首页 > 最新文献

2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)最新文献

英文 中文
NotPetya: Cyber Attack Prevention through Awareness via Gamification NotPetya:通过游戏化意识来预防网络攻击
Pub Date : 2018-07-11 DOI: 10.1109/ICSCEE.2018.8538431
Reyner Aranta Lika, D. Murugiah, S. Brohi, D. Ramasamy
NotPetya, when released in 2017, was believed to be ransomware. NotPetya injects malicious codes in the computer and then attempts to gain administrator access. Following that, it infects other computers in the network. NotPetya uses the EternalBlue Server Message Block (SMB) exploit to conduct the attacks. The hard drives get encrypted, and when the computer is booted, the ransom note is displayed. NotPetya does not provide enough information for a decryption key to be produced, making it a malware. Businesses across industries have been affected without having an opportunity for system recovery. While definite solutions are lacking, vaccines exist, where, the presence of a local file, blocks the NotPetya execution. Activating the vaccine can be tedious and cumbersome for average computer users. Hence, our solution is intended to educate them in an interactive manner. Users will be more susceptible towards the vaccination while learning about security habits that need to be practiced. From this, average computer users can walk away with the knowledge that can protect them from future attacks.
2017年发布的NotPetya被认为是勒索软件。NotPetya在计算机中注入恶意代码,然后试图获得管理员访问权限。然后,它会感染网络中的其他计算机。NotPetya利用SMB (EternalBlue Server Message Block)漏洞进行攻击。硬盘被加密,当电脑启动时,就会显示勒索信。NotPetya没有提供足够的信息来生成解密密钥,使其成为恶意软件。各行各业的企业都受到了影响,没有机会进行系统恢复。虽然缺乏明确的解决方案,但存在疫苗,其中存在本地文件,可以阻止NotPetya的执行。对于普通计算机用户来说,激活疫苗可能是冗长而繁琐的。因此,我们的解决方案旨在以互动的方式教育他们。用户将更容易接种疫苗,同时了解需要实践的安全习惯。从这里,普通计算机用户可以带着可以保护他们免受未来攻击的知识离开。
{"title":"NotPetya: Cyber Attack Prevention through Awareness via Gamification","authors":"Reyner Aranta Lika, D. Murugiah, S. Brohi, D. Ramasamy","doi":"10.1109/ICSCEE.2018.8538431","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538431","url":null,"abstract":"NotPetya, when released in 2017, was believed to be ransomware. NotPetya injects malicious codes in the computer and then attempts to gain administrator access. Following that, it infects other computers in the network. NotPetya uses the EternalBlue Server Message Block (SMB) exploit to conduct the attacks. The hard drives get encrypted, and when the computer is booted, the ransom note is displayed. NotPetya does not provide enough information for a decryption key to be produced, making it a malware. Businesses across industries have been affected without having an opportunity for system recovery. While definite solutions are lacking, vaccines exist, where, the presence of a local file, blocks the NotPetya execution. Activating the vaccine can be tedious and cumbersome for average computer users. Hence, our solution is intended to educate them in an interactive manner. Users will be more susceptible towards the vaccination while learning about security habits that need to be practiced. From this, average computer users can walk away with the knowledge that can protect them from future attacks.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121901914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The Effect of the Organization Factors, Technology and Social Influences on E-Government Adoption in Jordan 组织因素、技术和社会因素对约旦电子政务采用的影响
Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538394
Y. El-Ebiary
An Electronic Government employs the Information and Communication Technology (ICT) to improve the functions of public organizations and their activities. And some references define the e-Government as an application running over the internet, or just an intermediary that interacts between government and external environment. The essential objective of this study is to inspect the innovation diffusion theory with the external factor, the social influences. This research is a quantitative study using survey approach. In the current research, the target population exists in Jordan. The citizen opinions are very important for the investigation on using egovernment behavior. Findings in this paper propose some factors that are important for the behavior intention in egovernment in Jordan. The most significant factor is the behavior intension to use appears to be adoptions and facilitated by the usefulness of e-government services, and other benefits of governments lead to more acceptances among Jordan’s citizens.
