首页 > 最新文献

2012 IEEE International Conference on Intelligence and Security Informatics最新文献

英文 中文
A game theory approach to deception strategy in computer mediated communication 计算机媒介通信中欺骗策略的博弈论研究
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6282258
Hsien-Ming Chou, Lina Zhou
Many computer-based communication media offer visual anonymity. As a result, detecting online deception tends to be more difficult relative to traditional non-mediated communication. The state of the art research on online deception has focused on using linear statistical approaches to identifying behavioral differences between deceivers and truth-tellers. However, deception behaviors are not linear because deceivers may adopt dynamic strategies when they are motivated to succeed, and deceivers could disguise themselves to maximize their payoffs. Given such backdrop, this research is aimed to address deception strategies with a game theory approach. The results of an empirical study with a multi-stage game show that deceivers tend to select different strategies from truth-tellers and deceivers may adjust their strategies to avoid detection. These findings provide significant implications for explaining online deception in the full rationality paradigm.
许多基于计算机的通信媒体提供视觉匿名。因此,相对于传统的非中介通信,检测在线欺骗往往更加困难。关于网络欺骗的最新研究集中在使用线性统计方法来识别欺骗者和诚实者之间的行为差异。然而,欺骗行为并不是线性的,因为欺诈者在获得成功的动机时可能会采取动态策略,并且欺诈者可能会伪装自己以最大化他们的收益。在这样的背景下,本研究旨在用博弈论的方法来研究欺骗策略。一项多阶段博弈的实证研究结果表明,欺骗者倾向于选择与诚实者不同的策略,欺骗者可能会调整策略以避免被发现。这些发现为解释完全理性范式下的网络欺骗行为提供了重要启示。
{"title":"A game theory approach to deception strategy in computer mediated communication","authors":"Hsien-Ming Chou, Lina Zhou","doi":"10.1109/ISI.2012.6282258","DOIUrl":"https://doi.org/10.1109/ISI.2012.6282258","url":null,"abstract":"Many computer-based communication media offer visual anonymity. As a result, detecting online deception tends to be more difficult relative to traditional non-mediated communication. The state of the art research on online deception has focused on using linear statistical approaches to identifying behavioral differences between deceivers and truth-tellers. However, deception behaviors are not linear because deceivers may adopt dynamic strategies when they are motivated to succeed, and deceivers could disguise themselves to maximize their payoffs. Given such backdrop, this research is aimed to address deception strategies with a game theory approach. The results of an empirical study with a multi-stage game show that deceivers tend to select different strategies from truth-tellers and deceivers may adjust their strategies to avoid detection. These findings provide significant implications for explaining online deception in the full rationality paradigm.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"243 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122473533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An active binocular integrated system for intelligent robot vision 一种用于智能机器人视觉的主动双目集成系统
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284090
Yang Song, Xiaolin Zhang
Rescue robots possessing human-like active binocular systems would allow high quality remote control by 3D viewing and stable robot vision. However, this type of system has not been researched thoroughly because it is difficult to control, and there are few accurate integrated eye motion control models. In this paper, we propose an integrated eye motion control system for a rescue robot, which integrates smooth pursuit, saccade, Vestibulo-ocular reflex (VOR) and Optokinetic response (OKR) into a binocular model. To simplify this system, we also include aspects of the human visual system, in which only the saccade command is externally applied, whereas the smooth pursuit, VOR and OKR commands are internally auto-implemented.
