首页 > 最新文献

2017 8th International Conference on Information and Communication Systems (ICICS)最新文献

英文 中文
Automated malicious advertisement detection using VirusTotal, URLVoid, and TrendMicro 自动恶意广告检测使用VirusTotal, URLVoid和趋势科技
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921994
Rima Masri, M. Aldwairi
The Internet economy is based on free access to content in exchange of viewing advertisements that might lead to online purchases. Advertisements represent an important source of revenue to Advertising companies. Those companies employ every possible technique and trick to maximize clicks and visits to advertisers' websites. Modern websites exchange advertisement contents from ads' providers (such as Google AdSense), which means they do not control the contents of those advertisements. Although large providers such as Google and Yahoo! are supposed to be trustworthy, ad arbitration allows them to auction of those ad slots to other providers. Therefore, web administrators cannot guarantee the source of the ads on their delegated website areas. Those advertisements contain Javascript and may redirect to malicious websites which might lead to malicious code being executed or malware being installed. This paper proposes and implements a system for automatically detecting malicious advertisements. It employs three different online malware domain detections systems (VirusTotal, URLVoid, and TrendMicro) for malicious advertisements detection purposes and reports the number of detected malicious advertisements using each system. In addition, we study the efficiency of each system by calculating the confusion matrix and accuracy. We find that URLVoid is the best in terms of accuracy (73%) because it uses a combination of well known website scanners and domain blacklists.
互联网经济的基础是免费访问内容,以换取观看广告,这些广告可能会导致在线购买。广告是广告公司的重要收入来源。这些公司利用一切可能的技术和技巧来最大化广告商网站的点击量和访问量。现代网站从广告提供商(如Google AdSense)交换广告内容,这意味着他们不控制这些广告的内容。尽管像Google和Yahoo!应该是值得信赖的,AD仲裁允许他们拍卖这些广告位给其他提供商。因此,网站管理员无法保证其授权网站区域广告的来源。这些广告包含Javascript并可能重定向到恶意网站,这可能导致恶意代码被执行或恶意软件被安装。本文提出并实现了一个自动检测恶意广告的系统。它采用三种不同的在线恶意软件域检测系统(VirusTotal、URLVoid和TrendMicro)来检测恶意广告,并报告使用每种系统检测到的恶意广告数量。此外,我们还通过计算混淆矩阵和准确率来研究每个系统的效率。我们发现URLVoid在准确率方面是最好的(73%),因为它结合了众所周知的网站扫描仪和域名黑名单。
{"title":"Automated malicious advertisement detection using VirusTotal, URLVoid, and TrendMicro","authors":"Rima Masri, M. Aldwairi","doi":"10.1109/IACS.2017.7921994","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921994","url":null,"abstract":"The Internet economy is based on free access to content in exchange of viewing advertisements that might lead to online purchases. Advertisements represent an important source of revenue to Advertising companies. Those companies employ every possible technique and trick to maximize clicks and visits to advertisers' websites. Modern websites exchange advertisement contents from ads' providers (such as Google AdSense), which means they do not control the contents of those advertisements. Although large providers such as Google and Yahoo! are supposed to be trustworthy, ad arbitration allows them to auction of those ad slots to other providers. Therefore, web administrators cannot guarantee the source of the ads on their delegated website areas. Those advertisements contain Javascript and may redirect to malicious websites which might lead to malicious code being executed or malware being installed. This paper proposes and implements a system for automatically detecting malicious advertisements. It employs three different online malware domain detections systems (VirusTotal, URLVoid, and TrendMicro) for malicious advertisements detection purposes and reports the number of detected malicious advertisements using each system. In addition, we study the efficiency of each system by calculating the confusion matrix and accuracy. We find that URLVoid is the best in terms of accuracy (73%) because it uses a combination of well known website scanners and domain blacklists.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117306694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
A secure hiding scheme for tamper-proofing and authentication of color biometrie templates 一种用于彩色生物特征模板防篡改和认证的安全隐藏方案
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921961
Eyad Ben Tarif, S. Wibowo, S. Wasimi, Afaf Tareef, Abedalraheem Tareaf
With the rapid growth of the biometric-based identification and authentication systems, establishing the integrity and authenticity of biometric data has become a serious research issue. Information hiding has emerged as an efficient way to secure the biometric data during transmission in web-based applications. In this paper, a content authentication and tamper-proofing system is presented to localize and correct the corrupted area in color biometric data. Information hiding based on sparsity theory is utilized to hide a copy of the luminance component of the color biometric image. The proposed scheme has been evaluated using Georgia Technology face database, and the results have demonstrated the reliability and efficiency of the proposed scheme in identifying and restoring the tampered area, even when the biometric image is seriously corrupted.
