首页 > 最新文献

IISA 2013最新文献

英文 中文
Distributed privacy-preserving P2P data mining via probabilistic neural network committee machines 通过概率神经网络委员会机进行分布式隐私保护 P2P 数据挖掘
Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623688
Y. Kokkinos, K. Margaritis
This work describes a probabilistic neural network (PNN) committee machine for Peer-to-Peer data mining. The pattern neurons of the PNN committee are composed of locally trained class-specialized regularization network Peer classifiers. The training takes into account the asynchronous distributed and privacy-preserving requirements that can be met in P2P systems. The Peer classifiers are first trained in parallel based on their local data. While no local data exchange is possible among them, the peers can exchange their classifiers in the form of binaries, or agents. Then an asynchronous distributed computing P2P cycle is executed to construct a mutual validation matrix. The train set of one Peer becomes the validation set of the other and only average rates are returned back. From this matrix we demonstrate that it is possible to perform weight based ensemble selection of best peer members for every class and in this way to find class-specialized Peer modules for the committee machine.
本作品介绍了一种用于点对点数据挖掘的概率神经网络(PNN)委员会机器。PNN 委员会的模式神经元由本地训练的类专用正则化网络 Peer 分类器组成。训练时考虑到了 P2P 系统中可以满足的异步分布式和隐私保护要求。对等分类器首先根据其本地数据进行并行训练。虽然它们之间不可能交换本地数据,但对等体可以二进制文件或代理的形式交换分类器。然后执行异步分布式计算 P2P 循环,构建相互验证矩阵。一个对等者的训练集成为另一个对等者的验证集,并且只返回平均率。根据该矩阵,我们可以为每个类别执行基于权重的最佳同行成员集合选择,并通过这种方式为委员会机器找到类别专用的同行模块。
{"title":"Distributed privacy-preserving P2P data mining via probabilistic neural network committee machines","authors":"Y. Kokkinos, K. Margaritis","doi":"10.1109/IISA.2013.6623688","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623688","url":null,"abstract":"This work describes a probabilistic neural network (PNN) committee machine for Peer-to-Peer data mining. The pattern neurons of the PNN committee are composed of locally trained class-specialized regularization network Peer classifiers. The training takes into account the asynchronous distributed and privacy-preserving requirements that can be met in P2P systems. The Peer classifiers are first trained in parallel based on their local data. While no local data exchange is possible among them, the peers can exchange their classifiers in the form of binaries, or agents. Then an asynchronous distributed computing P2P cycle is executed to construct a mutual validation matrix. The train set of one Peer becomes the validation set of the other and only average rates are returned back. From this matrix we demonstrate that it is possible to perform weight based ensemble selection of best peer members for every class and in this way to find class-specialized Peer modules for the committee machine.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129866417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
E-Care telemonitoring system: Extend the platform E-Care远程监控系统:扩展平台
Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623725
A. Benyahia, A. Hajjam, V. Hilaire, M. Hajjam, E. Andrès
In most developed countries; telemonitoring is increasingly used, due to the increasing of life expectancy and chronic diseases that accompany them. Indeed, chronic diseases are responsible for health care costs increasingly growing and remote monitoring systems provide a mean to monitor patients and their needs in the comfort of their own homes, with minimal costs. In older systems, the data were collected and sent directly to the medical experts to be interpreted. With technological advancements, software and systems have been developed for on-site data processing. In this paper, we present E-Care a telemonitoring platform that combines the semantic web and artificial intelligence. E-Care is based on generic ontologies and a decision support system. Ontologies provide knowledge for decision support. The decision support system is based on an inference engine; this engine is used for monitoring the health of the patient and the detection of abnormal situations. System reactions consist in alarms and recommendations for informing physicians. E-Care has a generic open architecture; in this paper we extend the platform by adding a module for auscultation sounds in this architecture.