救援机器人拥有类似人类的主动双目系统,可以通过3D观看和稳定的机器人视觉实现高质量的远程控制。然而,由于这类系统的控制难度较大,且目前还没有对其进行深入的研究,而且目前还没有准确的眼动综合控制模型。本文提出了一种救援机器人眼动综合控制系统,该系统将平滑追踪、眼跳、前庭眼反射(VOR)和光动力学反应(OKR)等功能集成到双目模型中。为了简化这个系统,我们还包括了人类视觉系统的一些方面,其中只有眼跳命令是外部应用的,而平滑追踪、VOR和OKR命令是内部自动实现的。
{"title":"An active binocular integrated system for intelligent robot vision","authors":"Yang Song, Xiaolin Zhang","doi":"10.1109/ISI.2012.6284090","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284090","url":null,"abstract":"Rescue robots possessing human-like active binocular systems would allow high quality remote control by 3D viewing and stable robot vision. However, this type of system has not been researched thoroughly because it is difficult to control, and there are few accurate integrated eye motion control models. In this paper, we propose an integrated eye motion control system for a rescue robot, which integrates smooth pursuit, saccade, Vestibulo-ocular reflex (VOR) and Optokinetic response (OKR) into a binocular model. To simplify this system, we also include aspects of the human visual system, in which only the saccade command is externally applied, whereas the smooth pursuit, VOR and OKR commands are internally auto-implemented.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121644585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Acquiring netizen group's opinions for modeling food safety events 获取网友群体对食品安全事件建模的意见
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284102
Zhangwen Tan, W. Mao, D. Zeng, Xiaochen Li, Xiuguo Bao
Food safety events are typical public security events that draw great public concern. In food safety events, millions of netizens pay close attention to the event, express their opinions online and thus influence the decisions of government or food producers. Modeling netizen groups, especially the dynamics of their opinions in these events, can help us understand the mechanism and evolvement of such events and provide valuable insights for social management. However, conventional computational models, such as agent-based models, are usually constructed manually. In this paper, we propose an approach to acquiring netizen group's opinions from online comments to facilitate the modeling of food safety events. We conduct experimental study on typical events happened in China and empirically evaluate the performance of our proposed approach. The results verify the effectiveness of the approach.
食品安全事件是社会普遍关注的典型公共安全事件。在食品安全事件中,数以百万计的网民密切关注事件,在网上表达自己的意见,从而影响政府或食品生产者的决策。对网民群体进行建模,特别是对这些事件中网民群体的意见动态进行建模,可以帮助我们了解这些事件的发生机制和演变过程,为社会管理提供有价值的见解。然而,传统的计算模型,如基于智能体的模型,通常是手工构建的。本文提出了一种从网络评论中获取网民群体意见的方法,以方便食品安全事件的建模。我们对中国发生的典型事件进行了实验研究,并对我们提出的方法的性能进行了实证评估。结果验证了该方法的有效性。
{"title":"Acquiring netizen group's opinions for modeling food safety events","authors":"Zhangwen Tan, W. Mao, D. Zeng, Xiaochen Li, Xiuguo Bao","doi":"10.1109/ISI.2012.6284102","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284102","url":null,"abstract":"Food safety events are typical public security events that draw great public concern. In food safety events, millions of netizens pay close attention to the event, express their opinions online and thus influence the decisions of government or food producers. Modeling netizen groups, especially the dynamics of their opinions in these events, can help us understand the mechanism and evolvement of such events and provide valuable insights for social management. However, conventional computational models, such as agent-based models, are usually constructed manually. In this paper, we propose an approach to acquiring netizen group's opinions from online comments to facilitate the modeling of food safety events. We conduct experimental study on typical events happened in China and empirically evaluate the performance of our proposed approach. The results verify the effectiveness of the approach.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133346059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Predictive defense against evolving adversaries 针对不断演变的对手的预测性防御
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6283222
R. Colbaugh, K. Glass
Adaptive adversaries are a primary concern in several domains, including cyber defense, border security, counterterrorism, and fraud prevention, and consequently there is great interest in developing defenses that maintain their effectiveness in the presence of evolving adversary strategies and tactics. This paper leverages the coevolutionary relationship between attackers and defenders to derive two new approaches to predictive defense, in which future attack techniques are anticipated and these insights are incorporated into defense designs. The first method combines game theory with machine learning to model and predict future adversary actions in the learner's “feature space”; these predictions form the basis for synthesizing robust defenses. The second approach to predictive defense involves extrapolating the evolution of defense configurations forward in time, in the space of defense parameterizations, as a way of generating defenses which work well against evolving threats. Case studies with a large cyber security dataset assembled for this investigation demonstrate that each method provides effective, scalable defense against current and future attacks, outperforming gold-standard techniques. Additionally, preliminary tests indicate that a simple variant of the proposed design methodology yields defenses which are difficult for adversaries to reverse-engineer.