随着基于生物特征的身份认证系统的快速发展,建立生物特征数据的完整性和真实性已成为一个重要的研究课题。在基于web的应用程序中,信息隐藏作为一种有效的保护生物特征数据传输的方法已经出现。本文提出了一种内容认证防篡改系统,用于定位和纠正彩色生物特征数据中的损坏区域。利用基于稀疏性理论的信息隐藏来隐藏彩色生物特征图像亮度分量的副本。利用佐治亚技术公司人脸数据库对该方案进行了评估,结果表明,即使在生物特征图像严重损坏的情况下,该方案在识别和恢复篡改区域方面具有可靠性和有效性。
{"title":"A secure hiding scheme for tamper-proofing and authentication of color biometrie templates","authors":"Eyad Ben Tarif, S. Wibowo, S. Wasimi, Afaf Tareef, Abedalraheem Tareaf","doi":"10.1109/IACS.2017.7921961","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921961","url":null,"abstract":"With the rapid growth of the biometric-based identification and authentication systems, establishing the integrity and authenticity of biometric data has become a serious research issue. Information hiding has emerged as an efficient way to secure the biometric data during transmission in web-based applications. In this paper, a content authentication and tamper-proofing system is presented to localize and correct the corrupted area in color biometric data. Information hiding based on sparsity theory is utilized to hide a copy of the luminance component of the color biometric image. The proposed scheme has been evaluated using Georgia Technology face database, and the results have demonstrated the reliability and efficiency of the proposed scheme in identifying and restoring the tampered area, even when the biometric image is seriously corrupted.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123627631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security behaviors of healthcare providers using HIT outside of work: A technology threat avoidance perspective 医疗保健提供者在工作之外使用HIT的安全行为:技术威胁避免的视角
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921995
Bahae Samhan
This study empirically tests the model of the Technology Threats Avoidance Theory (TTAT) in a healthcare context to investigate health information technology (HIT) avoidance behaviors when used in unsecure environment. Testing the model in this new context explained avoidance behaviors towards HIT in a holistic way. It is found that the HIT avoidance is predicted by levels of perceived threat, avoidance motivation, perceived effectiveness of the safeguarding measure, perceived cost of the safeguarding measure, and the self-efficacy of using this safeguarding measure. The study also controlled for a number of variables and found that levels of education and age have significant influence on avoidance behavior towards the HIT.