在大多数发达国家;由于预期寿命的延长和伴随的慢性疾病,远程监测的使用越来越多。事实上,慢性病对日益增长的卫生保健费用负有责任,远程监测系统提供了一种方法,可以在舒适的家中以最低的费用监测患者及其需求。在旧的系统中,数据被收集并直接发送给医学专家进行解释。随着技术的进步,用于现场数据处理的软件和系统已经开发出来。在本文中,我们提出了E-Care一个结合语义网和人工智能的远程监控平台。E-Care基于通用本体和决策支持系统。本体为决策支持提供知识。决策支持系统基于推理机;该引擎用于监测患者的健康状况并检测异常情况。系统反应包括警报和通知医生的建议。E-Care有一个通用的开放式架构;在本文中,我们通过在该架构中添加听诊声音模块来扩展该平台。
{"title":"E-Care telemonitoring system: Extend the platform","authors":"A. Benyahia, A. Hajjam, V. Hilaire, M. Hajjam, E. Andrès","doi":"10.1109/IISA.2013.6623725","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623725","url":null,"abstract":"In most developed countries; telemonitoring is increasingly used, due to the increasing of life expectancy and chronic diseases that accompany them. Indeed, chronic diseases are responsible for health care costs increasingly growing and remote monitoring systems provide a mean to monitor patients and their needs in the comfort of their own homes, with minimal costs. In older systems, the data were collected and sent directly to the medical experts to be interpreted. With technological advancements, software and systems have been developed for on-site data processing. In this paper, we present E-Care a telemonitoring platform that combines the semantic web and artificial intelligence. E-Care is based on generic ontologies and a decision support system. Ontologies provide knowledge for decision support. The decision support system is based on an inference engine; this engine is used for monitoring the health of the patient and the detection of abnormal situations. System reactions consist in alarms and recommendations for informing physicians. E-Care has a generic open architecture; in this paper we extend the platform by adding a module for auscultation sounds in this architecture.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128362406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Density-based Kernel Scale estimation for Kernel clustering 核聚类中基于密度的核尺度估计
Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623736
S. Sellah, O. Nasraoui
Kernel clustering methods have been used successfully to cluster non linearly separable data. In this paper, we propose a modification of the Kernel K-means, called the Multi-Scale Kernel K-means, that addresses one important challenge, which is the automated estimation of the kernel scale parameters for data containing clusters with different scale values. We propose a novel method that estimates the local kernel scales using the local data density in the original space to learn an adaptive and localized kernel function. Our experimental results with the Multi-Scale Kernel K-means show significant enhancements over the standard Kernel K-means for data sets containing clusters with varying scales and densities.
核聚类方法已成功地用于非线性可分数据的聚类。在本文中,我们提出了一种核尺度K-means的改进,称为多尺度核尺度K-means,它解决了一个重要的挑战,即对包含不同尺度值的簇的数据的核尺度参数的自动估计。我们提出了一种利用原始空间中的局部数据密度估计局部核尺度来学习自适应和局部核函数的新方法。我们的实验结果表明,对于包含不同规模和密度的簇的数据集,多尺度核K-means比标准核K-means有显著的增强。
{"title":"Density-based Kernel Scale estimation for Kernel clustering","authors":"S. Sellah, O. Nasraoui","doi":"10.1109/IISA.2013.6623736","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623736","url":null,"abstract":"Kernel clustering methods have been used successfully to cluster non linearly separable data. In this paper, we propose a modification of the Kernel K-means, called the Multi-Scale Kernel K-means, that addresses one important challenge, which is the automated estimation of the kernel scale parameters for data containing clusters with different scale values. We propose a novel method that estimates the local kernel scales using the local data density in the original space to learn an adaptive and localized kernel function. Our experimental results with the Multi-Scale Kernel K-means show significant enhancements over the standard Kernel K-means for data sets containing clusters with varying scales and densities.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115587308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure collaborative multimedia learning scheme in cultural environments 文化环境下安全的协同多媒体学习方案
Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623702
A. Balia, D. Koukopoulos
Nowadays distance learning becomes more and more popular because it is an economical, flexible and self-adaptive form of education. Collaborative learning environments provide users (both learners and instructors) conditions for better communication and cooperation. Moreover, multimedia content due to its friendliness is preferred in such environments as it enhances the learning process. Such environments that are now quite popular can be used for the education in specific cultural areas. Cultural environments are special types of environments where users need the provision of high-quality smart services like collaborative interactive learning applications in a friendly, cheap and personalized way. In this work, we present an online collaborative learning environment where the instructors insert learning material that the learners can view. User and course material classification aims at supporting distance learning scenarios that cover the needs of various user groups such as art classes, teachers and students. This learning material is essentially multimedia cultural content, distributed via the Internet and so it must be protected against any misuse. Therefore, a security scheme is proposed in order to ensure the integrity and the authenticity of the distributed multimedia content. The proposed security scheme is based on attribute-based access control and the usage of digital certificates.
