首页 > 最新文献

2013 European Intelligence and Security Informatics Conference最新文献

英文 中文
Document Fraud Detection at the Border: Preliminary Observations on Human and Machine Performance 边境文件欺诈检测:对人和机器性能的初步观察
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.62
Monica Gariup, G. Soederlind
How many false documents (forged and counterfeited) cross the border undetected? What is the real extent of the phenomenon of document fraud at the border? How good are border officers and their technical equipment at detecting fraud in the first line? How can we measure the impact of capacity-building measures (training and technology) in the field of document fraud detection? This paper proposes to approach the traditional problem of "known unknown" of risk analysis by taking the performance of detection capabilities - human and machine-supported - seriously. It argues that capability-based vulnerabilities need to be systematically assessed quantitatively and qualitatively in order to make sense of the risk and to devise, test, and measure the effectiveness of countermeasures. The paper reports the preliminary results of an exercise simulating the first line of document inspection at the border. European document experts and automated document inspection systems were challenged to recognize genuine and false documents under a very tight time constraint. Although the experiment suffered of many methodological weaknesses due to the limitations of the context in which it was conducted, a number of initial observations can be drawn on the importance of human skills and experience, the strengths and shortcomings of automated systems, and the need to further test and study how human and machine capabilities can be improved and combined in order to increase their detection effectiveness and thus strengthen border security.
有多少虚假文件(伪造和伪造的)在未被发现的情况下通过了边境?边境证件欺诈现象的真实程度有多严重?边境官员和他们的技术设备在第一线发现欺诈的能力有多好?我们如何衡量能力建设措施(培训和技术)在文件欺诈检测领域的影响?本文提出通过重视检测能力的性能(人力和机器支持)来解决风险分析中传统的“已知未知”问题。它认为,基于能力的脆弱性需要系统地进行定量和定性评估,以便理解风险并设计、测试和衡量对策的有效性。本文报道了模拟边境证件检查第一线演习的初步结果。欧洲文件专家和自动文件检查系统面临着在非常紧迫的时间限制下识别真假文件的挑战。尽管由于进行实验的背景的限制,该实验在方法上存在许多弱点,但可以从人类技能和经验的重要性、自动化系统的优点和缺点以及进一步测试和研究如何改进和结合人与机器的能力以提高其检测效率,从而加强边境安全的必要性等方面得出一些初步观察结果。
{"title":"Document Fraud Detection at the Border: Preliminary Observations on Human and Machine Performance","authors":"Monica Gariup, G. Soederlind","doi":"10.1109/EISIC.2013.62","DOIUrl":"https://doi.org/10.1109/EISIC.2013.62","url":null,"abstract":"How many false documents (forged and counterfeited) cross the border undetected? What is the real extent of the phenomenon of document fraud at the border? How good are border officers and their technical equipment at detecting fraud in the first line? How can we measure the impact of capacity-building measures (training and technology) in the field of document fraud detection? This paper proposes to approach the traditional problem of \"known unknown\" of risk analysis by taking the performance of detection capabilities - human and machine-supported - seriously. It argues that capability-based vulnerabilities need to be systematically assessed quantitatively and qualitatively in order to make sense of the risk and to devise, test, and measure the effectiveness of countermeasures. The paper reports the preliminary results of an exercise simulating the first line of document inspection at the border. European document experts and automated document inspection systems were challenged to recognize genuine and false documents under a very tight time constraint. Although the experiment suffered of many methodological weaknesses due to the limitations of the context in which it was conducted, a number of initial observations can be drawn on the importance of human skills and experience, the strengths and shortcomings of automated systems, and the need to further test and study how human and machine capabilities can be improved and combined in order to increase their detection effectiveness and thus strengthen border security.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132721768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Contextualisation of Geographical Scraped Data to Support Human Judgment and Classification 地理抓取数据的语境化以支持人类的判断和分类
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.33
Luca Mazzola, A. Tsois, T. Dimitrova, E. Camossi
When dealing with information extraction or data mining for security, one of the prerequisite is the data cleaning process, a process that influence deeply the final result. This is particularly true in case of data scraped automatically from online sources (web pages) that contain geographical or geo-referenced information. In this paper we present a model, and a first partial implementation, for location resolution of string descriptions. The domain is the monitoring and analysis of maritime container traffic, relying on the status messages generated by container carriers. The model is based on the usage of three different data dimensions: string similarity, trajectories similarity and most frequent patterns. The realized interface, through a map-based view, provide an integration of the three dimensions. This functionality supports human experts in associating a location to the string description provided in the raw record, in order to improve the numbers of messages usable for route-based analysis.