本研究在医疗环境中实证检验了技术威胁回避理论(TTAT)模型,探讨了健康信息技术(HIT)在不安全环境中使用时的回避行为。在这种新的背景下测试模型从整体上解释了对HIT的回避行为。研究发现,HIT回避由感知威胁水平、回避动机水平、感知保护措施有效性水平、感知保护措施成本水平和使用该保护措施的自我效能水平预测。该研究还控制了一些变量,发现教育水平和年龄对躲避HIT的行为有显著影响。
{"title":"Security behaviors of healthcare providers using HIT outside of work: A technology threat avoidance perspective","authors":"Bahae Samhan","doi":"10.1109/IACS.2017.7921995","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921995","url":null,"abstract":"This study empirically tests the model of the Technology Threats Avoidance Theory (TTAT) in a healthcare context to investigate health information technology (HIT) avoidance behaviors when used in unsecure environment. Testing the model in this new context explained avoidance behaviors towards HIT in a holistic way. It is found that the HIT avoidance is predicted by levels of perceived threat, avoidance motivation, perceived effectiveness of the safeguarding measure, perceived cost of the safeguarding measure, and the self-efficacy of using this safeguarding measure. The study also controlled for a number of variables and found that levels of education and age have significant influence on avoidance behavior towards the HIT.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115361241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Spam profile detection in social networks based on public features 基于公共特征的社交网络垃圾信息检测
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921959
Ala’ M. Al-Zoubi, Ja'far Alqatawna, Hossam Paris
In the context of Online Social Networks, Spam profiles are not just a source of unwanted ads, but a serious security threat used by online criminals and terrorists for various malicious purposes. Recently, such criminals were able to steal a number of accounts that belong to NatWest bank's customers. Their attack vector was based on spam tweets posted by a Twitter account which looked very close to NatWest customer support account and leaded users to a link of a phishing site. In this study, we investigate the nature of spam profiles in Twitter with a goal to improve social spam detection. Based on a set of publicly available features, we develop spam profiles detection models. At this stage, a dataset of 82 Twitter's profiles are collected and analyzed. With feature engineering, we investigate ten binary and simple features that can be used to classify spam profiles. Moreover, a feature selection process is utilized to identify the most influencing features in the process of detecting spam profiles. For feature selection, two methods are used ReliefF and Information Gain. While for classification, four classification algorithms are applied and compared: Decision Trees, Multilayer Perceptron, k-Nearest neighbors and Naive Bayes. Preliminary experiments in this work show that the promising detection rates can be obtained using such features regardless of the language of the tweets.
在在线社交网络的背景下,垃圾资料不仅是不受欢迎的广告来源,而且是网络犯罪分子和恐怖分子用于各种恶意目的的严重安全威胁。最近,这类犯罪分子成功窃取了NatWest银行客户的多个账户。他们的攻击媒介是基于一个Twitter帐户发布的垃圾推文,该帐户看起来与NatWest客户支持帐户非常接近,并将用户引导到一个网络钓鱼网站的链接。在这项研究中,我们调查了Twitter中垃圾邮件配置文件的性质,目的是提高社交垃圾邮件检测。基于一组公开可用的特性,我们开发了垃圾邮件配置文件检测模型。在这个阶段,收集并分析了82个Twitter个人资料的数据集。通过特征工程,我们研究了10个可用于分类垃圾邮件配置文件的二进制和简单特征。此外,利用特征选择过程来识别检测垃圾邮件配置文件过程中最具影响力的特征。在特征选择方面,采用了ReliefF和Information Gain两种方法。在分类方面,采用了四种分类算法:决策树、多层感知器、k近邻和朴素贝叶斯。本工作的初步实验表明,无论推文的语言如何,使用这些特征都可以获得有希望的检测率。
{"title":"Spam profile detection in social networks based on public features","authors":"Ala’ M. Al-Zoubi, Ja'far Alqatawna, Hossam Paris","doi":"10.1109/IACS.2017.7921959","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921959","url":null,"abstract":"In the context of Online Social Networks, Spam profiles are not just a source of unwanted ads, but a serious security threat used by online criminals and terrorists for various malicious purposes. Recently, such criminals were able to steal a number of accounts that belong to NatWest bank's customers. Their attack vector was based on spam tweets posted by a Twitter account which looked very close to NatWest customer support account and leaded users to a link of a phishing site. In this study, we investigate the nature of spam profiles in Twitter with a goal to improve social spam detection. Based on a set of publicly available features, we develop spam profiles detection models. At this stage, a dataset of 82 Twitter's profiles are collected and analyzed. With feature engineering, we investigate ten binary and simple features that can be used to classify spam profiles. Moreover, a feature selection process is utilized to identify the most influencing features in the process of detecting spam profiles. For feature selection, two methods are used ReliefF and Information Gain. While for classification, four classification algorithms are applied and compared: Decision Trees, Multilayer Perceptron, k-Nearest neighbors and Naive Bayes. Preliminary experiments in this work show that the promising detection rates can be obtained using such features regardless of the language of the tweets.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114851594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Dealing with decisional natural language why-question in business intelligence 商业智能中决策性自然语言“为什么”问题的处理
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921945
Meriem Amel Guessoum, Rahma Djiroun, K. Boukhalfa
Business Intelligence aims at providing information to non expert users to make appropriate decisions. To access decisional information, the decision maker should express his/her requirements in Natural Language interfaces instead of technical languages, to avoid IT designer dependency and formal language's unfamiliarity. A Natural Language query is formulated according to several types such as WH-questions as “What, Who, Where, etc.” questions, Keyword-like questions, etc. We focus on “Why-Question” and we present an approach handling this kind of question. We begin by modelling the Why-Question, then we present a mathematical model based on numerical analysis to detect the eventual Why-Questions answers. We propose a tool called Why-Question analyser implementing our approach. A preliminary evaluation is presented.
