9324851
Grigore Lupescu, N. Tapus
The integrated GPU is nowadays found in many consumer and industrial System on Chips, and poses unique challenges to program (thermal, power, shared resources etc.). The goal of this work is to identify several key aspects in a compute framework (basic design, execution models, data communication, fault tolerance and latency), which handle the integrated GPU limitations and provide a proper abstraction.
集成的GPU现在被发现在许多消费和工业系统芯片上,并提出了独特的挑战程序(热,电源,共享资源等)。这项工作的目标是确定计算框架中的几个关键方面(基本设计、执行模型、数据通信、容错和延迟),这些方面处理集成GPU的限制并提供适当的抽象。
{"title":"Compute framework aspects for integrated GPUs","authors":"Grigore Lupescu, N. Tapus","doi":"10.1109/roedunet51892.2020.9324851","DOIUrl":"https://doi.org/10.1109/roedunet51892.2020.9324851","url":null,"abstract":"The integrated GPU is nowadays found in many consumer and industrial System on Chips, and poses unique challenges to program (thermal, power, shared resources etc.). The goal of this work is to identify several key aspects in a compute framework (basic design, execution models, data communication, fault tolerance and latency), which handle the integrated GPU limitations and provide a proper abstraction.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128660205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Heterogenous System for Traffic Prediction 交通预测的异构系统
Pub Date : 2020-12-11 DOI: 10.1109/roedunet51892.2020.9324885
Răzvan-Bogdan-Audrei Rădoi, R. Rughinis
Recent developments in the field of Machine Learning have resulted in great progress, both academically and commercially, in various applications. The success of these applications comes from being able to either predict or categorize series or elements that, before, could not be analyzed using classical statistical methods, thus solving complex, real problems that people are facing daily. Traffic is one of the most common issues in urban areas. It causes delays and frustration to both people and businesses, impacting billions across the globe. It is one of the greatest problems of the contemporary world. We propose a heterogeneous, distributed system that is able to provide traffic predictions at scale, with tremendous precision and consistency, using novel learning models and cloud-based system technologies. In a case study on data collected from Puget Sound, Washington, in 2017, we measure the precision of our novel system at an average of below 1 km/h. At the 90th percentile, the model is still able to provide valuable predictions, with an absolute error under 5 km/h.
机器学习领域的最新发展在学术和商业上的各种应用中都取得了巨大的进步。这些应用的成功来自于能够预测或分类以前无法使用经典统计方法分析的系列或元素,从而解决人们每天面临的复杂的实际问题。交通是城市地区最常见的问题之一。它会给个人和企业带来延误和挫折,影响全球数十亿人。这是当今世界最大的问题之一。我们提出了一个异构的分布式系统,该系统能够使用新颖的学习模型和基于云的系统技术,以极高的精度和一致性提供大规模的流量预测。在2017年从华盛顿州普吉特海湾收集的数据的案例研究中,我们以平均低于1公里/小时的速度测量了我们的新系统的精度。在第90个百分位,该模型仍然能够提供有价值的预测,绝对误差低于5公里/小时。
{"title":"A Heterogenous System for Traffic Prediction","authors":"Răzvan-Bogdan-Audrei Rădoi, R. Rughinis","doi":"10.1109/roedunet51892.2020.9324885","DOIUrl":"https://doi.org/10.1109/roedunet51892.2020.9324885","url":null,"abstract":"Recent developments in the field of Machine Learning have resulted in great progress, both academically and commercially, in various applications. The success of these applications comes from being able to either predict or categorize series or elements that, before, could not be analyzed using classical statistical methods, thus solving complex, real problems that people are facing daily. Traffic is one of the most common issues in urban areas. It causes delays and frustration to both people and businesses, impacting billions across the globe. It is one of the greatest problems of the contemporary world. We propose a heterogeneous, distributed system that is able to provide traffic predictions at scale, with tremendous precision and consistency, using novel learning models and cloud-based system technologies. In a case study on data collected from Puget Sound, Washington, in 2017, we measure the precision of our novel system at an average of below 1 km/h. At the 90th percentile, the model is still able to provide valuable predictions, with an absolute error under 5 km/h.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129004645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Autonomous Self-Diagnosis System 自主自诊断系统
Pub Date : 2020-12-11 DOI: 10.1109/RoEduNet51892.2020.9324875
V. Stefanescu, I. Radoi
