首页 > 最新文献

2018 International Conference on Platform Technology and Service (PlatCon)最新文献

英文 中文
Reminder as ‘Watch-Out’: The Role of Privacy Salience at the Point of Interaction with Biometric Systems 作为“警惕”的提醒:在与生物识别系统交互时隐私突出的作用
Pub Date : 2018-09-25 DOI: 10.1109/PLATCON.2018.8472767
Junhyoung Oh, Ukjin Lee, K. Lee
Biometrics users are concerned about privacy issues, while personal recognition methods are automated and easy to use. For users who want to protect their biometric information, practitioners need to take action in the public interest to better prevent users from leaking their biometric information in situations where the user interacts with the biometric system. This study explores how the user can perceive the consequences of registering biometric information through the Theory of Planned Behavior and attitude aspects. Sensitivity to potential consequences of the biological system was confirmed by the behavior and response observed by the subjects after using the biometric system. The sensitivity of the experimental group was found to be higher than that of the control group. Therefore, this study suggests that simple information presentation in system interaction can lead to more protective against privacy issue.
生物识别技术的用户担心隐私问题,而个人识别方法是自动化的,易于使用。对于希望保护其生物特征信息的用户,从业者需要采取符合公众利益的行动,以更好地防止用户在与生物特征系统交互的情况下泄露其生物特征信息。本研究探讨了用户如何通过计划行为理论和态度方面来感知注册生物特征信息的后果。使用生物识别系统后,受试者观察到的行为和反应证实了对生物系统潜在后果的敏感性。发现实验组的灵敏度高于对照组。因此,本研究表明,在系统交互中,简单的信息呈现可以更好地保护隐私问题。
{"title":"Reminder as ‘Watch-Out’: The Role of Privacy Salience at the Point of Interaction with Biometric Systems","authors":"Junhyoung Oh, Ukjin Lee, K. Lee","doi":"10.1109/PLATCON.2018.8472767","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472767","url":null,"abstract":"Biometrics users are concerned about privacy issues, while personal recognition methods are automated and easy to use. For users who want to protect their biometric information, practitioners need to take action in the public interest to better prevent users from leaking their biometric information in situations where the user interacts with the biometric system. This study explores how the user can perceive the consequences of registering biometric information through the Theory of Planned Behavior and attitude aspects. Sensitivity to potential consequences of the biological system was confirmed by the behavior and response observed by the subjects after using the biometric system. The sensitivity of the experimental group was found to be higher than that of the control group. Therefore, this study suggests that simple information presentation in system interaction can lead to more protective against privacy issue.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126341265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Risk Management to Cryptocurrency Exchange and Investors Guidelines to Prevent Potential Threats 加密货币交易所的风险管理和防范潜在威胁的投资者指南
Pub Date : 2018-09-25 DOI: 10.1109/PLATCON.2018.8472760
Chang Yeon Kim, K. Lee
Investment and interest in cryptocurrency is rapidly growing. The price of each bitcoin, in particular, has exceeded 10,000 dollars as of November 2017, so we do not know how long the uptrend will continue. Although blockchain technology is more open and security oriented than conventional currency issuing methods, it is relatively ineffective in terms of distribution and management of cryptocurrency. The most common way to get cryptocurrency is trading through exchange and mining, which novices sometimes invest in without sufficient knowledge. Therefore, this paper analyzes vulnerabilities of potential cryptocurrency exchanges and individual user wallets. Moreover, this paper will suggest policy risk management methods using international standards such as from NIST and ISO. Blockchain, weaknesses of countermeasures management system, countermeasures to deal with them, management vulnerability of investors and management plan. Server management plan and personal action tips will be provided.