在进行安全信息提取或数据挖掘时,数据清洗过程是一个重要的前提条件,它对最终结果的影响很大。对于从包含地理或地理参考信息的在线资源(网页)中自动抓取的数据尤其如此。在本文中,我们提出了一个模型和第一部分实现,用于字符串描述的位置解析。该领域是对海上集装箱交通的监控和分析,依赖于集装箱承运人产生的状态信息。该模型基于三个不同数据维度的使用:字符串相似性、轨迹相似性和最常见的模式。所实现的界面,通过基于地图的视图,提供了三个维度的集成。此功能支持人类专家将位置与原始记录中提供的字符串描述相关联,以便增加可用于基于路由的分析的消息数量。
{"title":"Contextualisation of Geographical Scraped Data to Support Human Judgment and Classification","authors":"Luca Mazzola, A. Tsois, T. Dimitrova, E. Camossi","doi":"10.1109/EISIC.2013.33","DOIUrl":"https://doi.org/10.1109/EISIC.2013.33","url":null,"abstract":"When dealing with information extraction or data mining for security, one of the prerequisite is the data cleaning process, a process that influence deeply the final result. This is particularly true in case of data scraped automatically from online sources (web pages) that contain geographical or geo-referenced information. In this paper we present a model, and a first partial implementation, for location resolution of string descriptions. The domain is the monitoring and analysis of maritime container traffic, relying on the status messages generated by container carriers. The model is based on the usage of three different data dimensions: string similarity, trajectories similarity and most frequent patterns. The realized interface, through a map-based view, provide an integration of the three dimensions. This functionality supports human experts in associating a location to the string description provided in the raw record, in order to improve the numbers of messages usable for route-based analysis.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134210310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Threats to Peace: Threat Perception and the Persistence or Desistance of Violent Conflict 对和平的威胁:威胁感知与暴力冲突的持续或停止
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.41
A. Sliva, M. Malyutov, G. Pierce, Xin Li
In international security, there are many cases of inter-group conflict where violence persists and conflict-oriented policies dominate at the expense of a more mutually beneficial allocation of societal goods. What are the barriers to successful negotiation in such scenarios, and why are conflict management policies difficult to achieve? Most studies of conflict focus on high-level political, economic, or sociological causes, however, psychological influences on decision-making, such as threat and personal motivation, play a large role in impeding conflict resolution or negotiation. In this paper, we analyze the psychological dynamics of threat perception and vested interests on the persistence or desistence of conflict. Threat perception can cause sudden and dramatic shifts in opinion and political choices, an effect which can be further amplified by media reporting. Leaders with a vested personal interest in continued conflict-"spoilers"-can manipulate this phenomenon to derail a peace process. We present a dynamic game theoretic framework of parallel inter-group negotiation and conflict models that incorporates this feedback between threat perception, motivations, leadership decisions, and the success of negotiations, explicitly representing the psychological components of conflict. A prototype implementation is used in empirical simulations to identify cases of conflict persistence and desistence.