With the latest technological advancements and the unprecedented number of Internet connected devices, digital health products have become an attractive topic. However, when it comes to self-diagnosis systems, even if the state-of-the-art applications are very popular, their functioning is undisclosed. There is no transparency in terms of dataset, medical contributions and symptom assessment algorithms. Therefore, this paper proposes an open-data, open-source and community-driven data aggregation system that can receive and validate medical contributions from around the world. The resulting dataset enables the development of heuristic-driven self-diagnosis systems that can provide the statistical likelihood of having a particular condition or disease. Our solution for obtaining this dataset aims to promote transparency and trust among these autonomous diagnosis systems. The aggregation pipeline is designed with guidance from medical specialists and the collected dataset will be validated, anonymized and made publicly available. A self-diagnosis system was designed as a proof-of-concept for the open-data platform. A symptom-disease knowledge database was used as dataset and the system was deployed on a cloud-native environment so it can be validated by doctors and users. The idea of having a publicly available and community-driven medical dataset was validated by 27 (93.1%) out of 29 interviewed doctors. The proof-of-concept was assessed as “correct” by 17 (58.6%) specialists out of the same 29 doctors, and as “satisfactory” by 23 (69.7%) users out of a total of 33 interviewed users.
随着最新技术的进步和互联网连接设备的空前数量,数字健康产品已经成为一个吸引人的话题。然而,当涉及到自我诊断系统时,即使最先进的应用程序非常流行,它们的功能也没有公开。在数据集、医疗贡献和症状评估算法方面没有透明度。因此,本文提出了一个开放数据、开源和社区驱动的数据聚合系统,可以接收和验证来自世界各地的医疗贡献。由此产生的数据集能够开发启发式驱动的自我诊断系统,该系统可以提供具有特定条件或疾病的统计可能性。我们获得该数据集的解决方案旨在提高这些自主诊断系统之间的透明度和信任。聚合管道是在医学专家的指导下设计的,收集的数据集将经过验证、匿名化并公开提供。设计了一个自诊断系统,作为开放数据平台的概念验证。使用症状-疾病知识数据库作为数据集,并将系统部署在云原生环境上,以便医生和用户对其进行验证。在29名接受采访的医生中,有27名(93.1%)证实了建立一个公开可用的、社区驱动的医疗数据集的想法。在29名医生中,有17名(58.6%)专家认为概念验证是“正确的”,在33名接受采访的用户中,有23名(69.7%)用户认为“满意”。
{"title":"Autonomous Self-Diagnosis System","authors":"V. Stefanescu, I. Radoi","doi":"10.1109/RoEduNet51892.2020.9324875","DOIUrl":"https://doi.org/10.1109/RoEduNet51892.2020.9324875","url":null,"abstract":"With the latest technological advancements and the unprecedented number of Internet connected devices, digital health products have become an attractive topic. However, when it comes to self-diagnosis systems, even if the state-of-the-art applications are very popular, their functioning is undisclosed. There is no transparency in terms of dataset, medical contributions and symptom assessment algorithms. Therefore, this paper proposes an open-data, open-source and community-driven data aggregation system that can receive and validate medical contributions from around the world. The resulting dataset enables the development of heuristic-driven self-diagnosis systems that can provide the statistical likelihood of having a particular condition or disease. Our solution for obtaining this dataset aims to promote transparency and trust among these autonomous diagnosis systems. The aggregation pipeline is designed with guidance from medical specialists and the collected dataset will be validated, anonymized and made publicly available. A self-diagnosis system was designed as a proof-of-concept for the open-data platform. A symptom-disease knowledge database was used as dataset and the system was deployed on a cloud-native environment so it can be validated by doctors and users. The idea of having a publicly available and community-driven medical dataset was validated by 27 (93.1%) out of 29 interviewed doctors. The proof-of-concept was assessed as “correct” by 17 (58.6%) specialists out of the same 29 doctors, and as “satisfactory” by 23 (69.7%) users out of a total of 33 interviewed users.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122099461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computer Vision Based Framework For Detecting Phishing Webpages 基于计算机视觉的网络钓鱼网页检测框架
Pub Date : 2020-12-11 DOI: 10.1109/roedunet51892.2020.9324850
Ionut Cernica, N. Popescu
One of the most dangerous threats on the internet nowadays is phishing attacks. This type of attack can lead to data breaches, and with it to image and financial loss in a company. The most common technique to exploit this type of attack is by sending emails to the target users to trick them to send their credentials to the attacker servers. If the user clicks on the link from the email, then good detection is needed to protect the user credentials. Many papers presented Computer Vision as a good detection technique, but we will explain why this solution can generate lots of false positives in some important environments. This paper focuses on challenges of the Computer Vision detection technique and proposes a combination of multiple techniques together with Computer Vision technique in order to solve the challenges we have shown. We also will present a methodology to detect phishing attacks that will work with the proposed combination techniques.