对加密货币的投资和兴趣正在迅速增长。特别是,截至2017年11月,每个比特币的价格已经超过了1万美元,所以我们不知道上升趋势会持续多久。虽然区块链技术比传统的货币发行方式更加开放和安全,但在加密货币的分发和管理方面相对低效。获得加密货币最常见的方式是通过交易所和挖矿进行交易,新手有时在没有足够知识的情况下进行投资。因此,本文分析了潜在的加密货币交易所和个人用户钱包的漏洞。此外,本文将建议使用NIST和ISO等国际标准进行政策风险管理。区块链,对策管理体系的弱点,应对对策,投资者的管理脆弱性,管理方案。提供服务器管理计划和个人操作技巧。
{"title":"Risk Management to Cryptocurrency Exchange and Investors Guidelines to Prevent Potential Threats","authors":"Chang Yeon Kim, K. Lee","doi":"10.1109/PLATCON.2018.8472760","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472760","url":null,"abstract":"Investment and interest in cryptocurrency is rapidly growing. The price of each bitcoin, in particular, has exceeded 10,000 dollars as of November 2017, so we do not know how long the uptrend will continue. Although blockchain technology is more open and security oriented than conventional currency issuing methods, it is relatively ineffective in terms of distribution and management of cryptocurrency. The most common way to get cryptocurrency is trading through exchange and mining, which novices sometimes invest in without sufficient knowledge. Therefore, this paper analyzes vulnerabilities of potential cryptocurrency exchanges and individual user wallets. Moreover, this paper will suggest policy risk management methods using international standards such as from NIST and ISO. Blockchain, weaknesses of countermeasures management system, countermeasures to deal with them, management vulnerability of investors and management plan. Server management plan and personal action tips will be provided.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122722836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Facial Landmark Extraction Scheme Based on Semantic Segmentation 基于语义分割的人脸地标提取方法
Pub Date : 2018-09-25 DOI: 10.1109/PLATCON.2018.8472730
H. Kim, Jisoo Park, Hyeonwoo Kim, Eenjun Hwang
Facial landmark is a set of features that can be distinguished in the human face with the naked eye. Typical facial landmark includes eyes, eyebrows, nose and mouth. It plays an important role in the human-related image analysis. For example, it can be used to determine whether human beings exist in the image, identify who the person is or recognize the orientation of a face when photographing. Methods for detecting facial landmark can be classified into two groups: One group is based on traditional image processing techniques such as Haar-cascade and edge detection. The other group is based on machine learning technique where landmark is detected through training facial features. However, such techniques have shown low accuracy, especially in the exceptional conditions such as low luminance or overlapped face. To overcome this problem, we propose a new facial landmark extraction scheme using deep learning and semantic segmentation and demonstrate that with even small dataset, our scheme can achieve excellent facial landmark extraction performance.
面部标志是人类面部可以用肉眼识别的一组特征。典型的面部标志包括眼睛、眉毛、鼻子和嘴巴。它在与人相关的图像分析中起着重要的作用。例如,它可以用来确定图像中是否存在人,识别人是谁,或者在拍摄时识别人脸的方向。人脸特征点的检测方法可以分为两类:一类是基于haar级联和边缘检测等传统图像处理技术。另一组是基于机器学习技术,通过训练面部特征来检测地标。然而,这种技术的精度较低,特别是在低亮度或重叠面等特殊条件下。为了克服这一问题,我们提出了一种新的基于深度学习和语义分割的人脸特征提取方案,并证明了即使在较小的数据集上,我们的方案也能取得优异的人脸特征提取性能。
{"title":"Facial Landmark Extraction Scheme Based on Semantic Segmentation","authors":"H. Kim, Jisoo Park, Hyeonwoo Kim, Eenjun Hwang","doi":"10.1109/PLATCON.2018.8472730","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472730","url":null,"abstract":"Facial landmark is a set of features that can be distinguished in the human face with the naked eye. Typical facial landmark includes eyes, eyebrows, nose and mouth. It plays an important role in the human-related image analysis. For example, it can be used to determine whether human beings exist in the image, identify who the person is or recognize the orientation of a face when photographing. Methods for detecting facial landmark can be classified into two groups: One group is based on traditional image processing techniques such as Haar-cascade and edge detection. The other group is based on machine learning technique where landmark is detected through training facial features. However, such techniques have shown low accuracy, especially in the exceptional conditions such as low luminance or overlapped face. To overcome this problem, we propose a new facial landmark extraction scheme using deep learning and semantic segmentation and demonstrate that with even small dataset, our scheme can achieve excellent facial landmark extraction performance.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114791295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Efficient Video Series Decision Algorithm Based on Actor-Face Recognition 一种基于人脸识别的高效视频序列决策算法
