Pub Date : 2015-12-10DOI: 10.1109/ANTI-CYBERCRIME.2015.7351944
M. Lafkih, Patrick Lacharme, C. Rosenberger, M. Mikram, S. Ghouzali, Mohammed El Haziti, Wadood Abdul, D. Aboutajdine
Biometrics-based authentication systems are presented as an alternative solution to the traditional authentication techniques, these systems have more security advantages compared to a password as biometric data cannot be forgotten or wasted. However, the protection of biometric systems against different types of attacks is not yet guaranteed. While many studies are proposed in order to increase the security of biometric systems, several attacks are developed in order to exploit the weaknesses of these systems. In this paper, we present a new alteration attack on biometric authentication systems. We suppose that the impostor has altered image of the real user and he presents it as request in order to gain unlawful access to the system. Altered image can be recuperated from a fingerprint trace in case of fingerprint based systems or user photograph for attacking face based authentication systems. Next, we study the impact of alteration level on the matching score for fingerprint and face based biometric systems. Our analysis shows that both systems are vulnerable to the proposed attack and the alteration level has serious impact on the security of biometric systems. The impostor can have a matching score greater than 90% for the tested fingerprint based biometric system and 190/194 associations are matched for the tested face based biometric authentication system.
{"title":"Application of new alteration attack on biometric authentication systems","authors":"M. Lafkih, Patrick Lacharme, C. Rosenberger, M. Mikram, S. Ghouzali, Mohammed El Haziti, Wadood Abdul, D. Aboutajdine","doi":"10.1109/ANTI-CYBERCRIME.2015.7351944","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351944","url":null,"abstract":"Biometrics-based authentication systems are presented as an alternative solution to the traditional authentication techniques, these systems have more security advantages compared to a password as biometric data cannot be forgotten or wasted. However, the protection of biometric systems against different types of attacks is not yet guaranteed. While many studies are proposed in order to increase the security of biometric systems, several attacks are developed in order to exploit the weaknesses of these systems. In this paper, we present a new alteration attack on biometric authentication systems. We suppose that the impostor has altered image of the real user and he presents it as request in order to gain unlawful access to the system. Altered image can be recuperated from a fingerprint trace in case of fingerprint based systems or user photograph for attacking face based authentication systems. Next, we study the impact of alteration level on the matching score for fingerprint and face based biometric systems. Our analysis shows that both systems are vulnerable to the proposed attack and the alteration level has serious impact on the security of biometric systems. The impostor can have a matching score greater than 90% for the tested fingerprint based biometric system and 190/194 associations are matched for the tested face based biometric authentication system.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"313 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116283394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-10DOI: 10.1109/ANTI-CYBERCRIME.2015.7351955
A. Manasrah, M. Akour, E. Alsukhni
Spam emails are rapidly increasing on a daily base. An attacker could attract the email users to open spam and click on the embedded links that could takes him to malicious Web pages. We tried to inspect the awareness and the attitude of college students in three main Universities in Jordan. As total, 600 students from educational, science and IT colleges were surveyed. Although most of the students who participated in the study were offensive towards the spam email and cybercrimes, few participants do nothing against it. The students' major plays important role in increasing the awareness against the spam emails and cybercrimes. Moreover, we investigated three main factors as we thought it could attract the students to open and read the spam emails that could lead them to be a victim of cybercrimes. These factors are technological, social, economical and religious. The participation in this study was voluntary, only the students who have the willingness to participate in our study fill the survey. The result shows that some of the educational major participants are seldom use their email accounts, while others have some knowledge on spam emails and cybercrimes, yet they may get stimulated to follow certain emails. Those participants are more vulnerable to cybercrimes. Towards the end, we condensed a research direction and recommendations to rise up user's awareness and arm them well to the battle with spam emails and cybercrimes.
