首页 > 最新文献

2020 15th International Conference on Computer Engineering and Systems (ICCES)最新文献

英文 中文
AVB/TSN Protocols in Automotive Networking 汽车网络中的AVB/TSN协议
Pub Date : 2020-12-15 DOI: 10.1109/ICCES51560.2020.9334667
Ahmed E. Sabry, Ahmed Omar, Mohamed Hammad, Nashwa Abdelbaki
In the last decade, Ethernet networks that require real time constraints are massively increased. Switched Ethernet is reshaping in-vehicle communications. To meet real-time requirements for diverse data types in automotive communications, Quality-of-Service protocols that go beyond the mere use of priorities are required. In Vehicle networks requirements are evolving and need better Quality-of-Service (QoS) options. This applies also for industrial networks implementation. Time Sensitive Networking (TSN) IEEE 802.1 Task working group are providing wide variety of Standard. This standard widens the design space for car networks so lots of ideas exists now. We try in this paper to the best of our knowledge, give insights about the studies that were developed for mainly for car networks as well as open issues that are still needs further research.
在过去十年中,需要实时限制的以太网网络大量增加。交换式以太网正在重塑车载通信。为了满足汽车通信中各种数据类型的实时需求,需要超越优先级使用的服务质量协议。车载网络的需求在不断发展,需要更好的服务质量(QoS)选项。这也适用于工业网络的实现。时间敏感网络(TSN) IEEE 802.1任务工作组提供各种各样的标准。这个标准扩大了汽车网络的设计空间,所以现在有很多想法。在本文中,我们试图尽我们所知,对主要针对汽车网络开发的研究以及仍需要进一步研究的开放性问题提出见解。
{"title":"AVB/TSN Protocols in Automotive Networking","authors":"Ahmed E. Sabry, Ahmed Omar, Mohamed Hammad, Nashwa Abdelbaki","doi":"10.1109/ICCES51560.2020.9334667","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334667","url":null,"abstract":"In the last decade, Ethernet networks that require real time constraints are massively increased. Switched Ethernet is reshaping in-vehicle communications. To meet real-time requirements for diverse data types in automotive communications, Quality-of-Service protocols that go beyond the mere use of priorities are required. In Vehicle networks requirements are evolving and need better Quality-of-Service (QoS) options. This applies also for industrial networks implementation. Time Sensitive Networking (TSN) IEEE 802.1 Task working group are providing wide variety of Standard. This standard widens the design space for car networks so lots of ideas exists now. We try in this paper to the best of our knowledge, give insights about the studies that were developed for mainly for car networks as well as open issues that are still needs further research.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129978533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Automatic Diagnosis of Melanoma Through the Analysis of Dermoscopic Images 基于皮肤镜图像分析的黑色素瘤自动诊断
Pub Date : 2020-12-15 DOI: 10.1109/ICCES51560.2020.9334663
Aya Mostafa Mosa Gad, A. Afifi, K. M. Amin
Malignant melanomas are the most dangerous type of skin cancer. It is fatal and hard to treat it, if is not treated or recognized early. Therefore, early diagnosis of skin cancer is essential to reduce mortality and morbidity of patients. The detection accuracy is also an important factor. In this paper, therefore, we perform and analytical study to investigate the importance of different handcrafted feature categories, imbalance handling methodologies and feature selection algorithms applied to melanoma diagnosis. This analysis allows us to deeply understand the importance of each feature category and to finally design a more accurate melanoma diagnosis approach. In this work, we analyze different hand-crafted based technique to investigate the effect of different features using ABCD (asymmetry, border irregularity, colour, and dermoscopic structure) rule and analyze the effect of different class imbalance handling methodologies to alleviate the effect of class imbalance problem. We applied color consistency preprocessing and scaled down all dataset images then, important features are selected from ABCD extracted features. Finally, these features are classified as benign or malignant, we founded all features group and combination of NCL and bSMOTE class imbalance handling methods produce the best result.
