首页 > 最新文献

2019 10th International Conference on Information and Communication Systems (ICICS)最新文献

英文 中文
Evaluating the use of augmented reality in learning portfolios for different team roles 评估增强现实在不同团队角色学习组合中的使用
Georgios A. Dafoulas, Ariadni Tsiakara, C. Maia, David Neilson
Increasingly augmented reality becomes an integrated component of modern learning environments. This paper builds on previous work to focus on the evaluation of how augmented reality and in particular the use of an Optical Head Mounted Display (OHMD) for the creation of learning portfolios. Emphasis is given on the evaluation of the use of such tools for different learning activities. The paper provides an in depth analysis of how the technology is evaluated by using Belbin’s team role theory for classifying participants’ responses. The paper’s final contribution is in the form of a discussion of a range of issues associated with privacy and security of personal information collected with the use of OHMD in learning environments.
增强现实日益成为现代学习环境的重要组成部分。本文以以前的工作为基础,重点评估增强现实,特别是使用光学头戴式显示器(OHMD)创建学习档案的方式。重点是评估这些工具在不同学习活动中的使用情况。本文通过使用Belbin的团队角色理论对参与者的反应进行分类,对如何评估该技术进行了深入的分析。本文的最后贡献是讨论了一系列与在学习环境中使用OHMD收集的个人信息的隐私和安全相关的问题。
{"title":"Evaluating the use of augmented reality in learning portfolios for different team roles","authors":"Georgios A. Dafoulas, Ariadni Tsiakara, C. Maia, David Neilson","doi":"10.1109/IACS.2019.8809172","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809172","url":null,"abstract":"Increasingly augmented reality becomes an integrated component of modern learning environments. This paper builds on previous work to focus on the evaluation of how augmented reality and in particular the use of an Optical Head Mounted Display (OHMD) for the creation of learning portfolios. Emphasis is given on the evaluation of the use of such tools for different learning activities. The paper provides an in depth analysis of how the technology is evaluated by using Belbin’s team role theory for classifying participants’ responses. The paper’s final contribution is in the form of a discussion of a range of issues associated with privacy and security of personal information collected with the use of OHMD in learning environments.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125752372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Collaborative Module on Distributed SDN 分布式SDN上的安全协同模块
G. Saldamli, Harsha Sanjeeva, Karthik Siddalingaapa, Ruthra Vadivel Murugesan, L. Ertaul
Stability and security are the most important two release requirements of a modern application development process. As the number of users of an application increases, the network traffic grows. This results in an increase in the server load as well as the threats. If this traffic is not nicely controlled the user would experience a mitigation in application’s performance. To provide a continuous and secure service, the load on the system must be optimally distributed among multiple servers. In the literature, there are various algorithms that are proposed to balance the load on a system. In this study, we introduce a load balancing module for a generic web application to distribute the load optimally using Software Defined Networking (SDN) controllers. The proposed system employs a round-robin scheme for server allocation and implements an open-source SDN controller that runs inside a docker container. To provide reliability, the web application is developed using the ReactJS and NodeJS. The privacy and data confidentiality is provided by using the NISTs new format preserving encryption standard. The proposed method is suitable for real world applications as shown in the performance profiling that we carried using Openload toolset.
