首页 > 最新文献

2009 IEEE International Conference on Intelligence and Security Informatics最新文献

英文 中文
Mining top-k and bottom-k correlative crime patterns through graph representations 通过图表示挖掘top-k和bottom-k相关犯罪模式
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137266
Peter Phillips, Ickjai Lee
Crime activities are geospatial phenomena and as such are geospatially, thematically and temporally correlated. Thus, crime datasets must be interpreted and analyzed in conjunction with various factors that can contribute to the formulation of crime. Discovering these correlations allows a deeper insight into the complex nature of criminal behavior. We introduce a graph based dataset representation that allows us to mine a set of datasets for correlation. We demonstrate our approach with real crime datasets and provide a comparison with other techniques.
犯罪活动是地理空间现象,因此在地理空间、主题和时间上是相关的。因此,犯罪数据集必须与可能导致犯罪形成的各种因素结合起来进行解释和分析。发现这些相关性可以让我们更深入地了解犯罪行为的复杂本质。我们引入了一个基于图的数据集表示,它允许我们挖掘一组数据集的相关性。我们用真实的犯罪数据集展示了我们的方法,并与其他技术进行了比较。
{"title":"Mining top-k and bottom-k correlative crime patterns through graph representations","authors":"Peter Phillips, Ickjai Lee","doi":"10.1109/ISI.2009.5137266","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137266","url":null,"abstract":"Crime activities are geospatial phenomena and as such are geospatially, thematically and temporally correlated. Thus, crime datasets must be interpreted and analyzed in conjunction with various factors that can contribute to the formulation of crime. Discovering these correlations allows a deeper insight into the complex nature of criminal behavior. We introduce a graph based dataset representation that allows us to mine a set of datasets for correlation. We demonstrate our approach with real crime datasets and provide a comparison with other techniques.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124960565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Tracking terrorism news threads by extracting event signatures 通过提取事件签名跟踪恐怖主义新闻线程
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137296
S. Ahmed, Ruchi Bhindwale, H. Davulcu
With the humongous amount of news stories published daily and the range of ways (RSS feeds, blogs etc) to disseminate them, even an expert at tracking new developing stories can feel the information overload. At most times, when a user is reading a news story, she would like to know “what happened before this?“ or “how things progressed after this incident?”. In this paper, we present a novel real-time yet simple method to detect and track new events related to violence and terrorism in news streams through their life over a time line. We do this by first extracting signature of the event, at microscopic level rather than topic or macroscopic level, and then tracking and linking this event with mentions of same event signature in other incoming news articles. There by forming a thread that links all the news articles that describe this specific event, with no training data used or machine learning algorithms employed. We also present our experimental evaluations conducted with Document Understand Conference (DUC) datasets that validate our observations and methodology.
每天都有大量的新闻故事发布,传播的方式也多种多样(RSS订阅、博客等),即使是跟踪新新闻发展的专家也会感到信息过载。大多数时候,当用户阅读新闻故事时,她想知道“在这之前发生了什么?”或“这件事以后的情况如何?”在本文中,我们提出了一种新的实时而简单的方法来检测和跟踪新闻流中与暴力和恐怖主义有关的新事件,通过他们的生活时间线。我们首先在微观层面而不是主题或宏观层面提取事件的签名,然后跟踪并将此事件与其他收到的新闻文章中提到的相同事件签名联系起来。在那里,通过形成一个链接所有描述这一特定事件的新闻文章的线索,不使用训练数据或机器学习算法。我们还介绍了用文献理解会议(DUC)数据集进行的实验评估,以验证我们的观察结果和方法。
{"title":"Tracking terrorism news threads by extracting event signatures","authors":"S. Ahmed, Ruchi Bhindwale, H. Davulcu","doi":"10.1109/ISI.2009.5137296","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137296","url":null,"abstract":"With the humongous amount of news stories published daily and the range of ways (RSS feeds, blogs etc) to disseminate them, even an expert at tracking new developing stories can feel the information overload. At most times, when a user is reading a news story, she would like to know “what happened before this?“ or “how things progressed after this incident?”. In this paper, we present a novel real-time yet simple method to detect and track new events related to violence and terrorism in news streams through their life over a time line. We do this by first extracting signature of the event, at microscopic level rather than topic or macroscopic level, and then tracking and linking this event with mentions of same event signature in other incoming news articles. There by forming a thread that links all the news articles that describe this specific event, with no training data used or machine learning algorithms employed. We also present our experimental evaluations conducted with Document Understand Conference (DUC) datasets that validate our observations and methodology.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126231950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Implementing PII honeytokens to mitigate against the threat of malicous insiders 实现PII蜜糖令牌以减轻恶意内部人员的威胁
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137315
Jonathan White, B. Panda
In the past several years, extensive research has been performed in various honeypot technologies, including honeynets, honeywalls, and honeytokens, primarily to gather information about external threats. Little to no research has been performed on how honeytokens, pieces of digital information designed to attract and trace illicit uses of data, can be implemented to catch one of the most dangerous threats, the trusted insider. The goal of this work is to detect, identify, and confirm insider threats, specifically threats that are after personally identifiable information (PII) data.