在国际安全方面,有许多群体间冲突的情况,暴力持续存在,以冲突为导向的政策占主导地位,牺牲了更有利于社会利益的分配。在这种情况下,成功谈判的障碍是什么?为什么冲突管理政策难以实现?大多数关于冲突的研究都集中在高层次的政治、经济或社会学原因上,然而,对决策的心理影响,如威胁和个人动机,在阻碍冲突解决或谈判方面发挥了很大的作用。本文分析了威胁感知和既得利益对冲突持续或终止的心理动态影响。对威胁的感知可能导致观点和政治选择突然而剧烈的转变,这种影响可能因媒体报道而进一步放大。在持续的冲突中有既得利益的领导人——“破坏者”——可以操纵这种现象来破坏和平进程。我们提出了一个平行群体间谈判和冲突模型的动态博弈论框架,该模型结合了威胁感知、动机、领导决策和谈判成功之间的反馈,明确地代表了冲突的心理成分。在经验模拟中使用原型实现来识别冲突持续和停止的情况。
{"title":"Threats to Peace: Threat Perception and the Persistence or Desistance of Violent Conflict","authors":"A. Sliva, M. Malyutov, G. Pierce, Xin Li","doi":"10.1109/EISIC.2013.41","DOIUrl":"https://doi.org/10.1109/EISIC.2013.41","url":null,"abstract":"In international security, there are many cases of inter-group conflict where violence persists and conflict-oriented policies dominate at the expense of a more mutually beneficial allocation of societal goods. What are the barriers to successful negotiation in such scenarios, and why are conflict management policies difficult to achieve? Most studies of conflict focus on high-level political, economic, or sociological causes, however, psychological influences on decision-making, such as threat and personal motivation, play a large role in impeding conflict resolution or negotiation. In this paper, we analyze the psychological dynamics of threat perception and vested interests on the persistence or desistence of conflict. Threat perception can cause sudden and dramatic shifts in opinion and political choices, an effect which can be further amplified by media reporting. Leaders with a vested personal interest in continued conflict-\"spoilers\"-can manipulate this phenomenon to derail a peace process. We present a dynamic game theoretic framework of parallel inter-group negotiation and conflict models that incorporates this feedback between threat perception, motivations, leadership decisions, and the success of negotiations, explicitly representing the psychological components of conflict. A prototype implementation is used in empirical simulations to identify cases of conflict persistence and desistence.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128415156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Physiological Signals: The Next Generation Authentication and Identification Methods!? 生理信号:新一代认证与鉴定方法!?
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.35
E. V. D. Broek, Martijn Spitters
Throughout the last 40 years, the security breach caused by human error is often disregarded. To relief the latter problem, this article introduces a new class of biometrics that is founded on processing physiological personal features, as opposed to physical and behavioral features. After an introduction on authentication, physiological signals are discussed, including their advantages, disadvantages, and initial directives for obtaining them. This new class of authentication methods can increase biometrics' robustness and enables cross validation. I close this article with a brief discussion in which a recap of the article is provided, law, privacy, and ethical issues are discussed, some suggestions for the processing pipeline of this new class of authentication methods are done, and conclusions are drawn.
在过去的40年里,人为错误造成的安全漏洞经常被忽视。为了缓解后一个问题,本文介绍了一类新的生物识别技术,它建立在处理生理个人特征的基础上,而不是物理和行为特征。在介绍了认证之后,讨论了生理信号,包括它们的优点、缺点和获得它们的初始指令。这类新的身份验证方法可以提高生物识别的鲁棒性并实现交叉验证。在本文的最后,我对本文进行了简要的回顾,讨论了法律、隐私和道德问题,对这类新型身份验证方法的处理流程提出了一些建议,并得出了结论。
{"title":"Physiological Signals: The Next Generation Authentication and Identification Methods!?","authors":"E. V. D. Broek, Martijn Spitters","doi":"10.1109/EISIC.2013.35","DOIUrl":"https://doi.org/10.1109/EISIC.2013.35","url":null,"abstract":"Throughout the last 40 years, the security breach caused by human error is often disregarded. To relief the latter problem, this article introduces a new class of biometrics that is founded on processing physiological personal features, as opposed to physical and behavioral features. After an introduction on authentication, physiological signals are discussed, including their advantages, disadvantages, and initial directives for obtaining them. This new class of authentication methods can increase biometrics' robustness and enables cross validation. I close this article with a brief discussion in which a recap of the article is provided, law, privacy, and ethical issues are discussed, some suggestions for the processing pipeline of this new class of authentication methods are done, and conclusions are drawn.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122743112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fast Name Searching on GPU GPU快速名称查询
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.49
V. M. Pais, D. Ciobanu
This paper presents an algorithm for performing name searches using various metrics. Parallelism in the algorithm is exploited in order to obtain an implementation running on GPUs.