稳定性和安全性是现代应用程序开发过程中最重要的两个发布需求。随着应用程序用户数量的增加,网络流量也会增加。这将导致服务器负载和威胁的增加。如果不能很好地控制此流量,用户将会体验到应用程序性能的降低。为了提供连续和安全的服务,系统上的负载必须在多个服务器之间进行最佳分配。在文献中,提出了各种算法来平衡系统上的负载。在这项研究中,我们为一个通用的web应用程序引入了一个负载平衡模块,使用软件定义网络(SDN)控制器来最佳地分配负载。所提出的系统采用循环方案进行服务器分配,并实现了一个运行在docker容器内的开源SDN控制器。为了提供可靠性,web应用程序是使用ReactJS和NodeJS开发的。采用nist新的保格式加密标准,提供了隐私和数据机密性。所提出的方法适用于现实世界的应用程序,正如我们使用Openload工具集进行的性能分析所示。
{"title":"A Secure Collaborative Module on Distributed SDN","authors":"G. Saldamli, Harsha Sanjeeva, Karthik Siddalingaapa, Ruthra Vadivel Murugesan, L. Ertaul","doi":"10.1109/IACS.2019.8809134","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809134","url":null,"abstract":"Stability and security are the most important two release requirements of a modern application development process. As the number of users of an application increases, the network traffic grows. This results in an increase in the server load as well as the threats. If this traffic is not nicely controlled the user would experience a mitigation in application’s performance. To provide a continuous and secure service, the load on the system must be optimally distributed among multiple servers. In the literature, there are various algorithms that are proposed to balance the load on a system. In this study, we introduce a load balancing module for a generic web application to distribute the load optimally using Software Defined Networking (SDN) controllers. The proposed system employs a round-robin scheme for server allocation and implements an open-source SDN controller that runs inside a docker container. To provide reliability, the web application is developed using the ReactJS and NodeJS. The privacy and data confidentiality is provided by using the NISTs new format preserving encryption standard. The proposed method is suitable for real world applications as shown in the performance profiling that we carried using Openload toolset.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123349964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Arabic Word stemming Based on Pattern Affixes Removal 基于模式词缀去除的阿拉伯语词干提取
Sari Awwad
Arabic word term stem became an essential part of any text processing algorithms and information retrieval. The big challenge is how to distinguish between affixes and original characters in Arabic term, where some characters become affixes in Arabic terms and become original in other Arabic terms. The goal of this research is to discover what extent depends on affix stripping to find Arabic term stem. The contribution consists of two parts, starting with removing all kinds of affixes from Arabic term, it has been done by constructing affixes hash tables. The second part is producing 24 possible stems for the same Arabic term by using 24 stripping orders.The experiments proved that there is at least one correct stem out of 24 possible stems. The conclusion is that the most efficient stripping orders are those that begin by removing prefixes followed by removing infixes, and then removing suffixes. The dataset that is used for testing consists of four different subject documents with 2000 Arabic words. The final results after using stripping orders has reached up to 86% of correctness which is the highest percentage comparing to other stripping orders.
阿拉伯文词词干已成为任何文本处理算法和信息检索的重要组成部分。如何区分阿拉伯术语中的词缀和原词是一个很大的挑战,有些词在阿拉伯术语中成为词缀,而在其他阿拉伯术语中成为原词。本研究的目的是发现词缀剥离在多大程度上依赖于查找阿拉伯语词干。贡献由两部分组成,首先从阿拉伯语术语中删除各种词缀,这是通过构建词缀散列表来完成的。第二部分是通过使用24个剥离命令为同一个阿拉伯语术语生成24个可能的词干。实验证明,在24种可能的词干中至少有一种是正确的。结论是,最有效的剥离顺序是从移除前缀开始,然后移除中缀,最后移除后缀。用于测试的数据集由四个不同的主题文档和2000个阿拉伯单词组成。使用剥离顺序后的最终结果达到了86%的正确率,是其他剥离顺序中最高的。
{"title":"Arabic Word stemming Based on Pattern Affixes Removal","authors":"Sari Awwad","doi":"10.1109/IACS.2019.8809169","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809169","url":null,"abstract":"Arabic word term stem became an essential part of any text processing algorithms and information retrieval. The big challenge is how to distinguish between affixes and original characters in Arabic term, where some characters become affixes in Arabic terms and become original in other Arabic terms. The goal of this research is to discover what extent depends on affix stripping to find Arabic term stem. The contribution consists of two parts, starting with removing all kinds of affixes from Arabic term, it has been done by constructing affixes hash tables. The second part is producing 24 possible stems for the same Arabic term by using 24 stripping orders.The experiments proved that there is at least one correct stem out of 24 possible stems. The conclusion is that the most efficient stripping orders are those that begin by removing prefixes followed by removing infixes, and then removing suffixes. The dataset that is used for testing consists of four different subject documents with 2000 Arabic words. The final results after using stripping orders has reached up to 86% of correctness which is the highest percentage comparing to other stripping orders.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127685690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing The Lifetime of Wireless Sensor Network using Genetic Algorithm 利用遗传算法提高无线传感器网络的生存期
Hadeel Alazzam, W. Almobaideen
Selecting the localization of sensors in Wireless Sensor Networks (WSNs) is a big challenge, especially in a wide area. In this paper, a new method is proposed to place sensors using hybrid approach where a large portion of sensors is distributed randomly, while a smaller portion of about 10% of the total number of sensors is distributed in a managed way based on the results of a genetic searching algorithm. Two fitness functions are used for comparison purposes, and Omnet++ simulator was used to conduct the experiment designed to evaluate the proposed method effect on the lifetime of the WSN. Results show that the proposed method increases the lifetime and the throughput of WSN significantly.