适应性对手是几个领域的主要关注点,包括网络防御、边境安全、反恐和欺诈预防,因此,开发在不断发展的对手战略和战术面前保持其有效性的防御非常有兴趣。本文利用攻击者和防御者之间的共同进化关系,推导出两种预测防御的新方法,其中预测了未来的攻击技术,并将这些见解纳入防御设计。第一种方法将博弈论与机器学习结合起来,在学习者的“特征空间”中建模和预测未来对手的行动;这些预测构成了合成强大防御的基础。预测防御的第二种方法包括在防御参数化的空间中及时向前推断防御配置的演变,作为一种生成防御的方法,可以很好地应对不断变化的威胁。为本调查收集的大型网络安全数据集的案例研究表明,每种方法都能有效、可扩展地防御当前和未来的攻击,优于黄金标准技术。此外,初步测试表明,所提出的设计方法的一个简单变体产生了防御,对手很难对其进行逆向工程。
{"title":"Predictive defense against evolving adversaries","authors":"R. Colbaugh, K. Glass","doi":"10.1109/ISI.2012.6283222","DOIUrl":"https://doi.org/10.1109/ISI.2012.6283222","url":null,"abstract":"Adaptive adversaries are a primary concern in several domains, including cyber defense, border security, counterterrorism, and fraud prevention, and consequently there is great interest in developing defenses that maintain their effectiveness in the presence of evolving adversary strategies and tactics. This paper leverages the coevolutionary relationship between attackers and defenders to derive two new approaches to predictive defense, in which future attack techniques are anticipated and these insights are incorporated into defense designs. The first method combines game theory with machine learning to model and predict future adversary actions in the learner's “feature space”; these predictions form the basis for synthesizing robust defenses. The second approach to predictive defense involves extrapolating the evolution of defense configurations forward in time, in the space of defense parameterizations, as a way of generating defenses which work well against evolving threats. Case studies with a large cyber security dataset assembled for this investigation demonstrate that each method provides effective, scalable defense against current and future attacks, outperforming gold-standard techniques. Additionally, preliminary tests indicate that a simple variant of the proposed design methodology yields defenses which are difficult for adversaries to reverse-engineer.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133871754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Detecting criminal networks: SNA models are compared to proprietary models 检测犯罪网络:将SNA模型与专有模型进行比较
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284278
Fatih Özgül, Murat Gök, Z. Erdem, Yakup Ozal
Criminal networks have been an area of interest for Public Safety and Intelligence Community as well as social network analysis and data mining community. Existing literature shows that offender demographics and crime features are not taken into account to identify their possible links to find out criminal networks. Four crime data specific proprietary group detection models (GDM, OGDM, SoDM, and ComDM) have been developed based on these crime data features. These specific criminal network detection models are compared more common baseline SNA group detection algorithms. It is intended to find out, whether these four crime data specific group detection models can perform better than widely used k-cores and n-clique algorithms. Two datasets which contain various real criminal networks are used as experimental testbeds.