本文提出了一种使用各种度量执行名称搜索的算法。该算法的并行性被利用,以获得在gpu上运行的实现。
{"title":"Fast Name Searching on GPU","authors":"V. M. Pais, D. Ciobanu","doi":"10.1109/EISIC.2013.49","DOIUrl":"https://doi.org/10.1109/EISIC.2013.49","url":null,"abstract":"This paper presents an algorithm for performing name searches using various metrics. Parallelism in the algorithm is exploited in order to obtain an implementation running on GPUs.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132918656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Societal Cyberwar Theory Applied: The Disruptive Power of State Actor Aggression for Public Sector Information Security 社会网络战理论的应用:国家行为者侵略对公共部门信息安全的破坏性力量
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.47
Jan Kallberg, B. Thuraisingham, Erik Lakomaa
The modern welfare state faces significant challenges to be able to sustain a systematic cyber conflict that pursues the institutional destabilization of the targeted state. Cyber defense in these advanced democracies are limited, unstructured, and focused on anecdotal cyber interchanges of marginal geopolitical value. The factual reach of government activities once a conflict is initiated is likely to be miniscule. Therefore the information security activities, and assessments leading to cyber defense efforts, have to be strategically pre-event coordinated within the state. This coordination should be following a framework that ensures institutional stability, public trust, and limit challenges to the state. The paper presents a case to use societal cyber war theory to create a public sector cyber defense strategy beforehand facing a massive state actor initiated automated systematic cyber attacks to limit the risk for a societal system shock. Societal cyber war theory utilizes a theoretical framework created by political scientist Dwight Waldo for government stability, turns it upside down, and uses the theory to identify cyber targets and aim points. As a theory it can be used in cyber defense and offense as the institutional weaknesses can be either attacked or defended. According to societal cyber war theory the aim points to be targeted by an automated premeditated systematic attack that will cripple the targeted nation is the five pillars that upholds the state - legitimacy, authority, knowledge, control, and confidence. The failure to protect the institutional stability could undermine the state's ability to avoid submission to foreign power.
现代福利国家面临着重大挑战,无法维持一场系统性的网络冲突,这种冲突旨在破坏目标国家的制度稳定。这些发达民主国家的网络防御是有限的、非结构化的,并且专注于具有边际地缘政治价值的零星网络交换。一旦发生冲突,政府活动的实际影响范围很可能微乎其微。因此,信息安全活动和导致网络防御努力的评估必须在国家内部进行战略上的事前协调。这种协调应该遵循一个确保机构稳定、公众信任和限制对国家挑战的框架。本文提出了一个案例,利用社会网络战理论,在面对大规模国家行为者发起的自动系统网络攻击之前,制定公共部门网络防御战略,以限制社会系统冲击的风险。社会网络战理论利用政治学家德怀特·沃尔多(Dwight Waldo)为政府稳定创造的理论框架,将其颠倒过来,并利用该理论识别网络目标和瞄准点。作为一种理论,它可以用于网络防御和进攻,因为制度弱点既可以攻击也可以防御。根据社会网络战理论,有预谋的自动系统攻击的目标是削弱目标国家的五大支柱——合法性、权威、知识、控制和信心。如果不能维护制度稳定,可能会削弱该国避免屈服于外国势力的能力。
{"title":"Societal Cyberwar Theory Applied: The Disruptive Power of State Actor Aggression for Public Sector Information Security","authors":"Jan Kallberg, B. Thuraisingham, Erik Lakomaa","doi":"10.1109/EISIC.2013.47","DOIUrl":"https://doi.org/10.1109/EISIC.2013.47","url":null,"abstract":"The modern welfare state faces significant challenges to be able to sustain a systematic cyber conflict that pursues the institutional destabilization of the targeted state. Cyber defense in these advanced democracies are limited, unstructured, and focused on anecdotal cyber interchanges of marginal geopolitical value. The factual reach of government activities once a conflict is initiated is likely to be miniscule. Therefore the information security activities, and assessments leading to cyber defense efforts, have to be strategically pre-event coordinated within the state. This coordination should be following a framework that ensures institutional stability, public trust, and limit challenges to the state. The paper presents a case to use societal cyber war theory to create a public sector cyber defense strategy beforehand facing a massive state actor initiated automated systematic cyber attacks to limit the risk for a societal system shock. Societal cyber war theory utilizes a theoretical framework created by political scientist Dwight Waldo for government stability, turns it upside down, and uses the theory to identify cyber targets and aim points. As a theory it can be used in cyber defense and offense as the institutional weaknesses can be either attacked or defended. According to societal cyber war theory the aim points to be targeted by an automated premeditated systematic attack that will cripple the targeted nation is the five pillars that upholds the state - legitimacy, authority, knowledge, control, and confidence. The failure to protect the institutional stability could undermine the state's ability to avoid submission to foreign power.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"85 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123283696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Integration of Media Sources for Situation Analysis in the Different Phases of Disaster Management: The QuOIMA Project 灾害管理不同阶段情境分析的媒体资源整合:QuOIMA项目
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.31
G. Backfried, Johannes Göllner, G. Quirchmayr, K. Rainer, G. Kienast, G. Thallinger, Christian Schmidt, Andreas Peer
In this paper we describe work in progress on a cross-media content analysis approach and framework, which is currently being developed within the QuOIMA project. We describe the role of media, and how possible links between social and traditional media and terminology and communication patterns are envisioned to be connected to the different phases of a disaster model. The paper continues with a discussion of potential benefits for decision makers and planners and concludes with an outlook on further planned activities and developments.