Pub Date : 2018-09-25 DOI: 10.1109/PLATCON.2018.8472744
Hong-rae Lee, Hwee Kim, Yo-Sub Han, Yong-seok Seo, Dong-Hyuck Im
It is an important task to check whether or not an uploaded video on the Internet violates the copyright. One of the most common approaches for checking such videos is to compare an uploaded video with respect to the sample data provided the original owner. A disadvantage of this approach is that a large amount of sample data must be stored in the database before, and also the task becomes very challenging when an uploaded video is distorted. We propose a method of generating a signature set that characterizes a series of video sets based on face recognition data, and suggest an efficient method on how to identify which series is included in the corresponding series set. We demonstrate that the proposed method can effectively determine whether or not a video is in a series set even if the video data is relatively small as an input for the previous method.
在互联网上上传的视频是否侵犯版权是一项重要的工作。检查此类视频的最常见方法之一是将上传的视频与原始所有者提供的示例数据进行比较。这种方法的缺点是之前必须在数据库中存储大量的样本数据,并且当上传的视频失真时,任务变得非常困难。我们提出了一种基于人脸识别数据生成一系列视频集特征签名集的方法,并提出了一种有效的方法来识别哪些系列包含在相应的系列集中。我们证明了所提出的方法可以有效地确定视频是否在序列集中,即使视频数据相对较小,作为之前方法的输入。
{"title":"An Efficient Video Series Decision Algorithm Based on Actor-Face Recognition","authors":"Hong-rae Lee, Hwee Kim, Yo-Sub Han, Yong-seok Seo, Dong-Hyuck Im","doi":"10.1109/PLATCON.2018.8472744","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472744","url":null,"abstract":"It is an important task to check whether or not an uploaded video on the Internet violates the copyright. One of the most common approaches for checking such videos is to compare an uploaded video with respect to the sample data provided the original owner. A disadvantage of this approach is that a large amount of sample data must be stored in the database before, and also the task becomes very challenging when an uploaded video is distorted. We propose a method of generating a signature set that characterizes a series of video sets based on face recognition data, and suggest an efficient method on how to identify which series is included in the corresponding series set. We demonstrate that the proposed method can effectively determine whether or not a video is in a series set even if the video data is relatively small as an input for the previous method.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133733837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review of Cyber Security Controls from An ICS Perspective ICS视角下的网络安全控制综述
Pub Date : 2018-09-25 DOI: 10.1109/PLATCON.2018.8472757
Youngin You, Juhyeon Lee, Junhyoung Oh, K. Lee
As cyber attacks on national critical infrastructure have increased, researches are actively conducted to protect industrial control systems(ICS). Compared with existing IT systems, research on special attributes of ICS has been performed mainly, and based on this, many security requirements for ICSs have been derived. However, there is insufficient research on security control to understand and improve the security status of target ICS. To the best of our knowledge, only a comprehensive guide to applying existing security controls to ICSs is being presented. Therefore, this study suggests implications for the current security control items from the ICS point of view. For this purpose, each viewpoint for categorizing and analyzing information security control items was established and based on this, an integrated matrix of ICS security control was derived. Through the ICS security control matrix, the information security control items currently being guided are analyzed from the viewpoint of the ICS, and the present status and implications are derived. The findings can be used as an indicator to effectively apply appropriate controls to appropriate locations where security is required. It is also expected to be a useful reference for improving and supplementing security control items currently being used and used.