在过去的几年里,人们对各种蜜罐技术进行了广泛的研究,包括蜜网、蜜墙和蜜令牌,主要是为了收集有关外部威胁的信息。关于如何实施蜜糖令牌(旨在吸引和追踪非法数据使用的数字信息片段)来捕捉最危险的威胁之一——可信的内部人员,几乎没有任何研究。这项工作的目标是检测、识别和确认内部威胁,特别是针对个人身份信息(PII)数据的威胁。
{"title":"Implementing PII honeytokens to mitigate against the threat of malicous insiders","authors":"Jonathan White, B. Panda","doi":"10.1109/ISI.2009.5137315","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137315","url":null,"abstract":"In the past several years, extensive research has been performed in various honeypot technologies, including honeynets, honeywalls, and honeytokens, primarily to gather information about external threats. Little to no research has been performed on how honeytokens, pieces of digital information designed to attract and trace illicit uses of data, can be implemented to catch one of the most dangerous threats, the trusted insider. The goal of this work is to detect, identify, and confirm insider threats, specifically threats that are after personally identifiable information (PII) data.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125215176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
IEDs in the dark web: Lexicon expansion and genre classification 暗网中的简易爆炸装置:词典扩展和类型分类
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137293
Hsinchun Chen
Improvised explosive device web pages represent a significant source of knowledge for security organizations. In this paper, we present significant improvements to our approach to the discovery and classification of IED related web pages in the Dark Web. We present a statistical feature ranking approach to the expansion of the keyword lexicon used to discover IED related web pages, which identified new relevant terms for inclusion. Additionally, we present an improved web page feature representation designed to better capture the structural and stylistic cues revealing of genres of communication, and a series of experiments comparing the classification performance of the new representation with our existing approach.
简易爆炸装置网页是安全组织的重要知识来源。在本文中,我们对暗网中IED相关网页的发现和分类方法进行了重大改进。我们提出了一种统计特征排序方法来扩展用于发现IED相关网页的关键字词典,该方法确定了新的相关术语。此外,我们提出了一种改进的网页特征表示,旨在更好地捕捉揭示交流类型的结构和风格线索,并通过一系列实验比较了新表示与现有方法的分类性能。
{"title":"IEDs in the dark web: Lexicon expansion and genre classification","authors":"Hsinchun Chen","doi":"10.1109/ISI.2009.5137293","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137293","url":null,"abstract":"Improvised explosive device web pages represent a significant source of knowledge for security organizations. In this paper, we present significant improvements to our approach to the discovery and classification of IED related web pages in the Dark Web. We present a statistical feature ranking approach to the expansion of the keyword lexicon used to discover IED related web pages, which identified new relevant terms for inclusion. Additionally, we present an improved web page feature representation designed to better capture the structural and stylistic cues revealing of genres of communication, and a series of experiments comparing the classification performance of the new representation with our existing approach.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127538119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Effective whitelisting for filesystem forensics 有效的文件系统取证白名单
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137284
S. Chawathe
Forensic analysis of the large filesystems commonly found on current computers requires an effective method for categorizing and prioritizing files in order to avoid overwhelming the investigator. A key technique for this purpose is whitelisting files, i.e., skipping the detailed analysis of files that match files in a well known reference collection of files. Effective use of this technique requires an efficient method to match files, detecting not only exact matches, but also near matches or approximate matches. This paper outlines the requirements for such matching, formalizes them as the bounded best match and approximate bounded near-match problems, and describes methods to solve these problems. In particular, the approximate bounded near-match problem is mapped to the problem of finding near neighbors in a high-dimensional metric space and solved using locality-sensitive hashing.