远程教育以其经济、灵活、适应性强的特点越来越受到人们的欢迎。协作学习环境为用户(学习者和教师)提供了更好的沟通和合作条件。此外,在这种环境中,多媒体内容由于其友好性而受到首选,因为它可以促进学习过程。现在非常流行的这种环境可以用于特定文化领域的教育。文化环境是一种特殊类型的环境,用户需要以友好、廉价和个性化的方式提供高质量的智能服务,如协作互动学习应用程序。在这项工作中,我们提出了一个在线协作学习环境,教师在其中插入学习者可以查看的学习材料。用户和课程材料分类的目的是支持远程学习方案,以满足艺术课、教师和学生等不同用户群体的需求。这种学习材料本质上是多媒体文化内容,通过互联网传播,因此必须加以保护,防止滥用。为此,为了保证分布式多媒体内容的完整性和真实性,提出了一种安全方案。提出的安全方案基于基于属性的访问控制和数字证书的使用。
{"title":"A secure collaborative multimedia learning scheme in cultural environments","authors":"A. Balia, D. Koukopoulos","doi":"10.1109/IISA.2013.6623702","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623702","url":null,"abstract":"Nowadays distance learning becomes more and more popular because it is an economical, flexible and self-adaptive form of education. Collaborative learning environments provide users (both learners and instructors) conditions for better communication and cooperation. Moreover, multimedia content due to its friendliness is preferred in such environments as it enhances the learning process. Such environments that are now quite popular can be used for the education in specific cultural areas. Cultural environments are special types of environments where users need the provision of high-quality smart services like collaborative interactive learning applications in a friendly, cheap and personalized way. In this work, we present an online collaborative learning environment where the instructors insert learning material that the learners can view. User and course material classification aims at supporting distance learning scenarios that cover the needs of various user groups such as art classes, teachers and students. This learning material is essentially multimedia cultural content, distributed via the Internet and so it must be protected against any misuse. Therefore, a security scheme is proposed in order to ensure the integrity and the authenticity of the distributed multimedia content. The proposed security scheme is based on attribute-based access control and the usage of digital certificates.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124473003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The use of Information and Communication Technologies in the first grade of primary school for teaching rectangles based in Realistic Mathematics Education 基于现实数学教育中的信息通信技术在小学一年级矩形教学中的应用
Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623694
Nicholas Zaranis
The aim of this study is to investigate the question: “Can Information and Communications Technology (ICT) helps to improve primary school students' geometry achievements for rectangles?” The applied educational software consisted of a story and several activities with and without the use of computers which were designed following the background of Realistic Mathematics Education for geometry concepts; referred to as the `Primary Shape Model' (PSM). In addition, we use a mathematical test referred to as the `Primary Shape Test' (PST) to explore the use of ICT in the primary classroom for teaching basic geometrical concepts. It is a task orientated test which attends to measure the level of geometry competence developed for students of the first grade. The study dealt with students in the first grade of primary school of Athens and Crete, who were divided into two teams (experimental and control). The experimental group consisted of 113 students, who were taught of rectangles by the support of computers. There were 121 students in the control group, which received only the traditional science instruction for rectangles. Students in both groups were pre-tested and post-tested for their geometry performance for rectangles. The results of the study indicated that teaching and learning through ICT is an interactive process for children at primary school level and has a positive effect for geometry education of rectangles.