恶性黑色素瘤是最危险的一种皮肤癌。它是致命的,很难治疗,如果不及早治疗或发现。因此,皮肤癌的早期诊断对于降低患者的死亡率和发病率至关重要。检测精度也是一个重要因素。因此,在本文中,我们进行了一项分析研究,以探讨不同手工制作的特征类别,不平衡处理方法和特征选择算法在黑色素瘤诊断中的重要性。这种分析使我们能够深入了解每个特征类别的重要性,并最终设计出更准确的黑色素瘤诊断方法。在这项工作中,我们分析了不同的基于手工制作的技术,以ABCD(不对称、边缘不规则、颜色和皮肤结构)规则来研究不同特征的影响,并分析了不同的类不平衡处理方法的效果,以缓解类不平衡问题的影响。我们对所有的数据集图像进行颜色一致性预处理和缩放,然后从ABCD提取的特征中选择重要的特征。最后将这些特征分类为良性或恶性,我们建立了所有特征组,并结合NCL和bSMOTE类不平衡处理方法产生了最佳效果。
{"title":"Automatic Diagnosis of Melanoma Through the Analysis of Dermoscopic Images","authors":"Aya Mostafa Mosa Gad, A. Afifi, K. M. Amin","doi":"10.1109/ICCES51560.2020.9334663","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334663","url":null,"abstract":"Malignant melanomas are the most dangerous type of skin cancer. It is fatal and hard to treat it, if is not treated or recognized early. Therefore, early diagnosis of skin cancer is essential to reduce mortality and morbidity of patients. The detection accuracy is also an important factor. In this paper, therefore, we perform and analytical study to investigate the importance of different handcrafted feature categories, imbalance handling methodologies and feature selection algorithms applied to melanoma diagnosis. This analysis allows us to deeply understand the importance of each feature category and to finally design a more accurate melanoma diagnosis approach. In this work, we analyze different hand-crafted based technique to investigate the effect of different features using ABCD (asymmetry, border irregularity, colour, and dermoscopic structure) rule and analyze the effect of different class imbalance handling methodologies to alleviate the effect of class imbalance problem. We applied color consistency preprocessing and scaled down all dataset images then, important features are selected from ABCD extracted features. Finally, these features are classified as benign or malignant, we founded all features group and combination of NCL and bSMOTE class imbalance handling methods produce the best result.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128888353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cell Trapping by Dielectrophoresis to Enhance the Identification and Detection of Biological Cell 细胞诱捕技术在生物细胞鉴定和检测中的应用
Pub Date : 2020-12-15 DOI: 10.1109/ICCES51560.2020.9334672
Sameh Sherif, Y. Ghallab, M. El-Wakad, Y. Ismail
Dielectrophoresis (DEP) force has established to be one of the strongest techniques can be used to control in the different biological cell using different techniques for example Cell sorting, Cell Transporting and Cell Trapping. The major target and challenge must be achieved are that how can improve and enhance the sensing and detection stage to enhance the overall detection method. In this study, we establish a new methodology based on the combination between the dielectrophoresis response and the electric impedance detection this combination can achieve the main target of the develop the cell detection techniques. The dielectrophoresis response can be extracted as a significant effect on the cell trapping under different force distribution. The force distribution and the cell response can be combined to enhance the biological cell and different particles identification and detection. The previous and the conventional studies on the cell detection ignore the effect of the cell distribution on the sensing and measuring electrodes during the dielectric parameters detection and measurements such as the ignoring of the cell distribution during the cell impedance detection. The random spread of the cells on the sensing electrodes consider a vital factor during cell dielectric parameters analysis. So, we focus on the using of the effect dielectrophoresis force can overcome this random cell distribution and make the cells being focused on the sensing electrodes.