{"title":"Toward improving university students awareness of spam email and cybercrime: Case study of Jordan","authors":"A. Manasrah, M. Akour, E. Alsukhni","doi":"10.1109/ANTI-CYBERCRIME.2015.7351955","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351955","url":null,"abstract":"Spam emails are rapidly increasing on a daily base. An attacker could attract the email users to open spam and click on the embedded links that could takes him to malicious Web pages. We tried to inspect the awareness and the attitude of college students in three main Universities in Jordan. As total, 600 students from educational, science and IT colleges were surveyed. Although most of the students who participated in the study were offensive towards the spam email and cybercrimes, few participants do nothing against it. The students' major plays important role in increasing the awareness against the spam emails and cybercrimes. Moreover, we investigated three main factors as we thought it could attract the students to open and read the spam emails that could lead them to be a victim of cybercrimes. These factors are technological, social, economical and religious. The participation in this study was voluntary, only the students who have the willingness to participate in our study fill the survey. The result shows that some of the educational major participants are seldom use their email accounts, while others have some knowledge on spam emails and cybercrimes, yet they may get stimulated to follow certain emails. Those participants are more vulnerable to cybercrimes. Towards the end, we condensed a research direction and recommendations to rise up user's awareness and arm them well to the battle with spam emails and cybercrimes.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129975435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-10DOI: 10.1109/ANTI-CYBERCRIME.2015.7351939
Adnan Riaz, A. Riaz
Countries across the world are deeply concerned about the cybercrimes. Experts and practitioners always emphasize on collaborative efforts to investigate and control illegal activities in virtual environment. Countries differ significantly on socio-economic continuum. Due to cultural dissimilarities, criminal activities as well as their causes and consequences also vary from region to region. This study was an effort to identify contextual factors stimulating illegitimate activities in cyber environment and to suggest remedial measures in this regard. With the help of focus group sessions comprising ten participants from diverse background, a discussion was held to explore the causes and consequences of cybercrimes. The consolidated results are presented duly agreed by the panelists.
{"title":"Causes and consequences of cybercrimes: An exploratory study of Pakistan","authors":"Adnan Riaz, A. Riaz","doi":"10.1109/ANTI-CYBERCRIME.2015.7351939","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351939","url":null,"abstract":"Countries across the world are deeply concerned about the cybercrimes. Experts and practitioners always emphasize on collaborative efforts to investigate and control illegal activities in virtual environment. Countries differ significantly on socio-economic continuum. Due to cultural dissimilarities, criminal activities as well as their causes and consequences also vary from region to region. This study was an effort to identify contextual factors stimulating illegitimate activities in cyber environment and to suggest remedial measures in this regard. With the help of focus group sessions comprising ten participants from diverse background, a discussion was held to explore the causes and consequences of cybercrimes. The consolidated results are presented duly agreed by the panelists.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124479527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-10DOI: 10.1109/ANTI-CYBERCRIME.2015.7351950
Aunsia Khan, Muhammad Aamir Khan, F. Obaid, S. Jadoon, Mudassar Ali Khan, Misba Sikandar
This paper gives a loom towards the growing spatial resolution necessary to beat the limitations of the imaging technology in surveillance and security disciplines. It has been observed that metropolis cities worldwide invest huge sum of money in surveillance camera system but few are closely observing the benefits and the costs of those investments and to measure the overall impact of surveillance cameras on crime rates. The low resolution coupled with poor quality optics is not be enough to identify the subject of interest in crowd, from a distance, in bad weather and any other limiting factor. In this paper we have introduced multi-frame super-resolution technique that does not require explicit motion estimation and will be useful for producing imagery evidence that the police might reasonably accept as proof of someone's identity. Mostly the research is done in this area by taking a SR image and then after adding their own noise patterns where as our algorithm are working on actual LR images of surveillance camera and getting a SR image while removing the original blur and noise. Our algorithm requires the training set of Low resolution (LR) images from a still camera to produce High resolution (HR) image data and enhances it using anisotropic Diffusion and De-noising. In the image based representations, this technique of super resolution provides a great step towards resolution independence. The application of this method was successfully demonstrated for the restoration from a short low resolution set of images into a super resolved image. This super resolution algorithm works best when the Diffusion is applied and noise reduction filters are applied.