当今互联网上最危险的威胁之一是网络钓鱼攻击。这种类型的攻击可能导致数据泄露,并导致公司的形象和财务损失。利用这类攻击的最常见技术是向目标用户发送电子邮件,欺骗他们将凭据发送到攻击者服务器。如果用户单击了来自电子邮件的链接,则需要进行良好的检测以保护用户凭据。许多论文认为计算机视觉是一种很好的检测技术,但我们将解释为什么这种解决方案在一些重要的环境中会产生大量的误报。本文针对计算机视觉检测技术所面临的挑战,提出了将多种技术与计算机视觉技术相结合的方法来解决这些挑战。我们还将介绍一种检测网络钓鱼攻击的方法,该方法将与所提出的组合技术一起工作。
{"title":"Computer Vision Based Framework For Detecting Phishing Webpages","authors":"Ionut Cernica, N. Popescu","doi":"10.1109/roedunet51892.2020.9324850","DOIUrl":"https://doi.org/10.1109/roedunet51892.2020.9324850","url":null,"abstract":"One of the most dangerous threats on the internet nowadays is phishing attacks. This type of attack can lead to data breaches, and with it to image and financial loss in a company. The most common technique to exploit this type of attack is by sending emails to the target users to trick them to send their credentials to the attacker servers. If the user clicks on the link from the email, then good detection is needed to protect the user credentials. Many papers presented Computer Vision as a good detection technique, but we will explain why this solution can generate lots of false positives in some important environments. This paper focuses on challenges of the Computer Vision detection technique and proposes a combination of multiple techniques together with Computer Vision technique in order to solve the challenges we have shown. We also will present a methodology to detect phishing attacks that will work with the proposed combination techniques.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130396078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Suspend feature for multiple devices of same type in bhyve bhyve中多个同类型设备的挂起功能
Pub Date : 2020-12-11 DOI: 10.1109/RoEduNet51892.2020.9324889
Eric-Bogdan Postolache, Darius Mihai, Marian Mihailescu, Sergiu Weisz, M. Barbulescu, M. Cărăbaş, N. Tapus
The FreeBSD specific hypervisor solution, bhyve, is a mature virtualization solution that allows its users to configure the virtual machines in a robust manner by adding different types of devices. Moreover, the virtual machine state can be suspended for a later use by using the snapshotting mechanism. However, the existing snapshot mechanism can only store the state of one device of each type. This behaviour may be troublesome for entities that want to use the save and restore mechanism for virtual machines with multiple same type devices (e.g., two disks, two network interfaces) since it can lead to an inconsistent virtual machine state. This paper proposes a solution for extending this feature by allowing the saving and restoration of multiple devices of the same type, whenever they are used together
FreeBSD特定的管理程序解决方案bhyve是一个成熟的虚拟化解决方案,它允许其用户通过添加不同类型的设备以一种健壮的方式配置虚拟机。此外,还可以通过快照机制挂起虚拟机状态以供以后使用。但是,现有的快照机制只能存储每种类型的一个设备的状态。这种行为可能会给那些想要使用多个相同类型设备(例如,两个磁盘,两个网络接口)的虚拟机的保存和恢复机制的实体带来麻烦,因为它可能导致不一致的虚拟机状态。本文提出了一种扩展此功能的解决方案,允许保存和恢复多个相同类型的设备,无论何时它们一起使用