无线传感器网络(WSNs)中传感器定位的选择是一个很大的挑战,特别是在广阔的区域。本文提出了一种新的传感器放置方法,采用混合方法,其中大部分传感器随机分布,而根据遗传搜索算法的结果,以有管理的方式分布约占总数10%的小部分传感器。采用两个适应度函数进行比较,并使用omnet++模拟器进行实验设计,以评估所提出的方法对WSN寿命的影响。结果表明,该方法显著提高了无线传感器网络的寿命和吞吐量。
{"title":"Enhancing The Lifetime of Wireless Sensor Network using Genetic Algorithm","authors":"Hadeel Alazzam, W. Almobaideen","doi":"10.1109/IACS.2019.8809109","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809109","url":null,"abstract":"Selecting the localization of sensors in Wireless Sensor Networks (WSNs) is a big challenge, especially in a wide area. In this paper, a new method is proposed to place sensors using hybrid approach where a large portion of sensors is distributed randomly, while a smaller portion of about 10% of the total number of sensors is distributed in a managed way based on the results of a genetic searching algorithm. Two fitness functions are used for comparison purposes, and Omnet++ simulator was used to conduct the experiment designed to evaluate the proposed method effect on the lifetime of the WSN. Results show that the proposed method increases the lifetime and the throughput of WSN significantly.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133861819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Does Privacy Matters When We are Sick? An Extended Privacy Calculus Model for Healthcare Technology Adoption Behavior 当我们生病时,隐私重要吗?医疗保健技术采用行为的扩展隐私演算模型
Mohammed Sajedur Rahman
Patients’ acceptance of healthcare-technology is crucial for better and more affordable healthcare. However, there is evidence that some patients believe using healthcare-technology is a threat to the privacy of their health-related information. Privacy calculus is a widely accepted theory to explain technology adoption behavior when it involves disclosure of personal information. The applicability and effectiveness of privacy calculus model in explaining healthcare technology adoption behavior is still unknown and requires further investigation. In this study, we propose an extended privacy calculus model incorporating health condition emotion as an additional factor that interplays with the two privacy calculus factors. We tested our model with responses from 239 participants. The results revealed that health emotion related to individuals’ on-going health condition interact with the privacy calculus components to influence their health-related technology adoption decisions. The results have important implications for both theory and practice in healthcare domain.
患者对医疗保健技术的接受对于更好、更实惠的医疗保健至关重要。然而,有证据表明,一些患者认为使用医疗保健技术是对其健康相关信息隐私的威胁。隐私演算是一种被广泛接受的理论,用于解释涉及个人信息披露的技术采用行为。隐私演算模型在解释医疗保健技术采用行为方面的适用性和有效性尚不清楚,需要进一步研究。在本研究中,我们提出了一个扩展的隐私演算模型,将健康状况情绪作为与两个隐私演算因素相互作用的附加因素。我们用239名参与者的回答来测试我们的模型。结果表明,与个体持续健康状况相关的健康情绪与隐私演算成分相互作用,影响其健康相关技术的采用决策。研究结果对医疗保健领域的理论和实践具有重要意义。
{"title":"Does Privacy Matters When We are Sick? An Extended Privacy Calculus Model for Healthcare Technology Adoption Behavior","authors":"Mohammed Sajedur Rahman","doi":"10.1109/IACS.2019.8809175","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809175","url":null,"abstract":"Patients’ acceptance of healthcare-technology is crucial for better and more affordable healthcare. However, there is evidence that some patients believe using healthcare-technology is a threat to the privacy of their health-related information. Privacy calculus is a widely accepted theory to explain technology adoption behavior when it involves disclosure of personal information. The applicability and effectiveness of privacy calculus model in explaining healthcare technology adoption behavior is still unknown and requires further investigation. In this study, we propose an extended privacy calculus model incorporating health condition emotion as an additional factor that interplays with the two privacy calculus factors. We tested our model with responses from 239 participants. The results revealed that health emotion related to individuals’ on-going health condition interact with the privacy calculus components to influence their health-related technology adoption decisions. The results have important implications for both theory and practice in healthcare domain.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125504163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Investigating patterns of emotion and expressions using smart learning spaces 使用智能学习空间研究情感和表达模式