随着针对国家关键基础设施的网络攻击日益增多,保护工业控制系统(ICS)的研究日益活跃。与现有的IT系统相比,主要是对ICS的特殊属性进行研究,并在此基础上推导出ICS的许多安全需求。然而,目前对安全控制的研究还不够充分,无法了解和改善目标ICS的安全状况。据我们所知,目前只提供了将现有安全控制应用于ics的综合指南。因此,本研究从ICS的角度提出了对当前安全控制项目的启示。为此,建立了对信息安全控制项目进行分类和分析的各种观点,并在此基础上导出了ICS安全控制的综合矩阵。通过ICS安全控制矩阵,从ICS的角度对当前被引导的信息安全控制项目进行了分析,得出了ICS安全控制的现状和启示。这些发现可以作为一个指标,在需要安全的适当地点有效地应用适当的控制。期望对改进和补充目前正在使用和使用的安全控制项目提供有益的参考。
{"title":"A Review of Cyber Security Controls from An ICS Perspective","authors":"Youngin You, Juhyeon Lee, Junhyoung Oh, K. Lee","doi":"10.1109/PLATCON.2018.8472757","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472757","url":null,"abstract":"As cyber attacks on national critical infrastructure have increased, researches are actively conducted to protect industrial control systems(ICS). Compared with existing IT systems, research on special attributes of ICS has been performed mainly, and based on this, many security requirements for ICSs have been derived. However, there is insufficient research on security control to understand and improve the security status of target ICS. To the best of our knowledge, only a comprehensive guide to applying existing security controls to ICSs is being presented. Therefore, this study suggests implications for the current security control items from the ICS point of view. For this purpose, each viewpoint for categorizing and analyzing information security control items was established and based on this, an integrated matrix of ICS security control was derived. Through the ICS security control matrix, the information security control items currently being guided are analyzed from the viewpoint of the ICS, and the present status and implications are derived. The findings can be used as an indicator to effectively apply appropriate controls to appropriate locations where security is required. It is also expected to be a useful reference for improving and supplementing security control items currently being used and used.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115086931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Abnormal Payment Transaction Detection Scheme Based on Scalable Architecture and Redis Cluster 基于可伸缩架构和Redis集群的异常支付事务检测方案
Pub Date : 2018-09-25 DOI: 10.1109/PLATCON.2018.8472732
Taeyoung Leea, Yongsung Kim, Eenjun Hwang
Log file based data analysis methods in the closed fault tolerant OS have shown several problems. First, it is not easy to add or change the data analysis direction while the service is running after the analysis process has been set and compiled. Second, in an independent closed system, due to the limited resource policy, it is difficult to perform real-time data analysis. Finally, it is not easy to utilize new technologies and open sources such as in-memory database and python. Due to these problems, existing methods have difficulty in detecting abnormal payment transactions in real time. In this paper, we propose an abnormal payment transaction detection scheme based on scalable network architecture and Redis cluster, which can collect transaction data quickly and perform their analysis in real-time. We show its performance by implementing a prototype system and performing several experiments on it. Furthermore, we show that our proposed scheme can be used for data analysis through the reproduction of data using in-memory storage, which can solve the aforementioned problem of unidirectional analysis by doing parallel processing on the distributed Redis repository.