犯罪网络一直是公共安全和情报界以及社会网络分析和数据挖掘界感兴趣的领域。现有的文献表明,罪犯的人口统计和犯罪特征没有被考虑到识别他们可能的联系,以发现犯罪网络。基于这些犯罪数据特征,开发了四种特定于犯罪数据的专有群体检测模型(GDM、OGDM、SoDM和ComDM)。这些具体的犯罪网络检测模型比较了比较常见的基线SNA群检测算法。目的是找出这四种犯罪数据特定群体检测模型是否比广泛使用的k-cores和n-clique算法表现更好。两个包含各种真实犯罪网络的数据集被用作实验平台。
{"title":"Detecting criminal networks: SNA models are compared to proprietary models","authors":"Fatih Özgül, Murat Gök, Z. Erdem, Yakup Ozal","doi":"10.1109/ISI.2012.6284278","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284278","url":null,"abstract":"Criminal networks have been an area of interest for Public Safety and Intelligence Community as well as social network analysis and data mining community. Existing literature shows that offender demographics and crime features are not taken into account to identify their possible links to find out criminal networks. Four crime data specific proprietary group detection models (GDM, OGDM, SoDM, and ComDM) have been developed based on these crime data features. These specific criminal network detection models are compared more common baseline SNA group detection algorithms. It is intended to find out, whether these four crime data specific group detection models can perform better than widely used k-cores and n-clique algorithms. Two datasets which contain various real criminal networks are used as experimental testbeds.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"52 13","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113970241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Outlier detection using semantic sensors 使用语义传感器的异常值检测
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284089
D. Skillicorn
We describe a technique that calculates the expected relationships among attributes from training data, and uses this to generate anomaly scores reflecting the intuition that a record with anomalous values for related attributes is more anomalous than one with anomalous values for unrelated attributes. The expected relations among attributes are calculated in two ways: using a data-dependent projection via singular value decomposition, and using the maximal information coefficient. Sufficiently anomalous records are displayed on a sensor dashboard, making it possible for an analyst to judge why each record has been classified as anomalous. The technique is illustrated for an intrusion detection dataset, and a set of contract descriptors.
我们描述了一种从训练数据中计算属性之间的预期关系的技术,并使用它来生成异常分数,反映了相关属性的异常值的记录比不相关属性的异常值的记录更异常的直觉。通过奇异值分解的数据依赖投影和最大信息系数两种方法计算属性之间的期望关系。在传感器仪表板上显示足够多的异常记录,使分析人员能够判断为什么每个记录被归类为异常。该技术用于入侵检测数据集和一组契约描述符。
{"title":"Outlier detection using semantic sensors","authors":"D. Skillicorn","doi":"10.1109/ISI.2012.6284089","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284089","url":null,"abstract":"We describe a technique that calculates the expected relationships among attributes from training data, and uses this to generate anomaly scores reflecting the intuition that a record with anomalous values for related attributes is more anomalous than one with anomalous values for unrelated attributes. The expected relations among attributes are calculated in two ways: using a data-dependent projection via singular value decomposition, and using the maximal information coefficient. Sufficiently anomalous records are displayed on a sensor dashboard, making it possible for an analyst to judge why each record has been classified as anomalous. The technique is illustrated for an intrusion detection dataset, and a set of contract descriptors.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125141149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An event-driven SIR model for topic diffusion in web forums 网络论坛主题扩散的事件驱动SIR模型
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284101
Jiyoung Woo, Hsinchun Chen
Social media is being increasingly used as a communication channel. Among social media, web forums, where people in online communities disseminate and receive information by interaction, provide a good environment to examine information diffusion. In this research, we aim to understand the mechanisms and properties of the information diffusion in the web forum. For that, we model topic-level information diffusion in web forums using the baseline epidemic model, the SIR(Susceptible, Infective, and Recovered) model, frequently used in previous research to analyze disease outbreaks and knowledge diffusion. In addition, we propose an event-driven SIR model that reflects the event effect on information diffusion in the web forum. The proposed model incorporates the effect of news postings on the web forum. We evaluate two models using a large longitudinal dataset from the web forum of a major company. The event-SIR model outperforms the SIR model in fitting on major spikey topics that have peaks of author participation.