Georgios A. Dafoulas, Ariadni Tsiakara, Jerome Samuels-Clarke, C. Maia, David Neilson, Almaas A. Ali
The Internet of Things (IoT) is based on the use of interconnected device for data transfer. This paper describes findings from current work that uses a range of sensors that are connected together in collecting biometric data from learners. The research is focused on assessing learners’ state during different learning activities by using different biometric data. The paper investigates certain patterns of emotion, expressions and Galvanic Skin Response (GSR) (i.e. sweat levels) amongst participants. The findings are discussed under the prism of learner classification against a number of criteria including learning styles, project management preference, team profile and personality type. The paper contributes in understanding how we can monitor individuals’ state and behaviour during different learning activities and identify predominant patterns.
物联网(IoT)是基于使用互联设备进行数据传输。本文描述了目前使用一系列连接在一起的传感器收集学习者生物特征数据的研究结果。研究的重点是利用不同的生物特征数据来评估学习者在不同学习活动中的状态。本文研究了参与者的情绪、表情和皮肤电反应(GSR)(即出汗水平)的某些模式。研究结果在学习者分类的棱镜下进行了讨论,这些分类标准包括学习风格、项目管理偏好、团队概况和人格类型。本文有助于理解我们如何在不同的学习活动中监测个体的状态和行为,并确定主要模式。
{"title":"Investigating patterns of emotion and expressions using smart learning spaces","authors":"Georgios A. Dafoulas, Ariadni Tsiakara, Jerome Samuels-Clarke, C. Maia, David Neilson, Almaas A. Ali","doi":"10.1109/IACS.2019.8809119","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809119","url":null,"abstract":"The Internet of Things (IoT) is based on the use of interconnected device for data transfer. This paper describes findings from current work that uses a range of sensors that are connected together in collecting biometric data from learners. The research is focused on assessing learners’ state during different learning activities by using different biometric data. The paper investigates certain patterns of emotion, expressions and Galvanic Skin Response (GSR) (i.e. sweat levels) amongst participants. The findings are discussed under the prism of learner classification against a number of criteria including learning styles, project management preference, team profile and personality type. The paper contributes in understanding how we can monitor individuals’ state and behaviour during different learning activities and identify predominant patterns.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115222024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RecDNNing: a recommender system using deep neural network with user and item embeddings RecDNNing:一个使用深度神经网络的用户和项目嵌入的推荐系统
Hafed Zarzour, Ziad Al-Sharif, Y. Jararweh
The success of applying deep learning to many domains has gained strong interest in developing new revolutionary recommender systems. However, there are little works studying these systems that employ deep learning; additionally, there is no study showing how to combine the users and items embedding with deep learning to enhance the effectiveness of the recommender systems. Therefore, this paper proposes a novel approach called RecDNNing with a combination of embedded users and items combined with deep neural network. The proposed recommendation approach consists of two phases. In the first phase, we create a dens numeric representation for each user and item, called user embedding and item embedding, respectively. Following that, the items and users embedding are averaged and then concatenated before being fed into the deep neural network. In the second phase, we use the model of the deep neural network to take the concatenated users and items embedding as the inputs in order to predict the scores of rating by applying the forward propagation algorithm. The experimental results on MovieLens show that the proposed RecDNNing outperforms state-of-the-art algorithms.
