首页 > 最新文献

2009 International Conference on Advanced Information Networking and Applications Workshops最新文献

英文 中文
Do Metrics Make Recommender Algorithms? 指标决定推荐算法吗?
Elica Campochiaro, Riccardo Casatta, P. Cremonesi, R. Turrin
Recommender systems are used to suggest customized products to users. Most recommender algorithms create collaborative models by taking advantage of web user profiles. In the last years, in the area of recommender systems, the Netflix contest has been very attractive for the researchers. However, many recent papers on recommender systems present results evaluated with the methodology used in the Netflix contest in domains where the objectives are different from the contest (e.g., top-N recommendation task). In this paper we do not propose new recommender algorithms but, rather, we compare different aspects of the official Netflix contest methodology based on RMSE and holdout with methodologies based on k-fold and classification accuracy metrics.We show, with case studies, that different evaluation methodologies lead to totally contrasting conclusions about the quality of recommendations.
推荐系统用于向用户推荐定制产品。大多数推荐算法通过利用网络用户档案来创建协作模型。在过去的几年里,在推荐系统领域,Netflix的竞赛对研究人员非常有吸引力。然而,最近许多关于推荐系统的论文在目标与竞赛不同的领域(例如,top-N推荐任务)中使用Netflix竞赛中使用的方法来评估结果。在本文中,我们没有提出新的推荐算法,而是比较了基于RMSE和holdout的官方Netflix竞赛方法与基于k-fold和分类精度指标的方法的不同方面。我们通过案例研究表明,不同的评估方法会导致关于推荐质量的完全不同的结论。
{"title":"Do Metrics Make Recommender Algorithms?","authors":"Elica Campochiaro, Riccardo Casatta, P. Cremonesi, R. Turrin","doi":"10.1109/WAINA.2009.127","DOIUrl":"https://doi.org/10.1109/WAINA.2009.127","url":null,"abstract":"Recommender systems are used to suggest customized products to users. Most recommender algorithms create collaborative models by taking advantage of web user profiles. In the last years, in the area of recommender systems, the Netflix contest has been very attractive for the researchers. However, many recent papers on recommender systems present results evaluated with the methodology used in the Netflix contest in domains where the objectives are different from the contest (e.g., top-N recommendation task). In this paper we do not propose new recommender algorithms but, rather, we compare different aspects of the official Netflix contest methodology based on RMSE and holdout with methodologies based on k-fold and classification accuracy metrics.We show, with case studies, that different evaluation methodologies lead to totally contrasting conclusions about the quality of recommendations.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116870817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Using Multi-valued Decision Diagrams to Solve the Expected Hop Count Problem 用多值决策图求解期望跳数问题
J. Herrmann, S. Soh, Geoff A. W. West, S. Rai
The Expected Hop Count (EHC) of a computer communication network has so far been computed for network models that consider only device or link failure, but not both. We introduce an Augmented Ordered Multi-valued Decision Diagram (OMDD-A) to obtain the EHC of a network in which both devices and links may fail. The OMDD-A approach can compute the EHC of a 2´100 grid network with 299 paths, which is unsolvable using existing techniques. We show that OMDD-A generates significantly fewer nodes than the corresponding ordered binary decision diagram, leading to large reductions in processing time.