商业智能旨在为非专业用户提供信息以做出适当的决策。为了获取决策信息,决策者应该用自然语言接口而不是技术语言来表达自己的需求,以避免对IT设计者的依赖和形式语言的不熟悉。自然语言查询是根据几种类型制定的,如wh问题,如“什么,谁,在哪里等”问题,关键字问题等。我们关注“为什么问题”,并提出了处理这类问题的方法。我们首先对“为什么”问题进行建模,然后提出一个基于数值分析的数学模型,以检测“为什么”问题的最终答案。我们提出了一个名为Why-Question分析器的工具来实现我们的方法。提出了初步评价。
{"title":"Dealing with decisional natural language why-question in business intelligence","authors":"Meriem Amel Guessoum, Rahma Djiroun, K. Boukhalfa","doi":"10.1109/IACS.2017.7921945","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921945","url":null,"abstract":"Business Intelligence aims at providing information to non expert users to make appropriate decisions. To access decisional information, the decision maker should express his/her requirements in Natural Language interfaces instead of technical languages, to avoid IT designer dependency and formal language's unfamiliarity. A Natural Language query is formulated according to several types such as WH-questions as “What, Who, Where, etc.” questions, Keyword-like questions, etc. We focus on “Why-Question” and we present an approach handling this kind of question. We begin by modelling the Why-Question, then we present a mathematical model based on numerical analysis to detect the eventual Why-Questions answers. We propose a tool called Why-Question analyser implementing our approach. A preliminary evaluation is presented.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129649543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Early diagnosis of Alzheimer using mini mental state examination method: MMSE 微型精神状态检查方法早期诊断阿尔茨海默病:MMSE
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921958
Dong Chen, A. Alsadoon, P. Prasad, A. Elchouemi
This study aims to analyse the current method in diagnosing early Alzheimer disease and offer a new method to improve the performance of bioinformatics techniques. It proposes a hybrid MRI image processing method to improve the image quality for Alzheimer disease classification. This hybrid method has four stages consisting of image pre-processing, segmentation, feature extraction, and classification. Experimental results using a hybrid image pre-processing method apply on original MRI image data. The study shows that the Mini Mental State Examination (MMSE) method together with the residual intensity non-uniformity method in the SPM machine could make MRI image more effective with high accuracy and sensitive rates. The study shows that a well-designed pre-processing stage could improve the image quality of the subject for final classification. It can help researchers to gain high value of diagnosing early Alzheimer disease by filtering most of the image noise.