摘要本研究旨在探讨资讯与通讯科技(ICT)是否有助于提高小学生的矩形几何成绩。应用教育软件是根据《现实数学教育》的几何概念背景设计的,由一个故事和几个有计算机和没有计算机的活动组成;被称为“初级形状模型”(PSM)。此外,我们使用一种称为“初级形状测试”(PST)的数学测试来探索在小学课堂上使用ICT来教授基本几何概念。它是一种以任务为导向的测试,旨在衡量一年级学生的几何能力发展水平。本研究以雅典和克里特岛的小学一年级学生为研究对象,将他们分为两组(实验组和对照组)。实验组由113名学生组成,他们在电脑的支持下学习矩形。对照组有121名学生,他们只接受了传统的矩形科学教学。两组学生都接受了矩形几何性能的前测和后测。研究结果表明,ICT的教与学对于小学阶段的儿童来说是一个互动的过程,对矩形几何教育具有积极的影响。
{"title":"The use of Information and Communication Technologies in the first grade of primary school for teaching rectangles based in Realistic Mathematics Education","authors":"Nicholas Zaranis","doi":"10.1109/IISA.2013.6623694","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623694","url":null,"abstract":"The aim of this study is to investigate the question: “Can Information and Communications Technology (ICT) helps to improve primary school students' geometry achievements for rectangles?” The applied educational software consisted of a story and several activities with and without the use of computers which were designed following the background of Realistic Mathematics Education for geometry concepts; referred to as the `Primary Shape Model' (PSM). In addition, we use a mathematical test referred to as the `Primary Shape Test' (PST) to explore the use of ICT in the primary classroom for teaching basic geometrical concepts. It is a task orientated test which attends to measure the level of geometry competence developed for students of the first grade. The study dealt with students in the first grade of primary school of Athens and Crete, who were divided into two teams (experimental and control). The experimental group consisted of 113 students, who were taught of rectangles by the support of computers. There were 121 students in the control group, which received only the traditional science instruction for rectangles. Students in both groups were pre-tested and post-tested for their geometry performance for rectangles. The results of the study indicated that teaching and learning through ICT is an interactive process for children at primary school level and has a positive effect for geometry education of rectangles.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121166029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An efficient secure data aggregation scheme for wireless sensor networks 一种高效安全的无线传感器网络数据聚合方案
Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623701
S. Othman, H. Alzaid, A. Trad, H. Youssef
Wireless sensor networks (WSNs) often consists of a large number of low-cost sensor nodes that have strictly limited sensing, computation, and communication capabilities. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. As wireless sensor networks are usually deployed in remote and hostile environments and used to transmit sensitive information, sensor nodes are prone to node compromise attacks and hence security issues such as data confidentiality and integrity are extremely important. A novel approach, which uses homomorphic encryption and additive digital signatures, is proposed to provide confidentiality, integrity for secure data aggregation in WSNs. The performance evaluation shows that the proposed scheme is efficient and scalable for large WSNs.
无线传感器网络(wsn)通常由大量低成本的传感器节点组成,这些节点的感知、计算和通信能力受到严格限制。由于这些独特的规范和缺乏防篡改的硬件,为wsn设计安全协议是复杂的。以往的研究表明,数据传输比计算消耗更多的能量。通过消除冗余数据,数据聚合可以极大地帮助减少这种消耗。由于无线传感器网络通常部署在远程和恶劣环境中,并用于传输敏感信息,传感器节点容易受到节点妥协攻击,因此数据机密性和完整性等安全问题极为重要。提出了一种利用同态加密和加性数字签名的方法,为无线传感器网络的数据安全聚合提供保密性和完整性。性能评估表明,该方案对大型无线传感器网络具有良好的有效性和可扩展性。
{"title":"An efficient secure data aggregation scheme for wireless sensor networks","authors":"S. Othman, H. Alzaid, A. Trad, H. Youssef","doi":"10.1109/IISA.2013.6623701","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623701","url":null,"abstract":"Wireless sensor networks (WSNs) often consists of a large number of low-cost sensor nodes that have strictly limited sensing, computation, and communication capabilities. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. As wireless sensor networks are usually deployed in remote and hostile environments and used to transmit sensitive information, sensor nodes are prone to node compromise attacks and hence security issues such as data confidentiality and integrity are extremely important. A novel approach, which uses homomorphic encryption and additive digital signatures, is proposed to provide confidentiality, integrity for secure data aggregation in WSNs. The performance evaluation shows that the proposed scheme is efficient and scalable for large WSNs.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"285 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122969683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
APPification of hospital healthcare and data management using QRcodes 使用qr码的医院医疗保健和数据管理应用
Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623716
Mersini Paschou, E. Sakkopoulos, A. Tsakalidis
In this work, we describe an integrated system, developed for use by the healthcare personnel within healthcare facilities, adapted to smartphones, tablets and handheld devices. Our key goal is to facilitate doctors, nurses and the involved personnel throughout the facility, regardless of the existence of network connection in the area using a typical smartphone. The proposed application and its backend system support access to patient's history, i.e. previous diagnoses, medication, and specification of allergies. More features include updates on the progress of the patient, sending referrals directly to hematology, microbiology or biochemistry laboratory and instant notification for the retrieval of laboratory results within a hospital or any healthcare institution. Additionally, we integrate Quick Response (QR code) for coding and accessing medical related data of the patient using a smartphone or a tablet, to be used by the facility itself or anyone else certified. The QR code significantly improves interoperability cases for legacy and non interrelated systems based on HL7 and XML transformation of the HL7 patient referrals.