{"title":"A novel multi-frame super resolution algorithm for surveillance camera image reconstruction","authors":"Aunsia Khan, Muhammad Aamir Khan, F. Obaid, S. Jadoon, Mudassar Ali Khan, Misba Sikandar","doi":"10.1109/ANTI-CYBERCRIME.2015.7351950","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351950","url":null,"abstract":"This paper gives a loom towards the growing spatial resolution necessary to beat the limitations of the imaging technology in surveillance and security disciplines. It has been observed that metropolis cities worldwide invest huge sum of money in surveillance camera system but few are closely observing the benefits and the costs of those investments and to measure the overall impact of surveillance cameras on crime rates. The low resolution coupled with poor quality optics is not be enough to identify the subject of interest in crowd, from a distance, in bad weather and any other limiting factor. In this paper we have introduced multi-frame super-resolution technique that does not require explicit motion estimation and will be useful for producing imagery evidence that the police might reasonably accept as proof of someone's identity. Mostly the research is done in this area by taking a SR image and then after adding their own noise patterns where as our algorithm are working on actual LR images of surveillance camera and getting a SR image while removing the original blur and noise. Our algorithm requires the training set of Low resolution (LR) images from a still camera to produce High resolution (HR) image data and enhances it using anisotropic Diffusion and De-noising. In the image based representations, this technique of super resolution provides a great step towards resolution independence. The application of this method was successfully demonstrated for the restoration from a short low resolution set of images into a super resolved image. This super resolution algorithm works best when the Diffusion is applied and noise reduction filters are applied.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131892597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-10DOI: 10.1109/ANTI-CYBERCRIME.2015.7351948
Arif Bramantoro, Soumayah F. Alghannam, Mona I. Alawadh, Dalal A. Alwedaah
The social impact of technology has become one of the most challenging research issues. One of the most famous information technology is BitTorrent, a protocol for peer to peer file sharing. This paper discusses an ethical issue related to Peer to Peer file sharing using BitTorrent protocol of copyrighted materials. We choose an academic approach by choosing an ethical analysis tool that allows pros and cons opinions amongst different points of view. We studied this issue in Saudi community by distributing the questionnaires and analyzing its results. The result reveals that a large percentage of the participants were using Torrent to download movies and music illegally and half of them do not even realize that it is considered as illegal. Hence, it is suggested that in order to reduce the illegal use of a promising technology is to raise the awareness of the issue to the society.
{"title":"Sharing copyrighted materials by using BitTorrent in Saudi Arabia","authors":"Arif Bramantoro, Soumayah F. Alghannam, Mona I. Alawadh, Dalal A. Alwedaah","doi":"10.1109/ANTI-CYBERCRIME.2015.7351948","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351948","url":null,"abstract":"The social impact of technology has become one of the most challenging research issues. One of the most famous information technology is BitTorrent, a protocol for peer to peer file sharing. This paper discusses an ethical issue related to Peer to Peer file sharing using BitTorrent protocol of copyrighted materials. We choose an academic approach by choosing an ethical analysis tool that allows pros and cons opinions amongst different points of view. We studied this issue in Saudi community by distributing the questionnaires and analyzing its results. The result reveals that a large percentage of the participants were using Torrent to download movies and music illegally and half of them do not even realize that it is considered as illegal. Hence, it is suggested that in order to reduce the illegal use of a promising technology is to raise the awareness of the issue to the society.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134444830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-10DOI: 10.1109/ANTI-CYBERCRIME.2015.7351936
A. Demiriz, Betul Ekizoglu
Fraud detection procedures for national and international economies have become quite an important task. Ensuring the security of transactions carried out by banks and other financial institutions is one of the major factors affecting the reputation and profitability of such organizations. However, since people who perform fraudulent transactions change their methods constantly in order not to get caught up, it gets more difficult to identify and detect this type of transactions. Detecting this type of transactions makes the support of technology compulsory, considering high volume and intensity of transactions. In this paper, we explore practicality of using location data to aid finding better business rules where they can easily be deployed with a rule-based fraud detection and prevention system for retail banking. In order to study the importance of location data, we first compiled a set of anonymized automated teller machine (ATM) usage data from a mid-size bank in Turkey. Depending on how much mobile the card owners are, we can easily devise business rules to detect the anomalies. Such anomalies can be directed to appropriate business units to be analyzed further or account owners may be required additional authorizations for banking activities (such as internet money transfers and payments). We have shown in this paper that a significant bulk of ATM users does not leave the vicinity of their living place. We also give some brief use cases and hints regarding what types of business rules can be extracted from location data.