本研究旨在分析目前早期阿尔茨海默病的诊断方法,为提高生物信息学技术的性能提供一种新的方法。为了提高阿尔茨海默病分类的图像质量,提出了一种混合MRI图像处理方法。该混合方法分为图像预处理、分割、特征提取和分类四个阶段。实验结果表明,混合图像预处理方法适用于原始MRI图像数据。研究表明,迷你精神状态检查(MMSE)方法与SPM机的残余强度非均匀性方法相结合,可以使MRI成像更加有效,具有较高的准确率和灵敏度。研究表明,设计良好的预处理阶段可以提高被试的图像质量,便于最终分类。通过过滤掉大部分图像噪声,可以帮助研究人员获得较高的早期阿尔茨海默病诊断价值。
{"title":"Early diagnosis of Alzheimer using mini mental state examination method: MMSE","authors":"Dong Chen, A. Alsadoon, P. Prasad, A. Elchouemi","doi":"10.1109/IACS.2017.7921958","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921958","url":null,"abstract":"This study aims to analyse the current method in diagnosing early Alzheimer disease and offer a new method to improve the performance of bioinformatics techniques. It proposes a hybrid MRI image processing method to improve the image quality for Alzheimer disease classification. This hybrid method has four stages consisting of image pre-processing, segmentation, feature extraction, and classification. Experimental results using a hybrid image pre-processing method apply on original MRI image data. The study shows that the Mini Mental State Examination (MMSE) method together with the residual intensity non-uniformity method in the SPM machine could make MRI image more effective with high accuracy and sensitive rates. The study shows that a well-designed pre-processing stage could improve the image quality of the subject for final classification. It can help researchers to gain high value of diagnosing early Alzheimer disease by filtering most of the image noise.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124449667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using delay tolerant network for the Internet of Things: Opportunities and challenges 在物联网中使用容延迟网络:机遇与挑战
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921980
Fatima-Zohra Benhamida, A. Bouabdellah, Y. Challal
Delay Tolerant Network (DTN) is a class of network architectures that address the lack of continuous network connectivity. This issue has been studied for over a decade by promoting new routing protocols. However, recent researches in DTN should rekindle proposed solutions to support new emerging network-based applications, in which DTN techniques can be used to offer delay tolerant support. Example of these applications domains is Internet of Things (IoT). We survey the use of DTN solutions in IoT applications to overcome connectivity problems considering the opportunities and challenges for each technology. The purpose of this work is to introduce most recent solutions that enable delay tolerant IoT. We propose a taxonomy and discuss advantages and limitations for each study.
容忍延迟网络(DTN)是一类解决缺乏连续网络连接的网络体系结构。通过推广新的路由协议,这个问题已经研究了十多年。然而,最近对DTN的研究应该重新点燃提出的解决方案,以支持新兴的基于网络的应用,其中DTN技术可以用于提供延迟容忍支持。这些应用领域的例子是物联网(IoT)。考虑到每种技术的机遇和挑战,我们调查了DTN解决方案在物联网应用中的使用情况,以克服连接问题。这项工作的目的是介绍最新的解决方案,使延迟容忍物联网。我们提出了一种分类方法,并讨论了每种研究的优点和局限性。
{"title":"Using delay tolerant network for the Internet of Things: Opportunities and challenges","authors":"Fatima-Zohra Benhamida, A. Bouabdellah, Y. Challal","doi":"10.1109/IACS.2017.7921980","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921980","url":null,"abstract":"Delay Tolerant Network (DTN) is a class of network architectures that address the lack of continuous network connectivity. This issue has been studied for over a decade by promoting new routing protocols. However, recent researches in DTN should rekindle proposed solutions to support new emerging network-based applications, in which DTN techniques can be used to offer delay tolerant support. Example of these applications domains is Internet of Things (IoT). We survey the use of DTN solutions in IoT applications to overcome connectivity problems considering the opportunities and challenges for each technology. The purpose of this work is to introduce most recent solutions that enable delay tolerant IoT. We propose a taxonomy and discuss advantages and limitations for each study.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134412648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Evaluating Jordanian universities' websites based on data envelopment analysis 基于数据包络分析的约旦大学网站评价
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921964
Hassan M. Najadat, A. Al-Badarneh, Rasha K. Al-Huthaifi, Assia Abo-Zaitoon, Yasmin Al-Omary
Websites of universities have become vital in evaluating universities' performance. These websites may face some weaknesses, including poor design, insecure system, bad performance or usability. There is a limited research work that evaluates the universities' websites performance. In this paper, a new approach is proposed in order to evaluate the Jordanian universities based on data envelopment analysis. The dataset is collected from 23 Jordanian universities' websites by using four tools to extract a set of vital features from each website. We applied data envelopment analysis to provide decision makers of universities a plan to improve the websites. In this paper, the websites' efficiencies are evaluated in three viewpoints including usability, design, and performance. The results of the usability show that 18 websites are usable while 5 websites are not usable, while the results of the design show that only 7 websites have good design. Finally, the websites' performances are classified into efficient or inefficient. The result shows that among 23 universities, there are 4 websites are rated as efficient and 19 sites are rated as inefficient.
