首页 > 最新文献

2009 IEEE International Conference on Intelligence and Security Informatics最新文献

英文 中文
Topic-based web page recommendation using tags 基于主题的网页推荐使用标签
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137324
Jing Peng, D. Zeng
Collaborative tagging sites allow users to save and annotate their favorite web contents with tags. These tags provide a novel source of information for collaborative filtering. This paper proposes a probabilistic approach to leverage information embedded in tags to improve the effectiveness of Web page recommendation in a social information management context. In our approach, the probability of a Web page visit by a user is estimated by summing up the relevance of this Web page to this user's tags, and then those pages with the highest probabilities are recommended. Experiments using two real-world collaborative tagging datasets show that our algorithms outperform the common collaborative filtering methods.
协作标签网站允许用户用标签保存和注释他们喜欢的网页内容。这些标签为协同过滤提供了一种新的信息源。本文提出了一种概率方法,利用嵌入在标签中的信息来提高社交信息管理环境下网页推荐的有效性。在我们的方法中,通过汇总该Web页面与该用户标记的相关性来估计用户访问Web页面的概率,然后推荐那些具有最高概率的页面。使用两个真实协作标记数据集的实验表明,我们的算法优于常见的协同过滤方法。
{"title":"Topic-based web page recommendation using tags","authors":"Jing Peng, D. Zeng","doi":"10.1109/ISI.2009.5137324","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137324","url":null,"abstract":"Collaborative tagging sites allow users to save and annotate their favorite web contents with tags. These tags provide a novel source of information for collaborative filtering. This paper proposes a probabilistic approach to leverage information embedded in tags to improve the effectiveness of Web page recommendation in a social information management context. In our approach, the probability of a Web page visit by a user is estimated by summing up the relevance of this Web page to this user's tags, and then those pages with the highest probabilities are recommended. Experiments using two real-world collaborative tagging datasets show that our algorithms outperform the common collaborative filtering methods.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124416142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Applying graph-based anomaly detection approaches to the discovery of insider threats 应用基于图的异常检测方法来发现内部威胁
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137304
W. Eberle, L. Holder
The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly detection, but little work has been done in terms of detecting anomalies in graph-based data. In this paper we present graph-based approaches to uncovering anomalies in applications containing information representing possible insider threat activity: e-mail, cell-phone calls, and order processing.
挖掘以图表示的数据的能力在检测各种结构模式的几个领域中变得非常重要。数据挖掘的一个重要领域是异常检测,但在基于图的数据中检测异常方面做的工作很少。在本文中,我们提出了基于图的方法来发现应用程序中的异常,这些应用程序包含代表可能的内部威胁活动的信息:电子邮件、手机呼叫和订单处理。
{"title":"Applying graph-based anomaly detection approaches to the discovery of insider threats","authors":"W. Eberle, L. Holder","doi":"10.1109/ISI.2009.5137304","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137304","url":null,"abstract":"The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly detection, but little work has been done in terms of detecting anomalies in graph-based data. In this paper we present graph-based approaches to uncovering anomalies in applications containing information representing possible insider threat activity: e-mail, cell-phone calls, and order processing.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126348219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
PerpSearch: An integrated crime detection system PerpSearch:综合罪案侦查系统
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137289
Li Ding, D. Steil, M. Hudnall, B. Dixon, Randy K. Smith, David Brown, A. Parrish
Information technologies such as data mining and social network analysis have been widely used in law enforcement to solve crimes. Recent research indicates that geographic profiling also plays an important role in facilitating the investigation of crimes. However, lack of integration makes those systems less helpful in practice. In this paper, we propose an integrated system called PerpSearch that will take a given description of a crime, including its location, type, and the physical description of suspects (personal characteristics or vehicles) as input. To detect suspects, the system will process these inputs through four integrated components: geographic profiling, social network analysis, crime patterns, and physical matching. Essentially, geographic profiling determines “where” the suspects are, while other components determine “who” the suspects are. We then process the results using a score engine to give investigators a ranked list of individuals. To date, we have implemented a prototype of the system based on current Alabama law enforcement data.