到目前为止,计算机通信网络的期望跳数(EHC)是针对只考虑设备或链路故障的网络模型计算的,而不是同时考虑两者。我们引入增广有序多值决策图(OMDD-A)来获得设备和链路都可能失效的网络的EHC。OMDD-A方法可以计算具有299条路径的2´100网格网络的EHC,这是现有技术无法解决的。我们表明,OMDD-A生成的节点明显少于相应的有序二进制决策图,从而大大减少了处理时间。
{"title":"Using Multi-valued Decision Diagrams to Solve the Expected Hop Count Problem","authors":"J. Herrmann, S. Soh, Geoff A. W. West, S. Rai","doi":"10.1109/WAINA.2009.124","DOIUrl":"https://doi.org/10.1109/WAINA.2009.124","url":null,"abstract":"The Expected Hop Count (EHC) of a computer communication network has so far been computed for network models that consider only device or link failure, but not both. We introduce an Augmented Ordered Multi-valued Decision Diagram (OMDD-A) to obtain the EHC of a network in which both devices and links may fail. The OMDD-A approach can compute the EHC of a 2´100 grid network with 299 paths, which is unsolvable using existing techniques. We show that OMDD-A generates significantly fewer nodes than the corresponding ordered binary decision diagram, leading to large reductions in processing time.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114862480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Street CORNERS: Real-Time Contextual Representation of Sensor Network Data for Environmental Trend Identification 街角:用于环境趋势识别的传感器网络数据的实时上下文表示
Patricia Morreale, F. Qi, P. Croft, George Chang, Justin Czarnik, Nick Doell, Jhon Espin, Ryan Suleski
Sensor networks have been deployed for a range of rural and environmental applications. Well-regarded for the volume and range of data which can be obtained, wireless sensor network applications capable of using the data gathered have not been fully realized, particularly in urban settings. Street CORNERS is a wireless sensor network application which supports the contextual presentation of data gathered from an urban setting. The Street CORNERS application offers real-time data display, and provides support for predictive algorithms suitable for anticipating, detecting, and defending urban communities, among others, from environmental threats such as declining air quality and urban flash floods. Street CORNERS is presented in two parts. The network design and deployment is outlined, followed by a discussion of the design of the network application, which is involved in data pre-processing and the contextual presentation of the data gathered for trend identification.
传感器网络已经部署在一系列农村和环境应用中。由于可以获得的数据的数量和范围广受好评,能够使用所收集数据的无线传感器网络应用尚未充分实现,特别是在城市环境中。街角是一个无线传感器网络应用程序,它支持从城市环境中收集的数据的上下文表示。街角应用程序提供实时数据显示,并为预测算法提供支持,适用于预测、检测和保护城市社区,以及其他环境威胁,如空气质量下降和城市山洪暴发。《街角》分为两部分。概述了网络设计和部署,然后讨论了网络应用程序的设计,其中涉及数据预处理和为趋势识别而收集的数据的上下文表示。
{"title":"Street CORNERS: Real-Time Contextual Representation of Sensor Network Data for Environmental Trend Identification","authors":"Patricia Morreale, F. Qi, P. Croft, George Chang, Justin Czarnik, Nick Doell, Jhon Espin, Ryan Suleski","doi":"10.1109/WAINA.2009.67","DOIUrl":"https://doi.org/10.1109/WAINA.2009.67","url":null,"abstract":"Sensor networks have been deployed for a range of rural and environmental applications. Well-regarded for the volume and range of data which can be obtained, wireless sensor network applications capable of using the data gathered have not been fully realized, particularly in urban settings. Street CORNERS is a wireless sensor network application which supports the contextual presentation of data gathered from an urban setting. The Street CORNERS application offers real-time data display, and provides support for predictive algorithms suitable for anticipating, detecting, and defending urban communities, among others, from environmental threats such as declining air quality and urban flash floods. Street CORNERS is presented in two parts. The network design and deployment is outlined, followed by a discussion of the design of the network application, which is involved in data pre-processing and the contextual presentation of the data gathered for trend identification.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"46 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123676500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Evaluation of Secure Call Admission Control for Multiclass Internet Services 多类别互联网业务安全呼叫接纳控制的性能评价
A. Al-Haj, J. Mellor, I. Awan
With the growing demands for computer network communication, it becomes increasingly important to secure the data flow path. The existing research related to security mechanisms only focuses on securing the flow of information in the communication networks. There is a lack of work on improving the performance of networks to meet quality of service (QoS) constrains for various applications. The security mechanisms work by encryption and decryption of the information, but do not consider the optimised use of the network resources. In this paper we propose a Secure Call Admission Control (SCAC) for Multiclass Internet Services (MIS) to combine between security and quality of service. Our proposed Secure Call Admission Control for multiclass internet services enhanced with Malicious Packets Filter (MPF) is a set of technologies and solutions. It enforces security policy and bandwidth compliance on all devices seeking to access network computing resources, in order to limit damage from emerging security threats and to allow network access only to compliant and trusted endpoint devices. This SCAC also provides support for quality of service. High-level simulations and the related results are provided to show the properties of the SCAC.