将深度学习应用于许多领域的成功已经引起了人们对开发新的革命性推荐系统的强烈兴趣。然而,很少有人研究这些采用深度学习的系统;此外,还没有研究表明如何将用户和项目嵌入与深度学习相结合来提高推荐系统的有效性。因此,本文提出了一种将嵌入式用户和物品结合深度神经网络的新方法——RecDNNing。建议的建议方法包括两个阶段。在第一阶段,我们为每个用户和项目创建一个den数字表示,分别称为用户嵌入和项目嵌入。然后,对嵌入的项目和用户进行平均,然后进行连接,然后再输入深度神经网络。在第二阶段,我们利用深度神经网络模型,将嵌入的用户和项目的连接作为输入,通过前向传播算法来预测评分得分。在MovieLens上的实验结果表明,所提出的RecDNNing优于最先进的算法。
{"title":"RecDNNing: a recommender system using deep neural network with user and item embeddings","authors":"Hafed Zarzour, Ziad Al-Sharif, Y. Jararweh","doi":"10.1109/IACS.2019.8809156","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809156","url":null,"abstract":"The success of applying deep learning to many domains has gained strong interest in developing new revolutionary recommender systems. However, there are little works studying these systems that employ deep learning; additionally, there is no study showing how to combine the users and items embedding with deep learning to enhance the effectiveness of the recommender systems. Therefore, this paper proposes a novel approach called RecDNNing with a combination of embedded users and items combined with deep neural network. The proposed recommendation approach consists of two phases. In the first phase, we create a dens numeric representation for each user and item, called user embedding and item embedding, respectively. Following that, the items and users embedding are averaged and then concatenated before being fed into the deep neural network. In the second phase, we use the model of the deep neural network to take the concatenated users and items embedding as the inputs in order to predict the scores of rating by applying the forward propagation algorithm. The experimental results on MovieLens show that the proposed RecDNNing outperforms state-of-the-art algorithms.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124649030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Memory Forensics: Recovering Chat Messages and Encryption Master Key 记忆取证:恢复聊天消息和加密主密钥
A. Kazim, Fadya Almaeeni, Shamsah Al Ali, Farkhund Iqbal, Khalil Al-Hussaeni
In this pervasive digital world, we are witnessing an era where cybercriminals are improving their abilities in taking advantage of wide-spread digital devices to perform various malicious activities. By utilizing anti-forensic techniques, cybercriminals are able to erase or alter digital evidence that can otherwise be used against them in court. One of the most critical sources of digital evidence that forensic investigators examine is the physical memory of a digital device, i.e., Random Access Memory (RAM). RAM is a volatile memory containing data that might be of significant value to forensic investigation. RAM, which stores data about recent activities, stores data only when the device is powered on. Once the device powers off, all the data stored in the RAM is lost permanently. Forensic investigators find great value in RAM data and thus need to preserve such data without harming the integrity of the collected evidence. Many existing tools provide the ability to acquire and analyze images of the data stored in RAM. This paper tackles the fundamental topic of security, privacy, and digital forensics. Specifically, this paper examines memory dumps of 4GB Windows 7 computers with the objective of identifying an instant messaging tool and recovering its chat messages, and recovering master encryption keys of volumes encrypted by BitLocker and TrueCrypt. Throughout this paper, we utilize two widely-used tools, namely Volatility and WinHex, due to their various functionalities designed specifically for memory forensic investigation.