数据挖掘和社会网络分析等信息技术已广泛应用于执法部门破案。最近的研究表明,地理侧写在促进犯罪调查方面也起着重要作用。然而,缺乏整合使得这些系统在实践中没有多大帮助。在本文中,我们提出了一个称为PerpSearch的集成系统,该系统将对犯罪的给定描述,包括其位置,类型和嫌疑人的物理描述(个人特征或车辆)作为输入。为了检测嫌疑人,该系统将通过四个集成组件处理这些输入:地理特征分析、社会网络分析、犯罪模式和物理匹配。从本质上讲,地理侧写决定了嫌疑人的“位置”,而其他组件决定了嫌疑人是“谁”。然后,我们使用分数引擎处理结果,为调查人员提供个人排名列表。到目前为止,我们已经实现了基于当前阿拉巴马州执法数据的系统原型。
{"title":"PerpSearch: An integrated crime detection system","authors":"Li Ding, D. Steil, M. Hudnall, B. Dixon, Randy K. Smith, David Brown, A. Parrish","doi":"10.1109/ISI.2009.5137289","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137289","url":null,"abstract":"Information technologies such as data mining and social network analysis have been widely used in law enforcement to solve crimes. Recent research indicates that geographic profiling also plays an important role in facilitating the investigation of crimes. However, lack of integration makes those systems less helpful in practice. In this paper, we propose an integrated system called PerpSearch that will take a given description of a crime, including its location, type, and the physical description of suspects (personal characteristics or vehicles) as input. To detect suspects, the system will process these inputs through four integrated components: geographic profiling, social network analysis, crime patterns, and physical matching. Essentially, geographic profiling determines “where” the suspects are, while other components determine “who” the suspects are. We then process the results using a score engine to give investigators a ranked list of individuals. To date, we have implemented a prototype of the system based on current Alabama law enforcement data.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127385739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Traffic and security analysis on Sony Playstation 3 索尼Playstation 3的流量和安全分析
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137325
Michael Perelman, Ping Ji, Weifeng Chen
Online games are clearly growing as a significant component of the current and future Internet. As a major online game console, the Sony PlayStation 3 (PS3) produces more and more network traffic. People also begin to use PS3 for emails and web surfing besides playing games due to its enhanced web capabilities. Recognizing the traffic patterns of PS3 is important to network administrators whereas understanding its security is essential for users. However, traffic and security analysis of PS3 has been either done or unpublished. In this paper, we present our initial efforts on game traffic analysis for PS3 and explore the vulnerabilities of PS3 by testing a few attacking schemes on a PS3 console. The research will benefit both network administrators and PS3 users to understand the PS3 systems better.
网络游戏显然正在成为当前和未来互联网的重要组成部分。作为主要的在线游戏主机,索尼PlayStation 3 (PS3)产生了越来越多的网络流量。由于其增强的网络功能,除了玩游戏外,人们还开始使用PS3发电子邮件和上网。认识PS3的流量模式对于网络管理员很重要,而了解其安全性对于用户则至关重要。但是,PS3的流量和安全性分析已经完成或未发布。在本文中,我们介绍了针对PS3的游戏流量分析的初步工作,并通过在PS3主机上测试几种攻击方案来探索PS3的漏洞。这项研究将有利于网络管理员和PS3用户更好地理解PS3系统。
{"title":"Traffic and security analysis on Sony Playstation 3","authors":"Michael Perelman, Ping Ji, Weifeng Chen","doi":"10.1109/ISI.2009.5137325","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137325","url":null,"abstract":"Online games are clearly growing as a significant component of the current and future Internet. As a major online game console, the Sony PlayStation 3 (PS3) produces more and more network traffic. People also begin to use PS3 for emails and web surfing besides playing games due to its enhanced web capabilities. Recognizing the traffic patterns of PS3 is important to network administrators whereas understanding its security is essential for users. However, traffic and security analysis of PS3 has been either done or unpublished. In this paper, we present our initial efforts on game traffic analysis for PS3 and explore the vulnerabilities of PS3 by testing a few attacking schemes on a PS3 console. The research will benefit both network administrators and PS3 users to understand the PS3 systems better.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128229663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unifying strategies and tactics: A survivability framework for countering cyber attacks 统一战略和战术:应对网络攻击的生存能力框架
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137282
Yanjun Zuo, B. Panda
This paper presents a framework to enhance a system's survivability to thwart malicious attacks and to continuously provide critical services to users. We focus on two key survivability elements: strategy and tactic. The latter further includes a set of activities and operations. We show how survivability activities are developed in light of tactics to implement the chosen survivability strategies in face of malicious attacks. An example of military command and control system is presented, where a set of survivability activities are specified to carry out two strategies: dynamic system reconfiguration and transparent system repairs. An architectural model is proposed to facilitate system design in building survivable systems.