Dielectrophoresis (DEP)力已被确立为最强大的技术之一,可用于控制不同生物细胞中使用不同的技术,例如细胞分选,细胞转运和细胞捕获。如何改进和提升传感和检测阶段,提升整体检测方法,是必须达到的主要目标和挑战。在本研究中,我们建立了一种基于介电电泳响应和电阻抗检测相结合的新方法,这种结合可以实现细胞检测技术发展的主要目标。在不同的力分布下,介质电泳反应对细胞捕获有显著的影响。力的分布和细胞的响应可以结合起来,增强生物细胞和不同颗粒的识别和检测。以往和传统的细胞检测研究在进行介电参数检测和测量时,忽略了细胞分布对感测电极的影响,如在进行细胞阻抗检测时忽略了细胞分布。电池在感应电极上的随机分布是分析电池介电参数的一个重要因素。因此,我们关注的是利用电泳力的作用来克服细胞的随机分布,使细胞集中在传感电极上。
{"title":"Cell Trapping by Dielectrophoresis to Enhance the Identification and Detection of Biological Cell","authors":"Sameh Sherif, Y. Ghallab, M. El-Wakad, Y. Ismail","doi":"10.1109/ICCES51560.2020.9334672","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334672","url":null,"abstract":"Dielectrophoresis (DEP) force has established to be one of the strongest techniques can be used to control in the different biological cell using different techniques for example Cell sorting, Cell Transporting and Cell Trapping. The major target and challenge must be achieved are that how can improve and enhance the sensing and detection stage to enhance the overall detection method. In this study, we establish a new methodology based on the combination between the dielectrophoresis response and the electric impedance detection this combination can achieve the main target of the develop the cell detection techniques. The dielectrophoresis response can be extracted as a significant effect on the cell trapping under different force distribution. The force distribution and the cell response can be combined to enhance the biological cell and different particles identification and detection. The previous and the conventional studies on the cell detection ignore the effect of the cell distribution on the sensing and measuring electrodes during the dielectric parameters detection and measurements such as the ignoring of the cell distribution during the cell impedance detection. The random spread of the cells on the sensing electrodes consider a vital factor during cell dielectric parameters analysis. So, we focus on the using of the effect dielectrophoresis force can overcome this random cell distribution and make the cells being focused on the sensing electrodes.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116005681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study of Machine Learning and Deep Learning in Network Anomaly-Based Intrusion Detection Systems 基于网络异常的入侵检测系统中机器学习与深度学习的比较研究
Pub Date : 2020-12-15 DOI: 10.1109/ICCES51560.2020.9334553
M. S. Abdel-Wahab, A. M. Neil, Ayman Atia
This paper presents a comparative study of Machine learning and Deep learning models used in anomaly-based network intrusion detection systems. The paper has presented an overview of the previous work done in the field of ML and DL IDS, then an overview of the used datasets in reviewed literature was presented. Moreover, ML and DL models were tested on the KDD-99 dataset, and performance results were presented, compared, and discussed. Finally, areas of future research of critical importance are proposed by the authors.
本文对基于异常的网络入侵检测系统中使用的机器学习和深度学习模型进行了比较研究。本文概述了以前在ML和DL IDS领域所做的工作,然后概述了综述文献中使用的数据集。此外,在KDD-99数据集上对ML和DL模型进行了测试,并给出了性能结果,进行了比较和讨论。最后,作者提出了未来研究的关键领域。
{"title":"A Comparative Study of Machine Learning and Deep Learning in Network Anomaly-Based Intrusion Detection Systems","authors":"M. S. Abdel-Wahab, A. M. Neil, Ayman Atia","doi":"10.1109/ICCES51560.2020.9334553","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334553","url":null,"abstract":"This paper presents a comparative study of Machine learning and Deep learning models used in anomaly-based network intrusion detection systems. The paper has presented an overview of the previous work done in the field of ML and DL IDS, then an overview of the used datasets in reviewed literature was presented. Moreover, ML and DL models were tested on the KDD-99 dataset, and performance results were presented, compared, and discussed. Finally, areas of future research of critical importance are proposed by the authors.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"1994 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127320550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Augmented Reality Based Learning Environment for Children with Special Needs 基于增强现实的特殊需要儿童学习环境
Pub Date : 2020-12-15 DOI: 10.1109/ICCES51560.2020.9334571
Eman Hassan Shaltout, A. Afifi, K. M. Amin
Technology interference has become noticeable in all aspects of life. One of the most popular technologies is Augmented Reality (AR) used in all fields to facilitate and enhance those fields. The education filed is one of the areas in which augmented reality has been used extensively during the last years. Augmented reality has contributed to improving traditional educational methods through the integration of digital information with the user’s environment in real-time. Therefore, augmented reality technology can be utilized to teach children with special needs due to its advantages in enriching the learning methodology. This paper introduces the design, development and evaluation of an efficient and low-cost AR-based educational environment for children with special needs. This environment utilizes augmented reality and educational cards to teach children the word from the card, its 3D model and its pronunciation. The proposed educational environment is developed as a mobile-based augmented reality (AR) application to be more attractive for children. The results showed that children enjoy sessions and interact with the application, which improves learning outcomes. Moreover, the user experience questionnaire shows a high level of satisfaction among parents and specialists.