随着计算机网络通信需求的不断增长,数据流路径的安全变得越来越重要。现有的安全机制研究主要集中在通信网络中信息流的安全问题上。目前还缺乏改进网络性能以满足各种应用的服务质量(QoS)限制的工作。安全机制通过对信息进行加密和解密来工作,但没有考虑网络资源的优化使用。本文提出了一种将安全与服务质量相结合的多级网络服务(MIS)安全呼叫接纳控制(SCAC)。我们提出的基于恶意数据包过滤(MPF)的多类别互联网服务安全呼叫允许控制是一套技术和解决方案。它在所有寻求访问网络计算资源的设备上强制执行安全策略和带宽遵从性,以限制新出现的安全威胁造成的损害,并只允许对合规且受信任的端点设备进行网络访问。该SCAC还为服务质量提供支持。给出了高级仿真和相关结果来展示SCAC的特性。
{"title":"Performance Evaluation of Secure Call Admission Control for Multiclass Internet Services","authors":"A. Al-Haj, J. Mellor, I. Awan","doi":"10.1109/WAINA.2009.80","DOIUrl":"https://doi.org/10.1109/WAINA.2009.80","url":null,"abstract":"With the growing demands for computer network communication, it becomes increasingly important to secure the data flow path. The existing research related to security mechanisms only focuses on securing the flow of information in the communication networks. There is a lack of work on improving the performance of networks to meet quality of service (QoS) constrains for various applications. The security mechanisms work by encryption and decryption of the information, but do not consider the optimised use of the network resources. In this paper we propose a Secure Call Admission Control (SCAC) for Multiclass Internet Services (MIS) to combine between security and quality of service. Our proposed Secure Call Admission Control for multiclass internet services enhanced with Malicious Packets Filter (MPF) is a set of technologies and solutions. It enforces security policy and bandwidth compliance on all devices seeking to access network computing resources, in order to limit damage from emerging security threats and to allow network access only to compliant and trusted endpoint devices. This SCAC also provides support for quality of service. High-level simulations and the related results are provided to show the properties of the SCAC.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115718849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Triangular Power Saving Routing Protocol with Power Balance in Mobile Ad Hoc Networks 移动自组织网络中具有功率均衡的三角形节能路由协议
Yi-Chao Wu, Chiu-Ching Tuan, Po-Chun Chen
In grid-based routing protocol, one node in a grid is elected as the grid leader. However, in the traditional grid leader election, nodes consume extra energy for election, especially in a high node density environment. In this paper, we propose a triangular power saving routing protocol with power balance (TPSPB) to address this issue. In TPSPB, a grid leader is elected directly without sending control packets as in the traditional grid leader election. Moreover, the proposed triangular route discovery in TPSPB could save more energy for nodes to transmit packets and prolong the network lifetime.