在封闭型容错操作系统中,基于日志文件的数据分析方法存在一些问题。首先,在分析流程设置和编译完成后,在服务运行期间,不容易添加或更改数据分析方向。其次,在独立封闭的系统中,由于资源策略的限制,很难进行实时的数据分析。最后,利用新技术和开放源代码(如内存数据库和python)并不容易。由于这些问题,现有的方法难以实时检测异常支付交易。本文提出了一种基于可扩展网络架构和Redis集群的异常支付交易检测方案,该方案可以快速收集交易数据并进行实时分析。我们通过一个原型系统的实现和几个实验来证明它的性能。此外,我们表明,我们提出的方案可以通过使用内存存储复制数据来进行数据分析,这可以通过在分布式Redis存储库上进行并行处理来解决前面提到的单向分析问题。
{"title":"Abnormal Payment Transaction Detection Scheme Based on Scalable Architecture and Redis Cluster","authors":"Taeyoung Leea, Yongsung Kim, Eenjun Hwang","doi":"10.1109/PLATCON.2018.8472732","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472732","url":null,"abstract":"Log file based data analysis methods in the closed fault tolerant OS have shown several problems. First, it is not easy to add or change the data analysis direction while the service is running after the analysis process has been set and compiled. Second, in an independent closed system, due to the limited resource policy, it is difficult to perform real-time data analysis. Finally, it is not easy to utilize new technologies and open sources such as in-memory database and python. Due to these problems, existing methods have difficulty in detecting abnormal payment transactions in real time. In this paper, we propose an abnormal payment transaction detection scheme based on scalable network architecture and Redis cluster, which can collect transaction data quickly and perform their analysis in real-time. We show its performance by implementing a prototype system and performing several experiments on it. Furthermore, we show that our proposed scheme can be used for data analysis through the reproduction of data using in-memory storage, which can solve the aforementioned problem of unidirectional analysis by doing parallel processing on the distributed Redis repository.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121486418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Threat Analysis of Wi-Fi Connected Dashboard Camera Wi-Fi连接仪表盘摄像头的威胁分析
Pub Date : 2018-09-25 DOI: 10.1109/PLATCON.2018.8472768
Won Park, Dahee Choi, K. Lee
Recently dashboard camera (dashcam) has a function of connecting Wi-Fi to a smartphone for usability. But, it has severe vulnerabilities that it doesn't have authentication process. We analyzed threats of overall functions of dashcam using Data Flow Diagram and STRIDE analysis. After that, we found that dashcam’ s vulnerabilities are closely related to Wi-Fi function and lack of authentication process. We made sets of possible attacks and presented as attack trees. Attack Tree Analysis was used to categorize and prioritize among several ways of possible attacks. This research contributes to suggest vulnerabilities of a dashcam. This emphasizes the importance that information security standards of dashcam should be made and manufacturers of dashcam should apply the standards.
最近,仪表盘摄像头(dashcam)有一个连接Wi-Fi到智能手机的功能,以方便使用。但是,它有严重的漏洞,它没有身份验证过程。运用数据流程图和STRIDE分析法对行车记录仪整体功能的威胁进行了分析。之后,我们发现dashcam的漏洞与Wi-Fi功能和缺乏认证过程密切相关。我们制作了一系列可能的攻击并以攻击树的形式呈现。攻击树分析用于对几种可能的攻击方式进行分类和优先排序。这项研究有助于揭示行车记录仪的漏洞。这就强调了制定行车记录仪信息安全标准的重要性,以及行车记录仪制造商应用这些标准的重要性。
{"title":"Threat Analysis of Wi-Fi Connected Dashboard Camera","authors":"Won Park, Dahee Choi, K. Lee","doi":"10.1109/PLATCON.2018.8472768","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472768","url":null,"abstract":"Recently dashboard camera (dashcam) has a function of connecting Wi-Fi to a smartphone for usability. But, it has severe vulnerabilities that it doesn't have authentication process. We analyzed threats of overall functions of dashcam using Data Flow Diagram and STRIDE analysis. After that, we found that dashcam’ s vulnerabilities are closely related to Wi-Fi function and lack of authentication process. We made sets of possible attacks and presented as attack trees. Attack Tree Analysis was used to categorize and prioritize among several ways of possible attacks. This research contributes to suggest vulnerabilities of a dashcam. This emphasizes the importance that information security standards of dashcam should be made and manufacturers of dashcam should apply the standards.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126507569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web-based Nominal Group Technique Decision Making Tool Using Blockchain 使用区块链的基于web的名义组技术决策工具
Pub Date : 1900-01-01 DOI: 10.1109/PLATCON.2018.8472769
Sunghyun Na, Y. B. Park
The overall interest of modern managers is to find effective group decision-making methods when members with diverse backgrounds and perspectives have to solve problems together. Nominal Group Technique is used as one of the methods for group decision making. However, the Nominal Group Technique is not easy to ensure anonymity in a face-to-face environment, and there is no clear evidence to support the judgment of results after voting. In addition, it is difficult to trust the data because the integrity of the data generated by the voting result is not ensured. In this paper, propose a web-based Nominal Group Technique using blockchain. Web-based Nominal Group Technique can construct an agent - based model and request the blockchain network when data management is needed to guarantee the integrity of the data. In addition, the anonymity of all members is ensured through the web chat function, and the voting results can be visualized using the Priority Graph Tool, which is implemented on the web during the group decision making.