本文提出了一个框架,以提高系统的生存能力,以阻止恶意攻击,并持续为用户提供关键服务。我们专注于两个关键的生存要素:战略和战术。后者还包括一系列活动和业务。我们展示了在面对恶意攻击时如何根据战术来实施所选择的生存策略来开发生存能力活动。以军事指挥控制系统为例,提出了一组生存能力活动,以实现两种策略:动态系统重构和透明系统修复。提出了一种便于构建可生存系统的体系结构模型。
{"title":"Unifying strategies and tactics: A survivability framework for countering cyber attacks","authors":"Yanjun Zuo, B. Panda","doi":"10.1109/ISI.2009.5137282","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137282","url":null,"abstract":"This paper presents a framework to enhance a system's survivability to thwart malicious attacks and to continuously provide critical services to users. We focus on two key survivability elements: strategy and tactic. The latter further includes a set of activities and operations. We show how survivability activities are developed in light of tactics to implement the chosen survivability strategies in face of malicious attacks. An example of military command and control system is presented, where a set of survivability activities are specified to carry out two strategies: dynamic system reconfiguration and transparent system repairs. An architectural model is proposed to facilitate system design in building survivable systems.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127274136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Building Social Networks in Persistent Video Surveillance 在持续视频监控中构建社会网络
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137307
Daniel T. Schmitt, S. Kurkowski, M. Mendenhall
Social networks are a beneficial analysis tool in counterterrorism and counterinsurgent activities. The difficulty lies in the amount of time and resources it takes to construct a social network. By exploiting existing 24-hour overhead persistent video, we can build a social network from vehicle to vehicle and vehicle to building interactions. This paper demonstrates building a social network from vehicle tracks based on their interactions in an urban environment. From this social network we can see relationships among actors and their locations of interest. This information provides additional intelligence about terrorist activities to exploit them.
在反恐和反叛乱活动中,社交网络是一种有益的分析工具。困难在于构建社交网络需要花费大量的时间和资源。通过利用现有的24小时头顶持续视频,我们可以建立一个从车辆到车辆以及车辆到建筑物互动的社交网络。本文演示了基于车辆轨迹在城市环境中的相互作用来构建一个社会网络。从这个社交网络中,我们可以看到演员之间的关系和他们感兴趣的地点。这些信息提供了关于恐怖主义活动的额外情报,以便利用它们。
{"title":"Building Social Networks in Persistent Video Surveillance","authors":"Daniel T. Schmitt, S. Kurkowski, M. Mendenhall","doi":"10.1109/ISI.2009.5137307","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137307","url":null,"abstract":"Social networks are a beneficial analysis tool in counterterrorism and counterinsurgent activities. The difficulty lies in the amount of time and resources it takes to construct a social network. By exploiting existing 24-hour overhead persistent video, we can build a social network from vehicle to vehicle and vehicle to building interactions. This paper demonstrates building a social network from vehicle tracks based on their interactions in an urban environment. From this social network we can see relationships among actors and their locations of interest. This information provides additional intelligence about terrorist activities to exploit them.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132051038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dark web forums portal: Searching and analyzing jihadist forums 暗网论坛门户:搜索和分析圣战论坛
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137274
Yulei Zhang, Shuo Zeng, Li Fan, Yan Dang, Catherine A. Larson, Hsinchun Chen
With the advent of Web 2.0, the Web is acting as a platform which enables end-user content generation. As a major type of social media in Web 2.0, Web forums facilitate intensive interactions among participants. International Jihadist groups often use Web forums to promote violence and distribute propaganda materials. These Dark Web forums are heterogeneous and widely distributed. Therefore, how to access and analyze the forum messages and interactions among participants is becoming an issue. This paper presents a general framework for Web forum data integration. Specifically, a Web-based knowledge portal, the Dark Web Forums Portal, is built based on the framework. The portal incorporates the data collected from different international Jihadist forums and provides several important analysis functions, including forum browsing and searching (in single forum and across multiple forums), forum statistics analysis, multilingual translation, and social network visualization. Preliminary results of our user study show that the Dark Web Forums Portal helps users locate information quickly and effectively. Users found the forum statistics analysis, multilingual translation, and social network visualization functions of the portal to be particularly valuable.