大学网站已经成为评价大学绩效的重要手段。这些网站可能面临一些弱点,包括糟糕的设计,不安全的系统,糟糕的性能或可用性。有一个有限的研究工作来评估大学网站的表现。本文提出了一种基于数据包络分析的约旦大学评价方法。数据集是从23所约旦大学的网站上收集的,通过使用四种工具从每个网站中提取一组重要特征。我们运用数据包络分析为高校决策者提供网站改进方案。本文从可用性、设计和性能三个角度对网站的效率进行了评价。可用性结果显示,18个网站可用,5个网站不可用,而设计结果显示,只有7个网站设计良好。最后,将网站的性能分为高效和低效。结果表明,在23所高校中,有4个网站被评为高效网站,19个网站被评为低效网站。
{"title":"Evaluating Jordanian universities' websites based on data envelopment analysis","authors":"Hassan M. Najadat, A. Al-Badarneh, Rasha K. Al-Huthaifi, Assia Abo-Zaitoon, Yasmin Al-Omary","doi":"10.1109/IACS.2017.7921964","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921964","url":null,"abstract":"Websites of universities have become vital in evaluating universities' performance. These websites may face some weaknesses, including poor design, insecure system, bad performance or usability. There is a limited research work that evaluates the universities' websites performance. In this paper, a new approach is proposed in order to evaluate the Jordanian universities based on data envelopment analysis. The dataset is collected from 23 Jordanian universities' websites by using four tools to extract a set of vital features from each website. We applied data envelopment analysis to provide decision makers of universities a plan to improve the websites. In this paper, the websites' efficiencies are evaluated in three viewpoints including usability, design, and performance. The results of the usability show that 18 websites are usable while 5 websites are not usable, while the results of the design show that only 7 websites have good design. Finally, the websites' performances are classified into efficient or inefficient. The result shows that among 23 universities, there are 4 websites are rated as efficient and 19 sites are rated as inefficient.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115925774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Defense against impersonating attackers: An efficient RFID mutual authentication protocol based on standard 防范假冒攻击者:一种基于标准的高效RFID互认证协议
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921977
Shiqi Wang, Linsen Li, Gaosheng Chen, Tao Chen, Zeming Wang
As the RFID based Internet of Things (loT) gets worldwide attention, to prepare for the rapidly increasing applications in daily life, various security protocols are proposed. But, these protocols, most of which are limited by the tag processing capacity and dangerous exposure during transmission, could only be applied in certain fields. Previously, Chen and Deng's mutual authentication and privacy protection protocol which conforming EPC Class 1 Generation 2 Standards stands out for low cost as well as little requirements of the tag processing capacity. However, currently reported by others, this system faces up with severe dangers of tracking or cloning tags via impersonating attacks. After scrutiny, we found out that these vulnerabilities lie in the insufficient protections of random numbers, and we reconstruct the request and response based on the original protocol by making message unrepeatable, key elements secret and adding small storage for comparisons. The security of our protocol, proved by Ban logic analysis, is ensured by double protections — secret key pairs and dynamic random numbers. Our comparisons show that our protocol not only is safe under traditional attacks guaranteed by the original protocol but also overcomes impersonating attacks which represents the inherent weakness of information exposure in public.