科技的干扰已经在生活的各个方面变得明显。最流行的技术之一是增强现实(AR),它用于所有领域,以促进和增强这些领域。教育领域是增强现实在过去几年被广泛使用的领域之一。增强现实通过将数字信息与用户的实时环境相结合,有助于改进传统的教育方法。因此,增强现实技术在丰富学习方法方面具有优势,可以用于特殊需要儿童的教学。本文介绍了一个高效、低成本的基于ar的特殊需要儿童教育环境的设计、开发和评价。这个环境利用增强现实和教育卡来教孩子从卡上的单词,它的3D模型和它的发音。拟议的教育环境被开发为基于移动的增强现实(AR)应用程序,以对儿童更具吸引力。结果表明,孩子们喜欢课程,并与应用程序互动,这提高了学习效果。此外,用户体验问卷显示家长和专家的满意度很高。
{"title":"Augmented Reality Based Learning Environment for Children with Special Needs","authors":"Eman Hassan Shaltout, A. Afifi, K. M. Amin","doi":"10.1109/ICCES51560.2020.9334571","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334571","url":null,"abstract":"Technology interference has become noticeable in all aspects of life. One of the most popular technologies is Augmented Reality (AR) used in all fields to facilitate and enhance those fields. The education filed is one of the areas in which augmented reality has been used extensively during the last years. Augmented reality has contributed to improving traditional educational methods through the integration of digital information with the user’s environment in real-time. Therefore, augmented reality technology can be utilized to teach children with special needs due to its advantages in enriching the learning methodology. This paper introduces the design, development and evaluation of an efficient and low-cost AR-based educational environment for children with special needs. This environment utilizes augmented reality and educational cards to teach children the word from the card, its 3D model and its pronunciation. The proposed educational environment is developed as a mobile-based augmented reality (AR) application to be more attractive for children. The results showed that children enjoy sessions and interact with the application, which improves learning outcomes. Moreover, the user experience questionnaire shows a high level of satisfaction among parents and specialists.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133485732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Tutorial II: Network Security 教程二:网络安全
Pub Date : 2020-12-15 DOI: 10.1109/ICCES51560.2020.9334652
Ayman M. Bahaa-Eldin
The field of computer and network security is an aggressive challenging and growing filed in its academic, research and industrial aspects. Attacks and breaches are increasing rapidly as the attack surface of the Internet has exploded with the IoT technologies and connected devices. Enormous data feeds on ultra-high-speed backbone and access networks has to be analyzed to detect very dangerous and intelligent attacks. In this talk, we emphasize on the problem size of securing digital resources. The challenges of modern security practices are detailed. Finally, the recent trends in Artificial Intelligence based systems for networks security are presented. Intelligent traffic analysis is detailed and machine learning role in security is presented. New trends and directions of research are overviewed.