随着Web 2.0的出现,Web正在充当一个支持最终用户生成内容的平台。作为Web 2.0社会媒体的主要类型,Web论坛促进了参与者之间的密集互动。国际圣战组织经常利用网络论坛宣传暴力和分发宣传材料。这些暗网论坛种类繁多,分布广泛。因此,如何访问和分析论坛信息以及参与者之间的互动成为一个问题。本文提出了一个Web论坛数据集成的通用框架。具体来说,一个基于Web的知识门户,暗网论坛门户,是基于该框架建立的。该门户网站整合了从不同的国际圣战论坛收集的数据,并提供了几个重要的分析功能,包括论坛浏览和搜索(在单个论坛和跨多个论坛)、论坛统计分析、多语言翻译和社交网络可视化。我们用户研究的初步结果表明,暗网论坛门户网站可以帮助用户快速有效地定位信息。用户发现该门户网站的论坛统计分析、多语种翻译和社交网络可视化功能特别有价值。
{"title":"Dark web forums portal: Searching and analyzing jihadist forums","authors":"Yulei Zhang, Shuo Zeng, Li Fan, Yan Dang, Catherine A. Larson, Hsinchun Chen","doi":"10.1109/ISI.2009.5137274","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137274","url":null,"abstract":"With the advent of Web 2.0, the Web is acting as a platform which enables end-user content generation. As a major type of social media in Web 2.0, Web forums facilitate intensive interactions among participants. International Jihadist groups often use Web forums to promote violence and distribute propaganda materials. These Dark Web forums are heterogeneous and widely distributed. Therefore, how to access and analyze the forum messages and interactions among participants is becoming an issue. This paper presents a general framework for Web forum data integration. Specifically, a Web-based knowledge portal, the Dark Web Forums Portal, is built based on the framework. The portal incorporates the data collected from different international Jihadist forums and provides several important analysis functions, including forum browsing and searching (in single forum and across multiple forums), forum statistics analysis, multilingual translation, and social network visualization. Preliminary results of our user study show that the Dark Web Forums Portal helps users locate information quickly and effectively. Users found the forum statistics analysis, multilingual translation, and social network visualization functions of the portal to be particularly valuable.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131002275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Voronoi representation for areal data processing in data-rich environments 在数据丰富的环境中进行实际数据处理的Voronoi表示
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137291
D. Breitkreutz, Ickjai Lee
Privacy and data explosion issues are major concerns in intelligence and security informatics. An areal data representation is a popular way to overcome these two issues. As data grows at an unprecedented rate, there still needs an improvement in area data representations to be more scalable. This paper determines the potential for an alternative areal representation that can offer performance benefits over traditional methods for use within data-rich environments. From the experiments performed, improvements are promising, especially within time-critical applications that need to consider large amounts of data quickly.