随着基于RFID技术的物联网(loT)受到广泛关注,为应对其在日常生活中快速增长的应用,各种安全协议应运而生。但是,这些协议大多受到标签处理能力和传输过程中的危险暴露的限制,只能应用于某些领域。此前,Chen和Deng的相互认证和隐私保护协议符合EPC第1代第2代标准,具有低成本和对标签处理能力要求低的特点。然而,根据其他人的报道,该系统面临着通过模仿攻击跟踪或克隆标签的严重危险。经过仔细审查,我们发现这些漏洞在于对随机数的保护不足,我们在原始协议的基础上重构了请求和响应,使消息不可重复,关键元素保密,并增加了小的存储空间进行比较。通过Ban逻辑分析证明了协议的安全性,该协议采用密钥对和动态随机数双重保护。对比结果表明,我们的协议不仅在原有协议保证的传统攻击下是安全的,而且克服了冒名攻击所代表的信息公开暴露的固有弱点。
{"title":"Defense against impersonating attackers: An efficient RFID mutual authentication protocol based on standard","authors":"Shiqi Wang, Linsen Li, Gaosheng Chen, Tao Chen, Zeming Wang","doi":"10.1109/IACS.2017.7921977","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921977","url":null,"abstract":"As the RFID based Internet of Things (loT) gets worldwide attention, to prepare for the rapidly increasing applications in daily life, various security protocols are proposed. But, these protocols, most of which are limited by the tag processing capacity and dangerous exposure during transmission, could only be applied in certain fields. Previously, Chen and Deng's mutual authentication and privacy protection protocol which conforming EPC Class 1 Generation 2 Standards stands out for low cost as well as little requirements of the tag processing capacity. However, currently reported by others, this system faces up with severe dangers of tracking or cloning tags via impersonating attacks. After scrutiny, we found out that these vulnerabilities lie in the insufficient protections of random numbers, and we reconstruct the request and response based on the original protocol by making message unrepeatable, key elements secret and adding small storage for comparisons. The security of our protocol, proved by Ban logic analysis, is ensured by double protections — secret key pairs and dynamic random numbers. Our comparisons show that our protocol not only is safe under traditional attacks guaranteed by the original protocol but also overcomes impersonating attacks which represents the inherent weakness of information exposure in public.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123760539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Gesture recognition implemented on a personal limited device 手势识别实现在个人有限的设备
Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921966
Benoit Ducray, Sheila Cobourne, K. Mayes, K. Markantonakis
For a biometrics system, one of the principal challenges is to protect the biometric reference template, as if a malicious individual is able to obtain this template, the genuine user would not be able to reuse the biometric for any application. A solution may be to use a new form of authentication based on gesture recognition. This type of authentication has the added advantage that in the case of compromise, the gesture can be changed yet still retain the advantages of the biometric input. In this paper, we investigate whether it is feasible to implement a Gesture Recognition system on a personal limited device such as a smart card. To do this, we set out an experiment using sample gestures based on practical results of gesture authentication trials and an optimised version of Dynamic Time Warping (DTW) algorithm to analyse the data captured. We implemented them on both a contact Smart Card (SC) and the more powerful Samsung Galaxy S4 mobile phone, using Host Card Emulation (HCE). The result of this experiment was that it would take around a minute for the SC and a second for HCE.
对于生物识别系统,主要挑战之一是保护生物识别参考模板,因为如果恶意的个人能够获得该模板,那么真正的用户将无法在任何应用中重复使用生物识别信息。一个解决方案可能是使用一种基于手势识别的新身份验证形式。这种类型的身份验证还有一个额外的优点,即在受到威胁的情况下,可以改变手势,但仍然保留生物识别输入的优点。在本文中,我们研究了在个人有限设备(如智能卡)上实现手势识别系统是否可行。为此,我们根据手势认证试验的实际结果和动态时间扭曲(DTW)算法的优化版本设置了一个实验,使用样本手势来分析捕获的数据。我们使用主机卡仿真(HCE)在接触式智能卡(SC)和更强大的三星Galaxy S4手机上实现了它们。这个实验的结果是,SC大约需要一分钟,HCE需要一秒钟。
{"title":"Gesture recognition implemented on a personal limited device","authors":"Benoit Ducray, Sheila Cobourne, K. Mayes, K. Markantonakis","doi":"10.1109/IACS.2017.7921966","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921966","url":null,"abstract":"For a biometrics system, one of the principal challenges is to protect the biometric reference template, as if a malicious individual is able to obtain this template, the genuine user would not be able to reuse the biometric for any application. A solution may be to use a new form of authentication based on gesture recognition. This type of authentication has the added advantage that in the case of compromise, the gesture can be changed yet still retain the advantages of the biometric input. In this paper, we investigate whether it is feasible to implement a Gesture Recognition system on a personal limited device such as a smart card. To do this, we set out an experiment using sample gestures based on practical results of gesture authentication trials and an optimised version of Dynamic Time Warping (DTW) algorithm to analyse the data captured. We implemented them on both a contact Smart Card (SC) and the more powerful Samsung Galaxy S4 mobile phone, using Host Card Emulation (HCE). The result of this experiment was that it would take around a minute for the SC and a second for HCE.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130859798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 8th International Conference on Information and Communication Systems (ICICS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1