在本文中,我们描述了跨媒体内容分析方法和框架的进展情况,该方法和框架目前正在QuOIMA项目中开发。我们描述了媒体的作用,以及如何将社会媒体和传统媒体、术语和传播模式之间的可能联系与灾难模型的不同阶段联系起来。本文继续讨论了决策者和规划者的潜在利益,最后展望了进一步计划的活动和发展。
{"title":"Integration of Media Sources for Situation Analysis in the Different Phases of Disaster Management: The QuOIMA Project","authors":"G. Backfried, Johannes Göllner, G. Quirchmayr, K. Rainer, G. Kienast, G. Thallinger, Christian Schmidt, Andreas Peer","doi":"10.1109/EISIC.2013.31","DOIUrl":"https://doi.org/10.1109/EISIC.2013.31","url":null,"abstract":"In this paper we describe work in progress on a cross-media content analysis approach and framework, which is currently being developed within the QuOIMA project. We describe the role of media, and how possible links between social and traditional media and terminology and communication patterns are envisioned to be connected to the different phases of a disaster model. The paper continues with a discussion of potential benefits for decision makers and planners and concludes with an outlook on further planned activities and developments.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126156848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Cyber Crime in Privately Held Information Systems: Personal Data at Stake 私人信息系统中的网络犯罪:个人数据危在旦夕
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.25
M. Hengst, M. Warnier
This paper describes the possible threats of cyber crime in privately held information systems. Privately held information systems contain large amounts of personal data and are owned by organizations. Data breaches through which confidential and personal information is stolen from these privately held information systems happen more often than we know. Some examples of data breaches are presented in this paper, together with an overview of the means to perform these data breaches, the impact these data breaches have on organizations and individuals and possible measures that could be taken to prevent data breaches to occur.
本文描述了私人信息系统中可能存在的网络犯罪威胁。私人持有的信息系统包含大量个人数据,由组织拥有。从这些私人持有的信息系统中窃取机密和个人信息的数据泄露事件发生的频率比我们所知道的要高。本文介绍了一些数据泄露的例子,并概述了执行这些数据泄露的方法,这些数据泄露对组织和个人的影响以及可能采取的防止数据泄露发生的措施。
{"title":"Cyber Crime in Privately Held Information Systems: Personal Data at Stake","authors":"M. Hengst, M. Warnier","doi":"10.1109/EISIC.2013.25","DOIUrl":"https://doi.org/10.1109/EISIC.2013.25","url":null,"abstract":"This paper describes the possible threats of cyber crime in privately held information systems. Privately held information systems contain large amounts of personal data and are owned by organizations. Data breaches through which confidential and personal information is stolen from these privately held information systems happen more often than we know. Some examples of data breaches are presented in this paper, together with an overview of the means to perform these data breaches, the impact these data breaches have on organizations and individuals and possible measures that could be taken to prevent data breaches to occur.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126431026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Recent Advances in the Development of a Long-Text-Input Keystroke Biometric Authentication System for Arbitrary Text Input 面向任意文本输入的长文本输入按键生物识别认证系统的研究进展
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.16
John V. Monaco, Ned Bakelman, Sung-Hyuk Cha, C. Tappert
This study focuses on the development and evaluation of a new classification algorithm that halves the previously reported best error rate. Using keystroke data from 119 users, closed system performance was obtained as a function of the number of keystrokes per sample. The applications of interest are authenticating online student test takers and computer users in security sensitive environments. The authentication process operates on keystroke data windows as short as 1/2 minute. Performance was obtained on 119 test users compared to the previous maximum of 30. For each population size, the performance increases, and the equal error rate decreases, as the number of keystrokes per sample increases. Performance on 14, 30, and 119 users was 99.6%, 98.3%, and 96.3%, respectively, on 755-keystroke samples, indicating the potential of this approach. Because the mean population performance does not give the complete picture, the varied performance over the population of users was analyzed.