隐私和数据爆炸问题是情报和安全信息学的主要关注点。实景数据表示是克服这两个问题的常用方法。随着数据以前所未有的速度增长,区域数据表示仍然需要改进,以提高可扩展性。本文确定了在数据丰富的环境中使用一种可以提供优于传统方法的替代区域表示的潜力。从所进行的实验来看,改进是有希望的,特别是在需要快速考虑大量数据的时间关键应用程序中。
{"title":"Voronoi representation for areal data processing in data-rich environments","authors":"D. Breitkreutz, Ickjai Lee","doi":"10.1109/ISI.2009.5137291","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137291","url":null,"abstract":"Privacy and data explosion issues are major concerns in intelligence and security informatics. An areal data representation is a popular way to overcome these two issues. As data grows at an unprecedented rate, there still needs an improvement in area data representations to be more scalable. This paper determines the potential for an alternative areal representation that can offer performance benefits over traditional methods for use within data-rich environments. From the experiments performed, improvements are promising, especially within time-critical applications that need to consider large amounts of data quickly.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132381115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A natural language interface for crime-related spatial queries 用于犯罪相关空间查询的自然语言界面
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137290
Chengyang Zhang, Y. Huang, Rada Mihalcea, Hector Cuellar
Web-based mapping applications such as Google Maps or Virtual Earth have become increasingly popular. However, current map search is still keyword-based and supports a limited number of spatial predicates. In this paper, we build towards a natural language query interface to spatial databases to answer crime-related spatial queries. The system has two main advantages compared with interfaces such as Google Maps: (1) It allows query conditions to be expressed in natural language, and (2) It supports a larger number of spatial predicates, such as “within 3 miles” and “close to”. The system is evaluated using a set of crime-related queries run against a dataset that contains many spatial layers in the Denton, Texas area. The results show that our approach significantly outperforms Google Maps when processing complicated spatial queries.
基于网络的地图应用程序,如谷歌地图或虚拟地球已经变得越来越流行。然而,当前的地图搜索仍然是基于关键字的,并且支持有限数量的空间谓词。在本文中,我们构建了一个空间数据库的自然语言查询接口,以回答与犯罪相关的空间查询。与谷歌地图等界面相比,该系统有两个主要优势:(1)允许用自然语言表达查询条件;(2)支持更多的空间谓词,如“在3英里内”和“靠近”。该系统使用一组与犯罪相关的查询来对包含德克萨斯州丹顿地区许多空间层的数据集进行评估。结果表明,在处理复杂的空间查询时,我们的方法明显优于谷歌地图。
{"title":"A natural language interface for crime-related spatial queries","authors":"Chengyang Zhang, Y. Huang, Rada Mihalcea, Hector Cuellar","doi":"10.1109/ISI.2009.5137290","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137290","url":null,"abstract":"Web-based mapping applications such as Google Maps or Virtual Earth have become increasingly popular. However, current map search is still keyword-based and supports a limited number of spatial predicates. In this paper, we build towards a natural language query interface to spatial databases to answer crime-related spatial queries. The system has two main advantages compared with interfaces such as Google Maps: (1) It allows query conditions to be expressed in natural language, and (2) It supports a larger number of spatial predicates, such as “within 3 miles” and “close to”. The system is evaluated using a set of crime-related queries run against a dataset that contains many spatial layers in the Denton, Texas area. The results show that our approach significantly outperforms Google Maps when processing complicated spatial queries.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124423154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Building a better password: The role of cognitive load in information security training 构建更好的密码:认知负荷在信息安全培训中的作用
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137281
Ann-Marie Horcher, G. Tejay
User passwords are the gateway to an organization's assets. When users are the agents selecting passwords, they are the key component to improving passwords. Users must be persuaded to select passwords difficult to compromise. User behavior can be influenced by information security training. This study examines the use of cognitive load theory to design the information security training on password strength. The comprehension of training is measured by an examination of passwords selected after the training.
用户密码是通往组织资产的门户。当用户作为选择密码的代理时,他们是改进密码的关键组成部分。必须说服用户选择难以妥协的密码。用户行为可以受到信息安全培训的影响。本研究探讨运用认知负荷理论设计资讯安全口令强度训练。培训的理解程度是通过对培训后选择的密码进行检查来衡量的。
{"title":"Building a better password: The role of cognitive load in information security training","authors":"Ann-Marie Horcher, G. Tejay","doi":"10.1109/ISI.2009.5137281","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137281","url":null,"abstract":"User passwords are the gateway to an organization's assets. When users are the agents selecting passwords, they are the key component to improving passwords. Users must be persuaded to select passwords difficult to compromise. User behavior can be influenced by information security training. This study examines the use of cognitive load theory to design the information security training on password strength. The comprehension of training is measured by an examination of passwords selected after the training.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114596553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
期刊
2009 IEEE International Conference on Intelligence and Security Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1