当具有不同背景和观点的成员必须共同解决问题时,寻找有效的群体决策方法是现代管理者的整体利益。名义群体技术是群体决策的一种方法。然而,名义群体技术在面对面的环境中不容易保证匿名性,并且没有明确的证据支持投票后对结果的判断。此外,由于无法保证投票结果生成的数据的完整性,因此很难信任数据。本文提出了一种基于网络的基于区块链的名义群技术。基于web的名义群技术可以构建基于agent的模型,并在需要数据管理时请求区块链网络来保证数据的完整性。此外,通过网络聊天功能保证了所有成员的匿名性,并且在群体决策过程中可以使用优先级图工具将投票结果可视化,并在网络上实现。
{"title":"Web-based Nominal Group Technique Decision Making Tool Using Blockchain","authors":"Sunghyun Na, Y. B. Park","doi":"10.1109/PLATCON.2018.8472769","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472769","url":null,"abstract":"The overall interest of modern managers is to find effective group decision-making methods when members with diverse backgrounds and perspectives have to solve problems together. Nominal Group Technique is used as one of the methods for group decision making. However, the Nominal Group Technique is not easy to ensure anonymity in a face-to-face environment, and there is no clear evidence to support the judgment of results after voting. In addition, it is difficult to trust the data because the integrity of the data generated by the voting result is not ensured. In this paper, propose a web-based Nominal Group Technique using blockchain. Web-based Nominal Group Technique can construct an agent - based model and request the blockchain network when data management is needed to guarantee the integrity of the data. In addition, the anonymity of all members is ensured through the web chat function, and the voting results can be visualized using the Priority Graph Tool, which is implemented on the web during the group decision making.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126626274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Electricity Price Forecasting for Nord Pool Data 北池数据电价预测
Pub Date : 1900-01-01 DOI: 10.1109/PLATCON.2018.8472762
Rita Beigaitė, T. Krilavičius, K. Man
In many countries deregulation of power markets was undertaken to create a more efficient market. As a result, electricity now can be purchased and sold across areas and countries more easily. For participants of electricity market it is beneficial to forecast future prices in order to optimize risks and profits as well as make future plans. A number of various methods is applied for solving this problem. However, the accuracy of forecasts is not sufficient as market spot price of electricity has features such as seasonality, spikes or high volatility. Furthermore, diverse approaches work differently with distinct countries (markets). In this paper we discuss our experiments with electricity spot price data of Lithuania's price zone in Nord Pool power market. Day-ahead forecasts are made using Seasonal Naïve, Exponential smoothing, Artificial Neural Networks.