在基于网格的路由协议中,一个网格中的一个节点被选举为网格领导者。然而,在传统的网格领袖选举中,特别是在高节点密度环境下,节点的选举会消耗额外的能量。为了解决这个问题,我们提出了一种带功率平衡的三角形省电路由协议(TPSPB)。在TPSPB中,不像传统的网格领导人选举那样发送控制报文,直接选举网格领导人。此外,在TPSPB中提出的三角路由发现可以节省节点传输数据包的能量,延长网络的生命周期。
{"title":"Triangular Power Saving Routing Protocol with Power Balance in Mobile Ad Hoc Networks","authors":"Yi-Chao Wu, Chiu-Ching Tuan, Po-Chun Chen","doi":"10.1109/WAINA.2009.35","DOIUrl":"https://doi.org/10.1109/WAINA.2009.35","url":null,"abstract":"In grid-based routing protocol, one node in a grid is elected as the grid leader. However, in the traditional grid leader election, nodes consume extra energy for election, especially in a high node density environment. In this paper, we propose a triangular power saving routing protocol with power balance (TPSPB) to address this issue. In TPSPB, a grid leader is elected directly without sending control packets as in the traditional grid leader election. Moreover, the proposed triangular route discovery in TPSPB could save more energy for nodes to transmit packets and prolong the network lifetime.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129855459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Channel Estimation Using Wavelet Denoising for OFDM and OFDMA Systems 基于小波降噪的OFDM和OFDMA信道估计改进
Xue Wang, Linjing Zhao, Jiandong Li
Least Square (LS) channel estimation has been widely used in OFDM (Orthogonal Frequency Division Multiplexing) and OFDMA (Orthogonal Frequency Division Multiplexing Access) systems. However, it's rather sensitive to Guassian white noise. In this paper, we present a new algorithm which deals with the LS estimation results through wavelet shrinkage denoising based on Stein’s unbiased risk estimation (SURE) criterion. This algorithm can effectively remove the influence of noise in the channels and minimize the estimation risk. Consequently, the sensitivity to noise of LS estimation is diminished. Simulation in the scenario of IEEE802.16 downlink transmission shows that the proposed algorithm has significant advantage over LS and modified LS estimators.
最小二乘信道估计在正交频分复用(OFDM)和正交频分复用(OFDMA)系统中得到了广泛的应用。然而,它对高斯白噪声相当敏感。本文提出了一种基于Stein无偏风险估计准则的小波收缩去噪处理LS估计结果的新算法。该算法可以有效地去除信道中噪声的影响,使估计风险最小化。因此,LS估计对噪声的敏感性降低。在IEEE802.16下行传输场景下的仿真表明,该算法比LS估计和改进的LS估计具有显著的优势。
{"title":"Improved Channel Estimation Using Wavelet Denoising for OFDM and OFDMA Systems","authors":"Xue Wang, Linjing Zhao, Jiandong Li","doi":"10.1109/WAINA.2009.51","DOIUrl":"https://doi.org/10.1109/WAINA.2009.51","url":null,"abstract":"Least Square (LS) channel estimation has been widely used in OFDM (Orthogonal Frequency Division Multiplexing) and OFDMA (Orthogonal Frequency Division Multiplexing Access) systems. However, it's rather sensitive to Guassian white noise. In this paper, we present a new algorithm which deals with the LS estimation results through wavelet shrinkage denoising based on Stein’s unbiased risk estimation (SURE) criterion. This algorithm can effectively remove the influence of noise in the channels and minimize the estimation risk. Consequently, the sensitivity to noise of LS estimation is diminished. Simulation in the scenario of IEEE802.16 downlink transmission shows that the proposed algorithm has significant advantage over LS and modified LS estimators.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125544790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prioritized Buffer Management Policy for Wireless Sensor Nodes 无线传感器节点的优先缓冲管理策略
Weihuan Shu, K. Padmanabh, Puneet Gupta
In wireless sensor node battery power and memory is available in limited amount. The computing devices available in the sensor nodes are not capable enough to execute complex algorithm. Moreover, several retransmissions of data packets are done to compensate lost packet due to buffer overflow. The algorithm of buffer management policies of conventional data network cannot be applied in sensor network, because they are too complex to be implemented in low computation capable sensor nodes. There are many aspect of this paper, firstly we proposed to classify the packets into different categories and then we proposed the prioritized buffer management policy for different category uniquely. Currently, the CMU priority queue system available with the default DSR algorithm is being used in wireless sensor network. Our analysis and simulation studies show that our policies can be used to save all critically important packets. The other results indicate that our proposed algorithm outperform the CMU priority queue management available with DSR protocol.