社交媒体正越来越多地被用作一种沟通渠道。在社交媒体中,网络论坛是网络社区中人们通过互动传播和接收信息的场所,为研究信息扩散提供了良好的环境。在本研究中,我们旨在了解网络论坛中信息扩散的机制和特性。为此,我们使用基线流行病模型SIR(易感、感染和恢复)模型对网络论坛中的主题级信息传播进行建模,SIR(易感、感染和恢复)模型在以前的研究中经常用于分析疾病爆发和知识传播。此外,我们提出了一个事件驱动的SIR模型,该模型反映了事件对网络论坛中信息扩散的影响。该模型考虑了网络论坛上新闻帖子的影响。我们使用来自一家大公司网络论坛的大型纵向数据集来评估两个模型。事件-SIR模型在拟合具有作者参与高峰的主要尖峰主题方面优于SIR模型。
{"title":"An event-driven SIR model for topic diffusion in web forums","authors":"Jiyoung Woo, Hsinchun Chen","doi":"10.1109/ISI.2012.6284101","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284101","url":null,"abstract":"Social media is being increasingly used as a communication channel. Among social media, web forums, where people in online communities disseminate and receive information by interaction, provide a good environment to examine information diffusion. In this research, we aim to understand the mechanisms and properties of the information diffusion in the web forum. For that, we model topic-level information diffusion in web forums using the baseline epidemic model, the SIR(Susceptible, Infective, and Recovered) model, frequently used in previous research to analyze disease outbreaks and knowledge diffusion. In addition, we propose an event-driven SIR model that reflects the event effect on information diffusion in the web forum. The proposed model incorporates the effect of news postings on the web forum. We evaluate two models using a large longitudinal dataset from the web forum of a major company. The event-SIR model outperforms the SIR model in fitting on major spikey topics that have peaks of author participation.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125979762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Graph search beyond text: Relational searches in semantic hyperlinked data 超越文本的图形搜索:语义超链接数据中的关系搜索
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284276
M. Goldberg, J. Greenman, B. Gutting, M. Magdon-Ismail, J. Schwartz, W. Wallace
We present novel indexing and searching schemes for semantic graphs based on the notion of the i.degrees of a node. The i.degrees allow searches performed on the graph to use “type” and connection information, rather than textual labels, to identify nodes. We aim to identify a network graph (fragment) within a large semantic graph (database). A fragment may represent incomplete information that a researcher has collected on a sub-network of interest. While textual labels might be available, they are highly unreliable, and cannot be used for identification of hidden networks. Since this problem comes from the classically NP-hard problem of identifying isomorphic subgraphs, our algorithms are heuristic.
我们提出了一种基于节点i度概念的语义图索引和搜索方案。i度允许在图上执行的搜索使用“类型”和连接信息,而不是文本标签来识别节点。我们的目标是在一个大型语义图(数据库)中识别一个网络图(片段)。片段可能表示研究人员在感兴趣的子网络上收集的不完整信息。虽然文本标签可能可用,但它们非常不可靠,不能用于识别隐藏网络。由于这个问题来自于识别同构子图的经典np困难问题,因此我们的算法是启发式的。
{"title":"Graph search beyond text: Relational searches in semantic hyperlinked data","authors":"M. Goldberg, J. Greenman, B. Gutting, M. Magdon-Ismail, J. Schwartz, W. Wallace","doi":"10.1109/ISI.2012.6284276","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284276","url":null,"abstract":"We present novel indexing and searching schemes for semantic graphs based on the notion of the i.degrees of a node. The i.degrees allow searches performed on the graph to use “type” and connection information, rather than textual labels, to identify nodes. We aim to identify a network graph (fragment) within a large semantic graph (database). A fragment may represent incomplete information that a researcher has collected on a sub-network of interest. While textual labels might be available, they are highly unreliable, and cannot be used for identification of hidden networks. Since this problem comes from the classically NP-hard problem of identifying isomorphic subgraphs, our algorithms are heuristic.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126612299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Leveraging sociological models for prediction II: Early warning for complex contagions 利用社会学模型进行预测II:复杂传染病的早期预警
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284094
R. Colbaugh, K. Glass
There is considerable interest in developing techniques for predicting human behavior, and a promising approach to this problem is to collect phenomenon-relevant empirical data and then apply machine learning methods to these data to form predictions. This two-part paper shows that the performance of such learning algorithms often can be improved substantially by leveraging sociological models in their development and implementation. In this paper, the second of the two parts, we demonstrate that a sociologically-grounded learning algorithm outperforms a gold-standard method for the task of predicting whether nascent social diffusion events will “go viral”. Significantly, the proposed algorithm performs well even when there is only limited time series data available for analysis.