许多国家解除了对电力市场的管制,以建立一个更有效的市场。因此,现在可以更容易地在地区和国家之间购买和销售电力。对于电力市场的参与者来说,预测未来电价有利于优化风险和利润,制定未来计划。许多不同的方法被用来解决这个问题。然而,由于电力现货市场价格具有季节性、峰值或高波动性等特点,预测的准确性还不够。此外,不同的方法在不同的国家(市场)起着不同的作用。本文讨论了在北池电力市场中利用立陶宛价格区电力现货价格数据进行的实验。日前预测使用季节性Naïve,指数平滑,人工神经网络。
{"title":"Electricity Price Forecasting for Nord Pool Data","authors":"Rita Beigaitė, T. Krilavičius, K. Man","doi":"10.1109/PLATCON.2018.8472762","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472762","url":null,"abstract":"In many countries deregulation of power markets was undertaken to create a more efficient market. As a result, electricity now can be purchased and sold across areas and countries more easily. For participants of electricity market it is beneficial to forecast future prices in order to optimize risks and profits as well as make future plans. A number of various methods is applied for solving this problem. However, the accuracy of forecasts is not sufficient as market spot price of electricity has features such as seasonality, spikes or high volatility. Furthermore, diverse approaches work differently with distinct countries (markets). In this paper we discuss our experiments with electricity spot price data of Lithuania's price zone in Nord Pool power market. Day-ahead forecasts are made using Seasonal Naïve, Exponential smoothing, Artificial Neural Networks.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114155135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Automated Security Configuration Checklist for Apple iOS Devices Using SCAP v1.2 使用SCAP v1.2的Apple iOS设备的自动安全配置清单
Pub Date : 1900-01-01 DOI: 10.1109/PLATCON.2018.8472773
Akinbobola Oluwaseun Adetunji, S. Butakov, P. Zavarsky
The security content automation includes configurations of large number of systems, installation of patches securely, verification of security-related configuration settings, compliance with security policies and regulatory requirements, and ability to respond quickly when new threats are discovered [1]. Although humans are important in information security management, humans sometimes introduce errors and inconsistencies in an organization due to manual nature of their tasks [2]. Security Content Automation Protocol was developed by the U.S. NIST to automate information security management tasks such as vulnerability and patch management, and to achieve continuous monitoring of security configurations in an organization. In this paper, SCAP is employed to develop an automated security configuration checklist for use in verifying Apple iOS device configuration against the defined security baseline to enforce policy compliance in an enterprise.
安全内容自动化包括大量系统的配置、安全补丁的安装、安全相关配置设置的验证、安全策略和法规要求的遵从以及发现新威胁时的快速响应能力[1]。尽管人在信息安全管理中很重要,但由于其任务的手工性质,人有时会在组织中引入错误和不一致[2]。安全内容自动化协议(Security Content Automation Protocol)由美国国家标准与技术研究院(NIST)开发,用于自动化漏洞和补丁管理等信息安全管理任务,并实现对组织内安全配置的持续监控。在本文中,SCAP被用于开发一个自动化的安全配置检查表,用于根据定义的安全基线验证Apple iOS设备配置,以强制企业执行策略遵从性。
{"title":"Automated Security Configuration Checklist for Apple iOS Devices Using SCAP v1.2","authors":"Akinbobola Oluwaseun Adetunji, S. Butakov, P. Zavarsky","doi":"10.1109/PLATCON.2018.8472773","DOIUrl":"https://doi.org/10.1109/PLATCON.2018.8472773","url":null,"abstract":"The security content automation includes configurations of large number of systems, installation of patches securely, verification of security-related configuration settings, compliance with security policies and regulatory requirements, and ability to respond quickly when new threats are discovered [1]. Although humans are important in information security management, humans sometimes introduce errors and inconsistencies in an organization due to manual nature of their tasks [2]. Security Content Automation Protocol was developed by the U.S. NIST to automate information security management tasks such as vulnerability and patch management, and to achieve continuous monitoring of security configurations in an organization. In this paper, SCAP is employed to develop an automated security configuration checklist for use in verifying Apple iOS device configuration against the defined security baseline to enforce policy compliance in an enterprise.","PeriodicalId":231523,"journal":{"name":"2018 International Conference on Platform Technology and Service (PlatCon)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121312595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2018 International Conference on Platform Technology and Service (PlatCon)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1