在这项工作中,我们描述了一个集成系统,开发供医疗保健机构内的医疗保健人员使用,适用于智能手机,平板电脑和手持设备。我们的主要目标是方便医生、护士和整个设施的相关人员,无论该地区是否存在网络连接,都可以使用典型的智能手机。建议的应用程序及其后端系统支持访问患者的历史,即以前的诊断,药物和过敏说明。更多的功能包括更新患者的进展,将转诊直接发送到血液学、微生物学或生物化学实验室,以及在医院或任何医疗机构内检索实验室结果的即时通知。此外,我们整合了快速响应(QR码),用于使用智能手机或平板电脑编码和访问患者的医疗相关数据,供设施本身或任何其他认证人员使用。QR码显著提高了基于HL7和HL7患者转诊的XML转换的遗留系统和非相关系统的互操作性。
{"title":"APPification of hospital healthcare and data management using QRcodes","authors":"Mersini Paschou, E. Sakkopoulos, A. Tsakalidis","doi":"10.1109/IISA.2013.6623716","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623716","url":null,"abstract":"In this work, we describe an integrated system, developed for use by the healthcare personnel within healthcare facilities, adapted to smartphones, tablets and handheld devices. Our key goal is to facilitate doctors, nurses and the involved personnel throughout the facility, regardless of the existence of network connection in the area using a typical smartphone. The proposed application and its backend system support access to patient's history, i.e. previous diagnoses, medication, and specification of allergies. More features include updates on the progress of the patient, sending referrals directly to hematology, microbiology or biochemistry laboratory and instant notification for the retrieval of laboratory results within a hospital or any healthcare institution. Additionally, we integrate Quick Response (QR code) for coding and accessing medical related data of the patient using a smartphone or a tablet, to be used by the facility itself or anyone else certified. The QR code significantly improves interoperability cases for legacy and non interrelated systems based on HL7 and XML transformation of the HL7 patient referrals.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"06 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127231974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Evaluating security controls against HTTP-based DDoS attacks 评估针对基于http的DDoS攻击的安全控制
Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623707
Dimitrios Moustis, P. Kotzanikolaou
Distributed Denial of Service attacks generally require a botmaster controlling a large number of infected systems (bots) in order to take down a target service. However, more recent DDoS attacks targeting at the HTTP layer can be very effective even with a small number of infected bots. In this paper we analyze DDoS attacks which require only a small number of bots to render a web server unavailable. In order to study their behavior, we implement a Botnet system in a test environment. We simulate bots by using both Linux and Windows-based systems infected with Slowloris, an HTTP syn-flooder, targeting to a vulnerable Apache web server. We apply several security controls in order to test their effectiveness against such attacks. Our results show that only a combination of carefully selected anti-DDoS controls can significantly reduce the exposure to such attacks without affecting the provided service.
分布式拒绝服务攻击通常需要一个botmaster来控制大量受感染的系统(bot),以便关闭目标服务。然而,最近针对HTTP层的DDoS攻击即使使用少量受感染的僵尸程序也可以非常有效。在本文中,我们分析了DDoS攻击,它只需要少量的机器人来渲染web服务器不可用。为了研究它们的行为,我们在测试环境中实现了一个僵尸网络系统。我们通过使用感染了Slowloris(一种HTTP syn-flood)的Linux和windows系统来模拟机器人,目标是一个易受攻击的Apache web服务器。我们应用了几个安全控制来测试它们对此类攻击的有效性。我们的结果表明,只有精心选择的反ddos控制组合才能显着减少对此类攻击的暴露,而不会影响所提供的服务。
{"title":"Evaluating security controls against HTTP-based DDoS attacks","authors":"Dimitrios Moustis, P. Kotzanikolaou","doi":"10.1109/IISA.2013.6623707","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623707","url":null,"abstract":"Distributed Denial of Service attacks generally require a botmaster controlling a large number of infected systems (bots) in order to take down a target service. However, more recent DDoS attacks targeting at the HTTP layer can be very effective even with a small number of infected bots. In this paper we analyze DDoS attacks which require only a small number of bots to render a web server unavailable. In order to study their behavior, we implement a Botnet system in a test environment. We simulate bots by using both Linux and Windows-based systems infected with Slowloris, an HTTP syn-flooder, targeting to a vulnerable Apache web server. We apply several security controls in order to test their effectiveness against such attacks. Our results show that only a combination of carefully selected anti-DDoS controls can significantly reduce the exposure to such attacks without affecting the provided service.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127344854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
EWOS: A sealed-bid auction system design and implementation for electricity interonnector capacity allocation EWOS:一种用于电力互联容量分配的密封投标拍卖系统设计与实现
Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623720
Panagiota Vatsolaki, A. Tsalpatouros
Electricity Transmission System Interconnectors are critical infrastructures at a national and European level, connecting different electricity areas. Phenomena of capacity demand congestion of the Transmission Interconnectors are handled with auction mechanisms. In this paper, we describe EWOS, a “sealed-bid, first price” method and auction system for electricity auctions. EWOS guarantees the auction security by implementing a transparent and verifiable by all process, based on public-key encryption and a two-phase time protocol. Additional and demanding critical system security and dependability properties are ensured with the use of security policy, and software assurance. EWOS method being secure, reliable and efficient, is used since 2006 for the conduct of numerous daily, monthly and yearly auctions for Transmission Interconnection capacity allocation.