{"title":"Suspend feature for multiple devices of same type in bhyve","authors":"Eric-Bogdan Postolache, Darius Mihai, Marian Mihailescu, Sergiu Weisz, M. Barbulescu, M. Cărăbaş, N. Tapus","doi":"10.1109/RoEduNet51892.2020.9324889","DOIUrl":"https://doi.org/10.1109/RoEduNet51892.2020.9324889","url":null,"abstract":"The FreeBSD specific hypervisor solution, bhyve, is a mature virtualization solution that allows its users to configure the virtual machines in a robust manner by adding different types of devices. Moreover, the virtual machine state can be suspended for a later use by using the snapshotting mechanism. However, the existing snapshot mechanism can only store the state of one device of each type. This behaviour may be troublesome for entities that want to use the save and restore mechanism for virtual machines with multiple same type devices (e.g., two disks, two network interfaces) since it can lead to an inconsistent virtual machine state. This paper proposes a solution for extending this feature by allowing the saving and restoration of multiple devices of the same type, whenever they are used together","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"C-17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126759599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Vehicular Fog Computing: an Architecture for Connected Vehicles and Vehicular Clouds 迈向车辆雾计算:互联车辆和车辆云的架构
Pub Date : 2020-12-11 DOI: 10.1109/RoEduNet51892.2020.9324868
Z. Constantinescu, Monica Vladoiu
Amazing progress of various inter-related technologies, such as communications, automatic control, and embedded systems has changed the traditional vehicle model pushing it forward towards new paradigms: Internet of Vehicles, Connected Vehicles, Vehicular Clouds/Fogs, Fog Computing, Smart Vehicles, Intelligent IoV etc. However, implementing such paradigms is very challenging due to their extreme complexity, which prevents them to be a more substantial part of our daily life, at the full potential of the technology involved. To tackle such complexity, new approaches are necessary and, therefore, we propose here a user-centric architecture of a smart connected vehicle that can be used also for smart surrounding environments and that provides for autonomic, pervasive, and fog computing. Its current implementation in a connected vehicle is also shown.
通信、自动控制、嵌入式系统等各种互联技术的惊人进步,改变了传统的汽车模式,推动其向新的范式发展:车联网、车联网、车云/雾、雾计算、智能汽车、智能车联网等。然而,由于其极端的复杂性,实现这样的范式是非常具有挑战性的,这阻碍了它们成为我们日常生活中更重要的一部分,并充分发挥所涉及的技术的潜力。为了解决这种复杂性,需要新的方法,因此,我们在这里提出了一种以用户为中心的智能互联汽车架构,该架构也可用于智能周围环境,并提供自主、普及和雾计算。它目前在一辆联网汽车上的实现也被展示了出来。
{"title":"Towards Vehicular Fog Computing: an Architecture for Connected Vehicles and Vehicular Clouds","authors":"Z. Constantinescu, Monica Vladoiu","doi":"10.1109/RoEduNet51892.2020.9324868","DOIUrl":"https://doi.org/10.1109/RoEduNet51892.2020.9324868","url":null,"abstract":"Amazing progress of various inter-related technologies, such as communications, automatic control, and embedded systems has changed the traditional vehicle model pushing it forward towards new paradigms: Internet of Vehicles, Connected Vehicles, Vehicular Clouds/Fogs, Fog Computing, Smart Vehicles, Intelligent IoV etc. However, implementing such paradigms is very challenging due to their extreme complexity, which prevents them to be a more substantial part of our daily life, at the full potential of the technology involved. To tackle such complexity, new approaches are necessary and, therefore, we propose here a user-centric architecture of a smart connected vehicle that can be used also for smart surrounding environments and that provides for autonomic, pervasive, and fog computing. Its current implementation in a connected vehicle is also shown.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122966119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1