本研究的重点是开发和评估一种新的分类算法,该算法将先前报道的最佳错误率减半。使用来自119个用户的击键数据,获得封闭系统性能作为每个样本击键次数的函数。感兴趣的应用是在安全敏感的环境中对在线学生考生和计算机用户进行身份验证。身份验证过程在短至1/2分钟的击键数据窗口上运行。与之前最多30个测试用户相比,119个测试用户获得了性能。对于每个总体大小,随着每个样本击键次数的增加,性能会提高,错误率会降低。在755个击键样本中,14、30和119个用户的性能分别为99.6%、98.3%和96.3%,这表明了这种方法的潜力。因为平均总体性能不能给出完整的图像,所以我们分析了用户总体上的不同性能。
{"title":"Recent Advances in the Development of a Long-Text-Input Keystroke Biometric Authentication System for Arbitrary Text Input","authors":"John V. Monaco, Ned Bakelman, Sung-Hyuk Cha, C. Tappert","doi":"10.1109/EISIC.2013.16","DOIUrl":"https://doi.org/10.1109/EISIC.2013.16","url":null,"abstract":"This study focuses on the development and evaluation of a new classification algorithm that halves the previously reported best error rate. Using keystroke data from 119 users, closed system performance was obtained as a function of the number of keystrokes per sample. The applications of interest are authenticating online student test takers and computer users in security sensitive environments. The authentication process operates on keystroke data windows as short as 1/2 minute. Performance was obtained on 119 test users compared to the previous maximum of 30. For each population size, the performance increases, and the equal error rate decreases, as the number of keystrokes per sample increases. Performance on 14, 30, and 119 users was 99.6%, 98.3%, and 96.3%, respectively, on 755-keystroke samples, indicating the potential of this approach. Because the mean population performance does not give the complete picture, the varied performance over the population of users was analyzed.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"384 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132474737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
OptaSense® Distributed Acoustic and Seismic Sensing Performance for Multi-threat, Multi-environment Border Monitoring OptaSense®分布式声学和地震传感性能,用于多威胁,多环境边界监测
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.70
G. Duckworth, Archibald Owen, Jerry Worsley, Henry Stephenson
The OptaSense® Distributed Acoustic Sensing (DAS) technology turns any cable with single-mode optical fiber into a very large and densely sampled acoustic/seismic sensor array, covering up to a 50-kilometer aperture per system with """"virtual"""" sensor separations as small as one eter. The system uses Rayleigh scattering from the mperfections in the fiber to return optical signals measuring local fiber strain from seismic, air and water acoustic disturbances. The scalable system architecture can provide border monitoring over long distances at low cost, high sensitivity, and high location accuracy. This paper presents system performance examples for detection, localization, and classification of multiple threats (e.g. digging and tunneling, personnel footsteps, gunshots, and aircraft) in a variety of environments, including snow cover.
OptaSense®分布式声学传感(DAS)技术将任何带有单模光纤的电缆变成非常大且密集采样的声学/地震传感器阵列,每个系统覆盖高达50公里的孔径,""""虚拟""""传感器间距小至1米。该系统利用光纤中不完美的瑞利散射来返回光信号,测量地震、空气和水声干扰下的局部光纤应变。可扩展的系统架构可以提供低成本、高灵敏度和高定位精度的长距离边境监测。本文介绍了在各种环境(包括积雪)中对多种威胁(例如挖掘和隧道、人员脚步声、枪声和飞机)进行检测、定位和分类的系统性能示例。
{"title":"OptaSense® Distributed Acoustic and Seismic Sensing Performance for Multi-threat, Multi-environment Border Monitoring","authors":"G. Duckworth, Archibald Owen, Jerry Worsley, Henry Stephenson","doi":"10.1109/EISIC.2013.70","DOIUrl":"https://doi.org/10.1109/EISIC.2013.70","url":null,"abstract":"The OptaSense® Distributed Acoustic Sensing (DAS) technology turns any cable with single-mode optical fiber into a very large and densely sampled acoustic/seismic sensor array, covering up to a 50-kilometer aperture per system with \"\"\"\"virtual\"\"\"\" sensor separations as small as one eter. The system uses Rayleigh scattering from the mperfections in the fiber to return optical signals measuring local fiber strain from seismic, air and water acoustic disturbances. The scalable system architecture can provide border monitoring over long distances at low cost, high sensitivity, and high location accuracy. This paper presents system performance examples for detection, localization, and classification of multiple threats (e.g. digging and tunneling, personnel footsteps, gunshots, and aircraft) in a variety of environments, including snow cover.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133661499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2013 European Intelligence and Security Informatics Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1