{"title":"Using location aware business rules for preventing retail banking frauds","authors":"A. Demiriz, Betul Ekizoglu","doi":"10.1109/ANTI-CYBERCRIME.2015.7351936","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351936","url":null,"abstract":"Fraud detection procedures for national and international economies have become quite an important task. Ensuring the security of transactions carried out by banks and other financial institutions is one of the major factors affecting the reputation and profitability of such organizations. However, since people who perform fraudulent transactions change their methods constantly in order not to get caught up, it gets more difficult to identify and detect this type of transactions. Detecting this type of transactions makes the support of technology compulsory, considering high volume and intensity of transactions. In this paper, we explore practicality of using location data to aid finding better business rules where they can easily be deployed with a rule-based fraud detection and prevention system for retail banking. In order to study the importance of location data, we first compiled a set of anonymized automated teller machine (ATM) usage data from a mid-size bank in Turkey. Depending on how much mobile the card owners are, we can easily devise business rules to detect the anomalies. Such anomalies can be directed to appropriate business units to be analyzed further or account owners may be required additional authorizations for banking activities (such as internet money transfers and payments). We have shown in this paper that a significant bulk of ATM users does not leave the vicinity of their living place. We also give some brief use cases and hints regarding what types of business rules can be extracted from location data.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128059913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-10DOI: 10.1109/ANTI-CYBERCRIME.2015.7351946
Feras Aljumah, Andrei Soeanu, Wen Liu, M. Debbabi
Secure multi-party computation (SMC) allows multiple parties to jointly and securely compute a function while preserving the privacy of the involved parties. In this regard, homomorphic cryptosystems allow users to perform addition or multiplication operations on encrypted values without having to decrypt the input values. In this paper, we propose both a cryptographic and a non-cryptographic privacy-preserving protocols that allow one party to collaboratively compute a private polynomial function with at least two other parties using semantically secure cryptosystems. In this respect, the function to be evaluated is kept private to the party in question. In addition, we assume that there is no fully trusted party and that all parties are semi-honest. Moreover, we assume that there is no collusion between the different parties. We present the two protocols in question and report on the underlying performance through the presentation of our implementation results. The proposed protocols are relevant in many applications such as evidence sharing in multi-party forensic investigations, situation awareness through the secure sharing in distributed monitoring of plan execution, etc.
{"title":"Protocols for secure multi-party private function evaluation","authors":"Feras Aljumah, Andrei Soeanu, Wen Liu, M. Debbabi","doi":"10.1109/ANTI-CYBERCRIME.2015.7351946","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351946","url":null,"abstract":"Secure multi-party computation (SMC) allows multiple parties to jointly and securely compute a function while preserving the privacy of the involved parties. In this regard, homomorphic cryptosystems allow users to perform addition or multiplication operations on encrypted values without having to decrypt the input values. In this paper, we propose both a cryptographic and a non-cryptographic privacy-preserving protocols that allow one party to collaboratively compute a private polynomial function with at least two other parties using semantically secure cryptosystems. In this respect, the function to be evaluated is kept private to the party in question. In addition, we assume that there is no fully trusted party and that all parties are semi-honest. Moreover, we assume that there is no collusion between the different parties. We present the two protocols in question and report on the underlying performance through the presentation of our implementation results. The proposed protocols are relevant in many applications such as evidence sharing in multi-party forensic investigations, situation awareness through the secure sharing in distributed monitoring of plan execution, etc.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123597062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-10DOI: 10.1109/ANTI-CYBERCRIME.2015.7351932
Shahzaib Tahir, Waseem Iqbal
Big Data is a term associated with large datasets that come into existence with the volume, velocity and variety of data. An ever increasing human dependence on computers and automated systems has caused data to increase massively. The substantial collection of data is not only helpful for researchers but equally valuable to investigators who intend to carry out forensic analysis of data associated with the criminal cases. The conventional methodologies of performing forensic analysis have changed with the emergence of big data because big data forensic requires more sophisticated tools along with the deployment of efficient frameworks. Up till now several techniques have been devised to help the forensic analysis of small datasets but none of the techniques have been studied by coupling them with big data. Hence in this paper different techniques have been studied by closely analyzing their feasibility in the extraction and the forensic analysis of evidence from large amounts of data. In this paper we discuss various sources of data and how techniques such as the MapReduce framework and phylogenetic trees can help a forensic investigator to visualize large data sets to conduct a forensic analysis. Since audio and video are an attractive source of forensic data therefore this paper also discusses the latest techniques that assist in the extraction of useful sound signals from noise infested audio signals. Similar techniques for forensic analysis of the images have also been presented. Based upon interviews conducted with the forensic professionals, the factors affecting big data forensic techniques along with their severity have been identified so that a scenario specific approach can also be adopted based upon the available investigative resources.