人们对开发预测人类行为的技术非常感兴趣,而解决这个问题的一个有前途的方法是收集与现象相关的经验数据,然后将机器学习方法应用于这些数据以形成预测。这篇由两部分组成的论文表明,这种学习算法的性能通常可以通过在其开发和实施中利用社会学模型来大幅提高。在本文(两部分中的第二部分)中,我们证明了基于社会学的学习算法在预测新生社会扩散事件是否会“病毒式传播”的任务方面优于金标准方法。值得注意的是,即使只有有限的时间序列数据可供分析,该算法也表现良好。
{"title":"Leveraging sociological models for prediction II: Early warning for complex contagions","authors":"R. Colbaugh, K. Glass","doi":"10.1109/ISI.2012.6284094","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284094","url":null,"abstract":"There is considerable interest in developing techniques for predicting human behavior, and a promising approach to this problem is to collect phenomenon-relevant empirical data and then apply machine learning methods to these data to form predictions. This two-part paper shows that the performance of such learning algorithms often can be improved substantially by leveraging sociological models in their development and implementation. In this paper, the second of the two parts, we demonstrate that a sociologically-grounded learning algorithm outperforms a gold-standard method for the task of predicting whether nascent social diffusion events will “go viral”. Significantly, the proposed algorithm performs well even when there is only limited time series data available for analysis.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127850672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Exploratory experiments to identify fake websites by using features from the network stack 探索性实验,通过使用网络堆栈的特征来识别虚假网站
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284144
J. Koepke, S. Kaza, A. Abbasi
Users on the web are unknowingly becoming more susceptible to scams from cyber deviants and malicious websites. There has been much work in the identification of malicious websites using application layer features based on content (HTML, images, links, etc.) and a plethora of classification techniques. However, there has been little work on using features from the other layers in the Open Systems Interconnection (OSI) network stack. Capturing features from the transport and internet layers of the network stack based on responses to various Hypertext Transfer Protocol (HTTP) requests may allow for increased classification accuracy. In this paper, we use learning techniques (Winnow, Logit Regression, Naïve Bayes, J48, and Bayesian) utilizing these new features to identify fake pharmacy websites. The results show that using transport and Internet layer features yields an accuracy of 80% to 95% for detecting fake websites using standard machine learning algorithms. The results suggest that many organizations may be hosting multiple websites using shared code and hosting services to enable them to produce the maximum number of fraudulent websites.
网络用户在不知不觉中变得更容易受到网络变态和恶意网站的欺骗。在使用基于内容(HTML、图像、链接等)的应用层特征和大量分类技术来识别恶意网站方面已经做了很多工作。然而,在使用开放系统互连(OSI)网络堆栈中其他层的特性方面,很少有工作。基于对各种超文本传输协议(Hypertext Transfer Protocol, HTTP)请求的响应,从网络堆栈的传输层和互联网层捕获特性,可以提高分类的准确性。在本文中,我们使用学习技术(Winnow, Logit Regression, Naïve贝叶斯,J48和贝叶斯)利用这些新特征来识别假冒药店网站。结果表明,使用传输和互联网层特征,使用标准机器学习算法检测虚假网站的准确率为80%至95%。结果表明,许多组织可能使用共享代码和托管服务托管多个网站,使他们能够产生最大数量的欺诈性网站。
{"title":"Exploratory experiments to identify fake websites by using features from the network stack","authors":"J. Koepke, S. Kaza, A. Abbasi","doi":"10.1109/ISI.2012.6284144","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284144","url":null,"abstract":"Users on the web are unknowingly becoming more susceptible to scams from cyber deviants and malicious websites. There has been much work in the identification of malicious websites using application layer features based on content (HTML, images, links, etc.) and a plethora of classification techniques. However, there has been little work on using features from the other layers in the Open Systems Interconnection (OSI) network stack. Capturing features from the transport and internet layers of the network stack based on responses to various Hypertext Transfer Protocol (HTTP) requests may allow for increased classification accuracy. In this paper, we use learning techniques (Winnow, Logit Regression, Naïve Bayes, J48, and Bayesian) utilizing these new features to identify fake pharmacy websites. The results show that using transport and Internet layer features yields an accuracy of 80% to 95% for detecting fake websites using standard machine learning algorithms. The results suggest that many organizations may be hosting multiple websites using shared code and hosting services to enable them to produce the maximum number of fraudulent websites.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131818694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2012 IEEE International Conference on Intelligence and Security Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1