对当前计算机上常见的大型文件系统进行取证分析,需要一种有效的方法来对文件进行分类和优先排序,以避免使调查人员不知所措。实现此目的的一项关键技术是将文件列入白名单,也就是说,跳过对与众所周知的文件参考集合中的文件相匹配的文件的详细分析。有效地使用这种技术需要有效的方法来匹配文件,不仅检测精确匹配,而且检测接近匹配或近似匹配。本文概述了这种匹配的要求,将其形式化为有界最佳匹配和近似有界近匹配问题,并描述了解决这类问题的方法。特别地,将近似有界近匹配问题映射为在高维度量空间中寻找近邻的问题,并使用位置敏感散列来解决。
{"title":"Effective whitelisting for filesystem forensics","authors":"S. Chawathe","doi":"10.1109/ISI.2009.5137284","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137284","url":null,"abstract":"Forensic analysis of the large filesystems commonly found on current computers requires an effective method for categorizing and prioritizing files in order to avoid overwhelming the investigator. A key technique for this purpose is whitelisting files, i.e., skipping the detailed analysis of files that match files in a well known reference collection of files. Effective use of this technique requires an efficient method to match files, detecting not only exact matches, but also near matches or approximate matches. This paper outlines the requirements for such matching, formalizes them as the bounded best match and approximate bounded near-match problems, and describes methods to solve these problems. In particular, the approximate bounded near-match problem is mapped to the problem of finding near neighbors in a high-dimensional metric space and solved using locality-sensitive hashing.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116683124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Building a better password: The role of cognitive load in information security training 构建更好的密码:认知负荷在信息安全培训中的作用
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137281
Ann-Marie Horcher, G. Tejay
User passwords are the gateway to an organization's assets. When users are the agents selecting passwords, they are the key component to improving passwords. Users must be persuaded to select passwords difficult to compromise. User behavior can be influenced by information security training. This study examines the use of cognitive load theory to design the information security training on password strength. The comprehension of training is measured by an examination of passwords selected after the training.
用户密码是通往组织资产的门户。当用户作为选择密码的代理时,他们是改进密码的关键组成部分。必须说服用户选择难以妥协的密码。用户行为可以受到信息安全培训的影响。本研究探讨运用认知负荷理论设计资讯安全口令强度训练。培训的理解程度是通过对培训后选择的密码进行检查来衡量的。
{"title":"Building a better password: The role of cognitive load in information security training","authors":"Ann-Marie Horcher, G. Tejay","doi":"10.1109/ISI.2009.5137281","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137281","url":null,"abstract":"User passwords are the gateway to an organization's assets. When users are the agents selecting passwords, they are the key component to improving passwords. Users must be persuaded to select passwords difficult to compromise. User behavior can be influenced by information security training. This study examines the use of cognitive load theory to design the information security training on password strength. The comprehension of training is measured by an examination of passwords selected after the training.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114596553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Stability of individual and group behavior in a blog network 博客网络中个人和群体行为的稳定性
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137263
Stephen Kelley, M. Goldberg, M. Magdon-Ismail, Konstantin Mertsalov
This work experimentally examines different notions of stability of the behavior of individuals and groups in a network of blogs. Our experiments are conducted on data collected from LiveJournal. All stability notions aim to locate stable behavior within an individual's area, which is defined in a variety of manners. Our experiments confirm an earlier observation of the highly dynamic nature of the network. Roughly 70% of the communication of a typical week was not observed in the previous week. Depending on the definition of stability and area used, we find small, but highly stable, sets of individuals with stable behavior in the network.