计算机和网络安全领域在学术、研究和工业方面都是一个具有挑战性和不断发展的领域。随着物联网技术和连接设备的出现,互联网的攻击面呈爆炸式增长,攻击和违规行为正在迅速增加。必须对超高速骨干网和接入网上的大量数据馈送进行分析,以检测非常危险和智能的攻击。在这次演讲中,我们强调保护数字资源的问题规模。现代安全实践的挑战是详细的。最后,介绍了基于人工智能的网络安全系统的最新发展趋势。详细介绍了智能交通分析,并介绍了机器学习在安全中的作用。概述了研究的新趋势和新方向。
{"title":"Tutorial II: Network Security","authors":"Ayman M. Bahaa-Eldin","doi":"10.1109/ICCES51560.2020.9334652","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334652","url":null,"abstract":"The field of computer and network security is an aggressive challenging and growing filed in its academic, research and industrial aspects. Attacks and breaches are increasing rapidly as the attack surface of the Internet has exploded with the IoT technologies and connected devices. Enormous data feeds on ultra-high-speed backbone and access networks has to be analyzed to detect very dangerous and intelligent attacks. In this talk, we emphasize on the problem size of securing digital resources. The challenges of modern security practices are detailed. Finally, the recent trends in Artificial Intelligence based systems for networks security are presented. Intelligent traffic analysis is detailed and machine learning role in security is presented. New trends and directions of research are overviewed.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133959122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Ensemble Classification Technique of Neurodegenerative Diseases from Gait Analysis 步态分析神经退行性疾病的集成分类技术
Pub Date : 2020-12-15 DOI: 10.1109/ICCES51560.2020.9334609
Mariam Heikal, S. Eldawlatly
Neurodegenerative diseases (NDDs) lead to extreme locomotion disorders, which stem from the impairment of motor function caused by these diseases. They alter the gait rhythms and gait dynamics of their patients, which can be reflected in their time-series recordings of footfall contact times. Studies has shown that human gait can be used to identify NDDs. In this paper, an ensemble classification-based diagnostic system that uses patients’ gait data to diagnose NDDs is introduced. The diagnostic system is an ensemble of four binary classifications. The proposed technique is applied to gait dynamics data recorded from 64 subjects representing three NDDs: Amyotrophic Lateral Sclerosis (ALS), Parkinson’s Disease (PD), and Huntington’s Disease (HD), in addition to healthy subjects. Our results demonstrate the ability of the proposed technique to recognize gait dynamics of ALS, PD and HD with an accuracy of 96.8, 86.8% and 85.5%, respectively. These results demonstrate the efficacy of the proposed approach in diagnosing NDDs from gait analysis.
神经退行性疾病(ndd)导致极端的运动障碍,这源于这些疾病引起的运动功能损害。他们改变病人的步态节奏和步态动力学,这可以反映在他们脚部接触时间的时间序列记录中。研究表明,人类的步态可以用来识别ndd。本文介绍了一种基于集成分类的基于患者步态数据的ndd诊断系统。诊断系统是四种二元分类的集合。所提出的技术应用于64名受试者的步态动力学数据,这些受试者代表三种ndd:肌萎缩性侧索硬化症(ALS)、帕金森病(PD)和亨廷顿病(HD),此外还有健康受试者。结果表明,该方法能够识别ALS、PD和HD患者的步态动力学,准确率分别为96.8、86.8%和85.5%。这些结果证明了该方法在步态分析中诊断ndd的有效性。
{"title":"An Ensemble Classification Technique of Neurodegenerative Diseases from Gait Analysis","authors":"Mariam Heikal, S. Eldawlatly","doi":"10.1109/ICCES51560.2020.9334609","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334609","url":null,"abstract":"Neurodegenerative diseases (NDDs) lead to extreme locomotion disorders, which stem from the impairment of motor function caused by these diseases. They alter the gait rhythms and gait dynamics of their patients, which can be reflected in their time-series recordings of footfall contact times. Studies has shown that human gait can be used to identify NDDs. In this paper, an ensemble classification-based diagnostic system that uses patients’ gait data to diagnose NDDs is introduced. The diagnostic system is an ensemble of four binary classifications. The proposed technique is applied to gait dynamics data recorded from 64 subjects representing three NDDs: Amyotrophic Lateral Sclerosis (ALS), Parkinson’s Disease (PD), and Huntington’s Disease (HD), in addition to healthy subjects. Our results demonstrate the ability of the proposed technique to recognize gait dynamics of ALS, PD and HD with an accuracy of 96.8, 86.8% and 85.5%, respectively. These results demonstrate the efficacy of the proposed approach in diagnosing NDDs from gait analysis.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127689860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detecting Mimikatz in Lateral Movements Using Mutex 用互斥体检测横向运动中的Mimikatz
Pub Date : 2020-12-15 DOI: 10.1109/ICCES51560.2020.9334643
M. G. El-Hadidi, Marianne A. Azer
Advanced Persistent Threat (APT) is a stealthy computer network attack. Its threat lies in the fact that unauthorized access to a network is gained and the attackers, whether a person or a group may remain undetected for an extended period. APT group can spread and gain access to the most valuable assets in the targeted organization. Depending on the tools used by APT group it can be hard and complex to respond to those groups and their tools. Mimikatz is one of the most powerful tools used by many APT groups, penetration testers and malware. In this paper, we focus on lateral movement and APT detection of Mimikatz. The main objective is an increased accuracy level while reducing the detection time for any Mimikatz version within networks using a Mutex object.