在无线传感器节点中,电池电量和内存是有限的。传感器节点中可用的计算设备不足以执行复杂的算法。此外,为了补偿由于缓冲区溢出而丢失的数据包,需要对数据包进行多次重传。传统数据网络的缓冲管理策略算法由于过于复杂,难以在计算能力较低的传感器节点上实现,因此不能应用于传感器网络。本文从多个方面进行了研究,首先提出了对数据包进行分类,然后针对不同的分类提出了唯一的优先级缓冲管理策略。目前,基于默认DSR算法的CMU优先队列系统被广泛应用于无线传感器网络中。我们的分析和模拟研究表明,我们的策略可以用来保存所有至关重要的数据包。其他结果表明,我们提出的算法优于使用DSR协议的CMU优先队列管理。
{"title":"Prioritized Buffer Management Policy for Wireless Sensor Nodes","authors":"Weihuan Shu, K. Padmanabh, Puneet Gupta","doi":"10.1109/WAINA.2009.131","DOIUrl":"https://doi.org/10.1109/WAINA.2009.131","url":null,"abstract":"In wireless sensor node battery power and memory is available in limited amount. The computing devices available in the sensor nodes are not capable enough to execute complex algorithm. Moreover, several retransmissions of data packets are done to compensate lost packet due to buffer overflow. The algorithm of buffer management policies of conventional data network cannot be applied in sensor network, because they are too complex to be implemented in low computation capable sensor nodes. There are many aspect of this paper, firstly we proposed to classify the packets into different categories and then we proposed the prioritized buffer management policy for different category uniquely. Currently, the CMU priority queue system available with the default DSR algorithm is being used in wireless sensor network. Our analysis and simulation studies show that our policies can be used to save all critically important packets. The other results indicate that our proposed algorithm outperform the CMU priority queue management available with DSR protocol.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128654274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Optimization of iSCSI Remote Storage Access through Multiple Layers iSCSI多层远程存储访问优化
R. Higa, Kosuke Matsubara, T. Okamawari, Saneyasu Yamaguchi, M. Oguchi
iSCSI has a problem of drastic performance deterioration in the case of longer-latency. Thus, we have optimized iSCSI remote storage access through multiple layers. As a result, when RTT is 32ms, performance of the optimized iSCSI has achieved quadruple of that of the default iSCSI. Moreover, we have constructed the model of iSCSI sequential access and analyzed the factor of iSCSI performance deterioration.
在较长延迟的情况下,iSCSI存在性能急剧下降的问题。因此,我们通过多层优化了iSCSI远程存储访问。因此,当RTT为32ms时,优化后的iSCSI的性能达到了默认iSCSI的四倍。建立了iSCSI顺序访问模型,分析了影响iSCSI性能的因素。
{"title":"Optimization of iSCSI Remote Storage Access through Multiple Layers","authors":"R. Higa, Kosuke Matsubara, T. Okamawari, Saneyasu Yamaguchi, M. Oguchi","doi":"10.1109/WAINA.2009.61","DOIUrl":"https://doi.org/10.1109/WAINA.2009.61","url":null,"abstract":"iSCSI has a problem of drastic performance deterioration in the case of longer-latency. Thus, we have optimized iSCSI remote storage access through multiple layers. As a result, when RTT is 32ms, performance of the optimized iSCSI has achieved quadruple of that of the default iSCSI. Moreover, we have constructed the model of iSCSI sequential access and analyzed the factor of iSCSI performance deterioration.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"47 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121007652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Combating Typo-Squatting for Safer Browsing 打击打字抢注,安全浏览
Guanchen Chen, Matthew F. Johnson, Pavan Roy Marupally, Naveen K. Singireddy, Xin Yin, V. Paruchuri
Cyber-squatting is fast becoming a threat to the future viability of Internet commerce. Fraudulent abuse of domain name registration is at the core of cybersquatting. By registering domain names similar to famous brands, cybersquatters lure consumers into purchasing counterfeit products, cause them to reveal their personally identifiable information, and expose themselves to spyware. Typosquatting is registering domain names that are typographical mistakes on popular and common domains. To the best of our knowledge, no solution has been proposed to thwart typosquatting. In this paper, we propose and implement Anti Typo Squatting Tool (ATST), an extension to Internet browsers that could detect and warn users of any possible typos. Through extensive analysis and evaluation, we show that ATST can detect up to 85% of user typos. Further, ATST is lightweight, and is able to check for typos and provide possible suggestions in as little as 300ms.