这项工作通过实验检验了博客网络中个人和群体行为稳定性的不同概念。我们的实验是在LiveJournal收集的数据上进行的。所有的稳定性概念都旨在将稳定的行为定位在个人的区域内,这一区域的定义方式多种多样。我们的实验证实了先前对网络高度动态特性的观察。一周中大约70%的沟通在前一周没有被观察到。根据稳定性的定义和使用的面积,我们发现网络中具有稳定行为的小但高度稳定的个体集。
{"title":"Stability of individual and group behavior in a blog network","authors":"Stephen Kelley, M. Goldberg, M. Magdon-Ismail, Konstantin Mertsalov","doi":"10.1109/ISI.2009.5137263","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137263","url":null,"abstract":"This work experimentally examines different notions of stability of the behavior of individuals and groups in a network of blogs. Our experiments are conducted on data collected from LiveJournal. All stability notions aim to locate stable behavior within an individual's area, which is defined in a variety of manners. Our experiments confirm an earlier observation of the highly dynamic nature of the network. Roughly 70% of the communication of a typical week was not observed in the previous week. Depending on the definition of stability and area used, we find small, but highly stable, sets of individuals with stable behavior in the network.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130184133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A game theory approach for the reallocation of security forces against terrorist diversionary attacks 针对恐怖分子转移攻击重新分配安全部队的博弈论方法
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137277
Yi-Ming Chen, Dachrahn Wu, Cheng-Kuang Wu
Terrorists tend to coordinate multiple raids which, combined with diversionary attacks are designed to divert the attention of the security forces, causing them to take a longer time to respond. This in turn enables the terrorists to cause more casualties at their primary target. It is important to efficiently reallocate the available security forces to meet these terrorist attacks, especially when the available resources are limited. In this paper we proposed two game theory-based models for the reallocation of security forces for the purpose of countering both primary and diversionary attacks in an urban environment. The first model is used each target and the “attack on hidden-object game” in which one analyzes the interaction behavior between the security force commander and the terrorists within a zero-sum game. The probability of a primary attack to this target is derived from the mixed strategy Nash equilibrium. The second model uses all these probabilities to compute the Shapley value for each target, in terms of the majority of all probabilities for primary attacks. The Shapley values are then used to create a reallocated set of the limited security forces. Experimental results show the approach proposed in this study is more efficient than the traditional method for dealing with ever more likely gunshot events.
恐怖分子倾向于协调多次袭击,再加上转移注意力的攻击,目的是转移安全部队的注意力,使他们花更长的时间作出反应。这反过来又使恐怖分子能够在其主要目标上造成更多伤亡。重要的是有效地重新分配现有的安全部队,以应付这些恐怖主义袭击,特别是在现有资源有限的情况下。在本文中,我们提出了两个基于博弈论的模型,用于在城市环境中对抗主要攻击和转移攻击的安全部队的重新分配。第一个模型用于每个目标和“攻击藏物游戏”,其中分析安全部队指挥官与恐怖分子在零和游戏中的互动行为。从混合策略纳什均衡中导出了对该目标的一次主要攻击的概率。第二个模型使用所有这些概率来计算每个目标的Shapley值,根据主要攻击的大多数概率。然后使用沙普利值来重新分配一组有限的安全部队。实验结果表明,在处理更可能发生的枪击事件时,本文提出的方法比传统方法更有效。
{"title":"A game theory approach for the reallocation of security forces against terrorist diversionary attacks","authors":"Yi-Ming Chen, Dachrahn Wu, Cheng-Kuang Wu","doi":"10.1109/ISI.2009.5137277","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137277","url":null,"abstract":"Terrorists tend to coordinate multiple raids which, combined with diversionary attacks are designed to divert the attention of the security forces, causing them to take a longer time to respond. This in turn enables the terrorists to cause more casualties at their primary target. It is important to efficiently reallocate the available security forces to meet these terrorist attacks, especially when the available resources are limited. In this paper we proposed two game theory-based models for the reallocation of security forces for the purpose of countering both primary and diversionary attacks in an urban environment. The first model is used each target and the “attack on hidden-object game” in which one analyzes the interaction behavior between the security force commander and the terrorists within a zero-sum game. The probability of a primary attack to this target is derived from the mixed strategy Nash equilibrium. The second model uses all these probabilities to compute the Shapley value for each target, in terms of the majority of all probabilities for primary attacks. The Shapley values are then used to create a reallocated set of the limited security forces. Experimental results show the approach proposed in this study is more efficient than the traditional method for dealing with ever more likely gunshot events.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128595007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Change point detection based on call detail records 基于呼叫细节记录的变更点检测
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137271
Huiqi Zhang, R. Dantu, João W. Cangussu
In this paper we propose a method for combining wavelet denoising and sequential approach for detecting change points on mobile phone based on detailed call records. The Minmax method is used to estimate the thresholds of frequency and call duration for denoising. This work is useful to enhance homeland security, detecting unwanted calls (e.g., spam) and commercial purposes. For validation of our results, we randomly choose actual call logs of 20 users from 100 users collected at MIT by the Reality Mining Project group for a period of 8 months. Simulation data is also used to validate the results. The experimental results show that our model achieves good performance with high accuracy.