高级持续威胁(APT)是一种隐秘的计算机网络攻击。它的威胁在于未经授权访问网络,攻击者,无论是个人还是团体,都可能在很长一段时间内不被发现。APT组织可以传播并获得目标组织中最有价值的资产。根据APT组使用的工具,响应这些组及其工具可能是困难和复杂的。Mimikatz是许多APT组织、渗透测试人员和恶意软件使用的最强大的工具之一。本文主要研究Mimikatz的横向运动和APT检测。主要目标是提高精度水平,同时减少网络中使用互斥对象的任何Mimikatz版本的检测时间。
{"title":"Detecting Mimikatz in Lateral Movements Using Mutex","authors":"M. G. El-Hadidi, Marianne A. Azer","doi":"10.1109/ICCES51560.2020.9334643","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334643","url":null,"abstract":"Advanced Persistent Threat (APT) is a stealthy computer network attack. Its threat lies in the fact that unauthorized access to a network is gained and the attackers, whether a person or a group may remain undetected for an extended period. APT group can spread and gain access to the most valuable assets in the targeted organization. Depending on the tools used by APT group it can be hard and complex to respond to those groups and their tools. Mimikatz is one of the most powerful tools used by many APT groups, penetration testers and malware. In this paper, we focus on lateral movement and APT detection of Mimikatz. The main objective is an increased accuracy level while reducing the detection time for any Mimikatz version within networks using a Mutex object.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"309 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115878296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Lightweight Algorithm for Preventing Intentional Fork in the Bitcoin Environment 在比特币环境中防止故意分叉的轻量级算法
Pub Date : 2020-12-15 DOI: 10.1109/ICCES51560.2020.9334563
Ahmed H. Madkour, Asmaa H. Elsaid, H. Abdelkader
Most Bitcoin systems use blockchain technology to store all historical transaction data. Blockchain is a linked list structure but may be changed to a fork structure; a useful fork or an intentional fork. The useful fork may occur when the rules of the block are updated. On the other side, the intentional fork occurs when a miner has supercomputer properties that generate a set of blocks as a branch and does not publish this branch to the blockchain until the length of that branch is greater than the length of the main branch. When this fork occurs in the system, a set of blockchain transactions will be rollbacked, user waiting times increases, and miner rewards increases illegally. In this paper, the Lightweight algorithm is proposed to avoid the intentional fork issue and therefore rollback issue, users waiting time is reduced in the transaction process. The proposed algorithm is to make a single publisher in the system and divides the block construction into two phases. In the first phase, a miner generates a block and sends it to the memory pool. In the second phase, the memory pool will publish the block to the blockchain. The results show that the proposed algorithm has a good ability to avoid the intentional fork issue in the blockchain and the rollback issue thus minimize user waiting times.