域名抢注正迅速成为互联网商业未来生存能力的威胁。欺诈性滥用域名注册是域名抢注的核心。通过注册与知名品牌相似的域名,域名抢注者引诱消费者购买假冒产品,导致消费者泄露个人身份信息,并使自己暴露于间谍软件之下。打字错误是注册域名的拼写错误,在流行和常见的域名。据我们所知,还没有提出任何解决办法来阻止打字。在本文中,我们提出并实现了Anti Typo Squatting Tool (ATST),这是一个扩展到Internet浏览器,可以检测并警告用户任何可能的拼写错误。通过广泛的分析和评估,我们表明ATST可以检测到高达85%的用户输入错误。此外,ATST是轻量级的,能够在短短300毫秒内检查错字并提供可能的建议。
{"title":"Combating Typo-Squatting for Safer Browsing","authors":"Guanchen Chen, Matthew F. Johnson, Pavan Roy Marupally, Naveen K. Singireddy, Xin Yin, V. Paruchuri","doi":"10.1109/WAINA.2009.98","DOIUrl":"https://doi.org/10.1109/WAINA.2009.98","url":null,"abstract":"Cyber-squatting is fast becoming a threat to the future viability of Internet commerce. Fraudulent abuse of domain name registration is at the core of cybersquatting. By registering domain names similar to famous brands, cybersquatters lure consumers into purchasing counterfeit products, cause them to reveal their personally identifiable information, and expose themselves to spyware. Typosquatting is registering domain names that are typographical mistakes on popular and common domains. To the best of our knowledge, no solution has been proposed to thwart typosquatting. In this paper, we propose and implement Anti Typo Squatting Tool (ATST), an extension to Internet browsers that could detect and warn users of any possible typos. Through extensive analysis and evaluation, we show that ATST can detect up to 85% of user typos. Further, ATST is lightweight, and is able to check for typos and provide possible suggestions in as little as 300ms.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115758098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Identity-Based Cryptography for Securing Mobile Phone Calls 基于身份的加密保护移动电话呼叫
Matthew Smith, C. Schridde, Björn Agel, Bernd Freisleben
In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to piggyback much of the security overhead for key management to the existing GSM or UMTS infrastructure. The proposed approach offers solutions to the problems of multi-domain key generation, key distribution, multi-domain public parameter distribution and inter-domain key agreement.
提出了一种基于身份的GSM和UMTS网络移动电话密钥协议系统。使用电话号码作为公共密钥允许系统将密钥管理的大部分安全开销附带到现有的GSM或UMTS基础设施中。该方法解决了多域密钥生成、密钥分发、多域公共参数分发和域间密钥协议等问题。
{"title":"Identity-Based Cryptography for Securing Mobile Phone Calls","authors":"Matthew Smith, C. Schridde, Björn Agel, Bernd Freisleben","doi":"10.1109/WAINA.2009.167","DOIUrl":"https://doi.org/10.1109/WAINA.2009.167","url":null,"abstract":"In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to piggyback much of the security overhead for key management to the existing GSM or UMTS infrastructure. The proposed approach offers solutions to the problems of multi-domain key generation, key distribution, multi-domain public parameter distribution and inter-domain key agreement.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115737845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2009 International Conference on Advanced Information Networking and Applications Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1