本文提出了一种结合小波去噪和序列法的基于详细通话记录的手机变化点检测方法。使用最小值法估计频率阈值和呼叫持续时间阈值进行去噪。这项工作有助于加强国土安全,检测不受欢迎的电话(如垃圾邮件)和商业目的。为了验证我们的结果,我们从现实挖掘项目组在MIT收集的100个用户中随机选择了20个用户的实际通话记录,时间为8个月。仿真数据也用于验证结果。实验结果表明,该模型具有良好的性能和较高的精度。
{"title":"Change point detection based on call detail records","authors":"Huiqi Zhang, R. Dantu, João W. Cangussu","doi":"10.1109/ISI.2009.5137271","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137271","url":null,"abstract":"In this paper we propose a method for combining wavelet denoising and sequential approach for detecting change points on mobile phone based on detailed call records. The Minmax method is used to estimate the thresholds of frequency and call duration for denoising. This work is useful to enhance homeland security, detecting unwanted calls (e.g., spam) and commercial purposes. For validation of our results, we randomly choose actual call logs of 20 users from 100 users collected at MIT by the Reality Mining Project group for a period of 8 months. Simulation data is also used to validate the results. The experimental results show that our model achieves good performance with high accuracy.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122130246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Factors influencing Bloggers' perceived indentifiability 影响博主感知可识别性的因素
Pub Date : 2009-06-08 DOI: 10.1109/ISI.2009.5137267
Chyng-yang Jang, M. Stefanone
Prior research found that the majority of blogs are personal and relational in nature where bloggers reveal intimate information about themselves and target their public posts to their off-line social networks. These personal-journal style blogs expose their authors to potential privacy risks. Bloggers may choose to conceal their identities to mitigate the privacy concerns or disclose their identities for positive relational communication. This study explores the impacts of personal traits and perceived communication context on bloggers' decision of identity disclosure. Data were collected via an online survey of 148 randomly selected bloggers. Results showed that self disclosure tendency and targeting blogs at family and close friends were positive predictors to bloggers' perceived identifiability. In addition, self disclosure tendency and extraversion were found to moderate the relationship between bloggers' perceived vulnerability and identifiability. The implications on privacy management and relational communication online are discussed.
先前的研究发现,大多数博客本质上是个人的和关系的,博客作者会透露自己的私密信息,并将他们的公开帖子定位于他们的离线社交网络。这些个人日志风格的博客使其作者面临潜在的隐私风险。部落客可能会选择隐藏身分以减轻隐私顾虑,或是为了正面的关系沟通而公开身分。本研究探讨了个人特质和感知传播情境对博主身份披露决策的影响。数据是通过对148名随机选择的博主进行在线调查收集的。结果显示,自我表露倾向和以家人和亲密朋友为目标的博客对博客作者的感知识别性有正向预测作用。此外,自我表露倾向和外向性对博客作者感知脆弱性与可识别性之间的关系有调节作用。讨论了这对在线隐私管理和关系通信的影响。
{"title":"Factors influencing Bloggers' perceived indentifiability","authors":"Chyng-yang Jang, M. Stefanone","doi":"10.1109/ISI.2009.5137267","DOIUrl":"https://doi.org/10.1109/ISI.2009.5137267","url":null,"abstract":"Prior research found that the majority of blogs are personal and relational in nature where bloggers reveal intimate information about themselves and target their public posts to their off-line social networks. These personal-journal style blogs expose their authors to potential privacy risks. Bloggers may choose to conceal their identities to mitigate the privacy concerns or disclose their identities for positive relational communication. This study explores the impacts of personal traits and perceived communication context on bloggers' decision of identity disclosure. Data were collected via an online survey of 148 randomly selected bloggers. Results showed that self disclosure tendency and targeting blogs at family and close friends were positive predictors to bloggers' perceived identifiability. In addition, self disclosure tendency and extraversion were found to moderate the relationship between bloggers' perceived vulnerability and identifiability. The implications on privacy management and relational communication online are discussed.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121249405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2009 IEEE International Conference on Intelligence and Security Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1