电力传输系统互连器是国家和欧洲一级的关键基础设施,连接不同的电力区域。采用竞价机制处理了输电网络的容量需求拥塞现象。在本文中,我们描述了EWOS,一种“密封出价,第一价格”的电力拍卖方法和拍卖系统。EWOS通过基于公钥加密和两阶段时间协议,实现透明且可验证的所有流程来保证拍卖安全性。通过使用安全策略和软件保证,确保了附加的和要求苛刻的关键系统安全性和可靠性属性。EWOS方法安全、可靠、高效,自2006年以来被用于进行大量的每日、每月和每年的输电互联容量分配拍卖。
{"title":"EWOS: A sealed-bid auction system design and implementation for electricity interonnector capacity allocation","authors":"Panagiota Vatsolaki, A. Tsalpatouros","doi":"10.1109/IISA.2013.6623720","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623720","url":null,"abstract":"Electricity Transmission System Interconnectors are critical infrastructures at a national and European level, connecting different electricity areas. Phenomena of capacity demand congestion of the Transmission Interconnectors are handled with auction mechanisms. In this paper, we describe EWOS, a “sealed-bid, first price” method and auction system for electricity auctions. EWOS guarantees the auction security by implementing a transparent and verifiable by all process, based on public-key encryption and a two-phase time protocol. Additional and demanding critical system security and dependability properties are ensured with the use of security policy, and software assurance. EWOS method being secure, reliable and efficient, is used since 2006 for the conduct of numerous daily, monthly and yearly auctions for Transmission Interconnection capacity allocation.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134465987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic extraction of upper human body in single images 单幅图像中上半身的自动提取
Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623733
A. Tsitsoulis, N. Bourbakis
Extraction of the human body in single, unconstrained, monocular images is a very difficult task. Localization and extraction of the body region, however, provides important and useful knowledge that can facilitate many other tasks, such as gesture recognition, pose estimation and action recognition. In this paper we present a simple appearance-based methodology that combines face detection, skin detection, image segmentation and anthropometric constraints to efficiently estimate the position and regions of hands in images. It requires no training neither explicit estimation of the human pose. Experimental results in a difficult dataset illustrate the performance of the approach.
在单一的、无约束的、单目图像中提取人体是一项非常困难的任务。然而,身体区域的定位和提取提供了重要和有用的知识,可以促进许多其他任务,如手势识别,姿态估计和动作识别。在本文中,我们提出了一种简单的基于外观的方法,该方法结合了人脸检测、皮肤检测、图像分割和人体测量约束,以有效地估计图像中手的位置和区域。它不需要训练,也不需要对人体姿势的明确估计。在复杂数据集上的实验结果验证了该方法的有效性。
{"title":"Automatic extraction of upper human body in single images","authors":"A. Tsitsoulis, N. Bourbakis","doi":"10.1109/IISA.2013.6623733","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623733","url":null,"abstract":"Extraction of the human body in single, unconstrained, monocular images is a very difficult task. Localization and extraction of the body region, however, provides important and useful knowledge that can facilitate many other tasks, such as gesture recognition, pose estimation and action recognition. In this paper we present a simple appearance-based methodology that combines face detection, skin detection, image segmentation and anthropometric constraints to efficiently estimate the position and regions of hands in images. It requires no training neither explicit estimation of the human pose. Experimental results in a difficult dataset illustrate the performance of the approach.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"79 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132948179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IISA 2013
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1