{"title":"Big Data — An evolving concern for forensic investigators","authors":"Shahzaib Tahir, Waseem Iqbal","doi":"10.1109/ANTI-CYBERCRIME.2015.7351932","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351932","url":null,"abstract":"Big Data is a term associated with large datasets that come into existence with the volume, velocity and variety of data. An ever increasing human dependence on computers and automated systems has caused data to increase massively. The substantial collection of data is not only helpful for researchers but equally valuable to investigators who intend to carry out forensic analysis of data associated with the criminal cases. The conventional methodologies of performing forensic analysis have changed with the emergence of big data because big data forensic requires more sophisticated tools along with the deployment of efficient frameworks. Up till now several techniques have been devised to help the forensic analysis of small datasets but none of the techniques have been studied by coupling them with big data. Hence in this paper different techniques have been studied by closely analyzing their feasibility in the extraction and the forensic analysis of evidence from large amounts of data. In this paper we discuss various sources of data and how techniques such as the MapReduce framework and phylogenetic trees can help a forensic investigator to visualize large data sets to conduct a forensic analysis. Since audio and video are an attractive source of forensic data therefore this paper also discusses the latest techniques that assist in the extraction of useful sound signals from noise infested audio signals. Similar techniques for forensic analysis of the images have also been presented. Based upon interviews conducted with the forensic professionals, the factors affecting big data forensic techniques along with their severity have been identified so that a scenario specific approach can also be adopted based upon the available investigative resources.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125482039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-10DOI: 10.1109/ANTI-CYBERCRIME.2015.7351933
A. R. Baig, Hassan Mujtaba Kayani
In this study we report our research on learning an accurate and easily interpretable classifier model for authorship classification of typewritten digital texts. For this purpose we use Ant Colony Optimization; a meta-heuristic based on swarm intelligence. Unlike black box type classifiers, the decision making rules produced by the proposed method are understandable by people familiar to the domain and can be easily enhanced with the addition of domain knowledge. Our experimental results show that the method is feasible and more accurate than decision trees.
{"title":"Swarm intelligence based author identification for digital typewritten text","authors":"A. R. Baig, Hassan Mujtaba Kayani","doi":"10.1109/ANTI-CYBERCRIME.2015.7351933","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351933","url":null,"abstract":"In this study we report our research on learning an accurate and easily interpretable classifier model for authorship classification of typewritten digital texts. For this purpose we use Ant Colony Optimization; a meta-heuristic based on swarm intelligence. Unlike black box type classifiers, the decision making rules produced by the proposed method are understandable by people familiar to the domain and can be easily enhanced with the addition of domain knowledge. Our experimental results show that the method is feasible and more accurate than decision trees.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122926400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-10DOI: 10.1109/ANTI-CYBERCRIME.2015.7351937
Arif Bramantoro
Anti-cybercrime service with data-intensive has become one of the most challenging research issues. A comprehensive solution is required to overcome the problems of anti-cybercrime service performance and scalability in dealing with large scale information. We propose service enthalpy, a new approach in atomizing anti-cybercrime service to tackle large scale information with the use of a measure to ease the creation and collaboration of services. Service enthalpy comprises performance improvement, data intensification, functionality simplification, analysis shallowing, data uniformization, and revelation. We evaluated these six enthalpies to meet several objectives. The result shows that an approximated objective can be achieved.
{"title":"Service enthalpy for analyzing cybercrime","authors":"Arif Bramantoro","doi":"10.1109/ANTI-CYBERCRIME.2015.7351937","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351937","url":null,"abstract":"Anti-cybercrime service with data-intensive has become one of the most challenging research issues. A comprehensive solution is required to overcome the problems of anti-cybercrime service performance and scalability in dealing with large scale information. We propose service enthalpy, a new approach in atomizing anti-cybercrime service to tackle large scale information with the use of a measure to ease the creation and collaboration of services. Service enthalpy comprises performance improvement, data intensification, functionality simplification, analysis shallowing, data uniformization, and revelation. We evaluated these six enthalpies to meet several objectives. The result shows that an approximated objective can be achieved.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122563030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}