大多数比特币系统使用区块链技术来存储所有历史交易数据。区块链是链表结构,但可以更改为分叉结构;有用的叉子或有意的叉子。当块的规则更新时,可能会发生有用的分叉。另一方面,当矿工拥有超级计算机属性,生成一组区块作为分支,并且不将该分支发布到区块链时,就会发生故意分叉,直到该分支的长度大于主分支的长度。当这个分叉在系统中发生时,一组区块链交易将被回滚,用户等待时间增加,矿工奖励非法增加。本文提出了轻量级算法,避免了故意分叉问题,从而避免了回滚问题,减少了用户在事务过程中的等待时间。提出的算法是在系统中创建单个发布者,并将区块构建分为两个阶段。在第一阶段,矿工生成一个块并将其发送到内存池。在第二阶段,内存池将该块发布到区块链中。结果表明,该算法能够很好地避免区块链中的故意分叉问题和回滚问题,从而最大限度地减少用户等待时间。
{"title":"Lightweight Algorithm for Preventing Intentional Fork in the Bitcoin Environment","authors":"Ahmed H. Madkour, Asmaa H. Elsaid, H. Abdelkader","doi":"10.1109/ICCES51560.2020.9334563","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334563","url":null,"abstract":"Most Bitcoin systems use blockchain technology to store all historical transaction data. Blockchain is a linked list structure but may be changed to a fork structure; a useful fork or an intentional fork. The useful fork may occur when the rules of the block are updated. On the other side, the intentional fork occurs when a miner has supercomputer properties that generate a set of blocks as a branch and does not publish this branch to the blockchain until the length of that branch is greater than the length of the main branch. When this fork occurs in the system, a set of blockchain transactions will be rollbacked, user waiting times increases, and miner rewards increases illegally. In this paper, the Lightweight algorithm is proposed to avoid the intentional fork issue and therefore rollback issue, users waiting time is reduced in the transaction process. The proposed algorithm is to make a single publisher in the system and divides the block construction into two phases. In the first phase, a miner generates a block and sends it to the memory pool. In the second phase, the memory pool will publish the block to the blockchain. The results show that the proposed algorithm has a good ability to avoid the intentional fork issue in the blockchain and the rollback issue thus minimize user waiting times.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115922161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Implementation of Remotely Automated Control to the 14-inch Telescope System 对 14 英寸望远镜系统实施远程自动控制
Pub Date : 2020-12-15 DOI: 10.1109/ICCES51560.2020.9334664
A. Mansour, F. Elnagahy, M. Ismail
We have implemented a real-time remotely astronomical observation in Egypt. Now that a remote observer would be able to access our 14-inch astronomical telescope (CGE 1400), a dome enclosure, a CCD detector, and various scientific instruments. It is based on a developed integrated system, with a graphical user interface, making use of a TCP/IP protocol. Our platform is more affordable, robust, and applicable for other observatories, even for not computerized systems. Further, neither commercial kits nor software are used. The utilized communication protocol is basically based on row packets to achieve convenient speed in data transfer. We provide a comparison with current commercial systems and previous research in this trend.
我们在埃及实现了实时远程天文观测。现在,远程观测者可以使用我们的 14 英寸天文望远镜(CGE 1400)、一个圆顶外壳、一个 CCD 检测器和各种科学仪器。它基于一个开发的集成系统,具有图形用户界面,使用 TCP/IP 协议。我们的平台更加经济实惠、坚固耐用,适用于其他观测站,甚至非计算机化系统。此外,既没有使用商业套件,也没有使用软件。所使用的通信协议基本上是基于行数据包,以达到方便的数据传输速度。我们提供了与当前商业系统和在此趋势下的先前研究的比较。
{"title":"An Implementation of Remotely Automated Control to the 14-inch Telescope System","authors":"A. Mansour, F. Elnagahy, M. Ismail","doi":"10.1109/ICCES51560.2020.9334664","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334664","url":null,"abstract":"We have implemented a real-time remotely astronomical observation in Egypt. Now that a remote observer would be able to access our 14-inch astronomical telescope (CGE 1400), a dome enclosure, a CCD detector, and various scientific instruments. It is based on a developed integrated system, with a graphical user interface, making use of a TCP/IP protocol. Our platform is more affordable, robust, and applicable for other observatories, even for not computerized systems. Further, neither commercial kits nor software are used. The utilized communication protocol is basically based on row packets to achieve convenient speed in data transfer. We provide a comparison with current commercial systems and previous research in this trend.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127381776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 15th International Conference on Computer Engineering and Systems (ICCES)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1