在这个无处不在的数字世界里,我们正在见证一个网络犯罪分子利用广泛的数字设备进行各种恶意活动的能力不断提高的时代。通过利用反取证技术,网络犯罪分子能够删除或修改可能在法庭上对他们不利的数字证据。法医调查人员检查的最重要的数字证据来源之一是数字设备的物理内存,即随机存取存储器(RAM)。RAM是一种易失性存储器,其中包含的数据可能对法医调查有重要价值。存储最近活动数据的RAM仅在设备上电时存储数据。一旦设备断电,存储在RAM中的所有数据将永久丢失。法医调查人员在RAM数据中发现了巨大的价值,因此需要在不损害所收集证据完整性的情况下保存这些数据。许多现有的工具提供了获取和分析存储在RAM中的数据映像的能力。本文讨论了安全、隐私和数字取证的基本主题。具体而言,本文研究了4GB Windows 7计算机的内存转储,目的是识别即时通讯工具并恢复其聊天消息,并恢复由BitLocker和TrueCrypt加密的卷的主加密密钥。在本文中,我们使用了两个广泛使用的工具,即波动性和WinHex,因为它们具有专门为内存取证调查设计的各种功能。
{"title":"Memory Forensics: Recovering Chat Messages and Encryption Master Key","authors":"A. Kazim, Fadya Almaeeni, Shamsah Al Ali, Farkhund Iqbal, Khalil Al-Hussaeni","doi":"10.1109/IACS.2019.8809179","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809179","url":null,"abstract":"In this pervasive digital world, we are witnessing an era where cybercriminals are improving their abilities in taking advantage of wide-spread digital devices to perform various malicious activities. By utilizing anti-forensic techniques, cybercriminals are able to erase or alter digital evidence that can otherwise be used against them in court. One of the most critical sources of digital evidence that forensic investigators examine is the physical memory of a digital device, i.e., Random Access Memory (RAM). RAM is a volatile memory containing data that might be of significant value to forensic investigation. RAM, which stores data about recent activities, stores data only when the device is powered on. Once the device powers off, all the data stored in the RAM is lost permanently. Forensic investigators find great value in RAM data and thus need to preserve such data without harming the integrity of the collected evidence. Many existing tools provide the ability to acquire and analyze images of the data stored in RAM. This paper tackles the fundamental topic of security, privacy, and digital forensics. Specifically, this paper examines memory dumps of 4GB Windows 7 computers with the objective of identifying an instant messaging tool and recovering its chat messages, and recovering master encryption keys of volumes encrypted by BitLocker and TrueCrypt. Throughout this paper, we utilize two widely-used tools, namely Volatility and WinHex, due to their various functionalities designed specifically for memory forensic investigation.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"570 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126104859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
ICICS 2019 Sponsors ICICS 2019赞助商
{"title":"ICICS 2019 Sponsors","authors":"","doi":"10.1109/iacs.2019.8809130","DOIUrl":"https://doi.org/10.1109/iacs.2019.8809130","url":null,"abstract":"","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121335249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Full-Car Active Suspension System 坚固的全车主动悬架系统
Y. M. Al-Rawashdeh, S. E. Ferik, M. A. Abido
In this paper, a robust full-car active suspension system is designed. All parameters involved, except those related to the chassis of the car, are considered uncertain and the center of gravity position is assumed to be fixed. The resulting uncertain system constitutes of many uncertain parameters and the robust problem is found to be non-convex. Particle Swarm Optimization technique is devised to solve this problem resulting in an iterative PSO/LMI optimization algorithm. SimMechanics is used to build the nonlinear full-car model and to allow future extensions such that complex cases can be considered, i.e., the passengers, goods, or the like might be uncertain or having their own dynamics onboard.
本文设计了一种鲁棒的整车主动悬架系统。除了与汽车底盘有关的参数外,所涉及的所有参数都被认为是不确定的,并且假定重心位置是固定的。得到的不确定系统由许多不确定参数组成,鲁棒性问题是非凸的。为了解决这一问题,提出了粒子群优化技术,得到了一种迭代的粒子群优化算法。SimMechanics用于建立非线性全车模型,并允许将来的扩展,以便考虑复杂的情况,即乘客,货物或类似的东西可能是不确定的或有自己的动态。
{"title":"Robust Full-Car Active Suspension System","authors":"Y. M. Al-Rawashdeh, S. E. Ferik, M. A. Abido","doi":"10.1109/IACS.2019.8809167","DOIUrl":"https://doi.org/10.1109/IACS.2019.8809167","url":null,"abstract":"In this paper, a robust full-car active suspension system is designed. All parameters involved, except those related to the chassis of the car, are considered uncertain and the center of gravity position is assumed to be fixed. The resulting uncertain system constitutes of many uncertain parameters and the robust problem is found to be non-convex. Particle Swarm Optimization technique is devised to solve this problem resulting in an iterative PSO/LMI optimization algorithm. SimMechanics is used to build the nonlinear full-car model and to allow future extensions such that complex cases can be considered, i.e., the passengers, goods, or the like might be uncertain or having their own dynamics onboard.","PeriodicalId":225697,"journal":{"name":"2019 10th International Conference on Information and Communication Systems (ICICS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124803116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 10th International Conference on Information and Communication Systems (ICICS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1