电子政府采用资讯及通讯科技(ICT)来改善公共机构的功能和活动。一些文献将电子政务定义为运行在互联网上的应用程序,或者仅仅是政府与外部环境交互的中介。本研究的主要目的是用外部因素,即社会影响来考察创新扩散理论。本研究采用调查方法进行定量研究。在目前的研究中,目标人群存在于约旦。公民意见是调查电子政务使用行为的重要依据。本文的研究结果提出了影响约旦电子政务行为意愿的一些重要因素。最重要的因素是使用的行为意向似乎是通过电子政务服务的有用性来采用和促进的,政府的其他好处导致约旦公民更多地接受。
{"title":"The Effect of the Organization Factors, Technology and Social Influences on E-Government Adoption in Jordan","authors":"Y. El-Ebiary","doi":"10.1109/ICSCEE.2018.8538394","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538394","url":null,"abstract":"An Electronic Government employs the Information and Communication Technology (ICT) to improve the functions of public organizations and their activities. And some references define the e-Government as an application running over the internet, or just an intermediary that interacts between government and external environment. The essential objective of this study is to inspect the innovation diffusion theory with the external factor, the social influences. This research is a quantitative study using survey approach. In the current research, the target population exists in Jordan. The citizen opinions are very important for the investigation on using egovernment behavior. Findings in this paper propose some factors that are important for the behavior intention in egovernment in Jordan. The most significant factor is the behavior intension to use appears to be adoptions and facilitated by the usefulness of e-government services, and other benefits of governments lead to more acceptances among Jordan’s citizens.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115170701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Robust Method for Identification of Paper Currency Using Otsu’s Thresholding 一种基于Otsu阈值的稳健纸币识别方法
Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538424
M. A. Ansari, Suresh Kumar Mahraj
In this modern world, the correct identification of paper currency is an essential need for the automation of current systems. The automatic currency identification method is highly required to reduce the human power in recognizing the currency and its associated value. Sometimes, the damaged or blurred currency and the complex design of the currency make the task of identification much difficult. In this paper, a method is proposed that can identify paper currency by considering the identification marks given on the currency. Specifically, this study focuses on the identification of Pakistani paper currency. The proposed method makes use of the fundamental image processing techniques for differentiating the major denominations. Particularly, the proposed algorithm uses Otsu’s thresholding method and circulatory matrix criteria for locating the special identity marks given on the currency. The effectiveness of the proposed approach has been shown by performing various experiments on all of the major denominations of Pakistani paper currency with varying intensities. The Proposed method shows quite satisfactory results in terms of accuracy and efficiency.
在这个现代世界,正确识别纸币是当前系统自动化的基本需要。货币自动识别方法对减少识别货币及其相关价值的人力要求很高。有时,损坏或模糊的货币以及复杂的货币设计使识别任务变得非常困难。本文提出了一种利用纸币上的识别标志来识别纸币的方法。具体而言,本研究的重点是巴基斯坦纸币的识别。该方法利用基本的图像处理技术来区分主要面额。该算法采用Otsu阈值法和循环矩阵准则对货币上的特殊标识进行定位。通过对巴基斯坦所有主要面额的纸币进行不同强度的各种实验,表明了所提议的方法的有效性。该方法在精度和效率方面取得了令人满意的结果。
{"title":"A Robust Method for Identification of Paper Currency Using Otsu’s Thresholding","authors":"M. A. Ansari, Suresh Kumar Mahraj","doi":"10.1109/ICSCEE.2018.8538424","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538424","url":null,"abstract":"In this modern world, the correct identification of paper currency is an essential need for the automation of current systems. The automatic currency identification method is highly required to reduce the human power in recognizing the currency and its associated value. Sometimes, the damaged or blurred currency and the complex design of the currency make the task of identification much difficult. In this paper, a method is proposed that can identify paper currency by considering the identification marks given on the currency. Specifically, this study focuses on the identification of Pakistani paper currency. The proposed method makes use of the fundamental image processing techniques for differentiating the major denominations. Particularly, the proposed algorithm uses Otsu’s thresholding method and circulatory matrix criteria for locating the special identity marks given on the currency. The effectiveness of the proposed approach has been shown by performing various experiments on all of the major denominations of Pakistani paper currency with varying intensities. The Proposed method shows quite satisfactory results in terms of accuracy and efficiency.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115386740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Complex Plane Spectral Subtraction Method for Vehicle Interior Speaker Recognition Systems 车辆内部扬声器识别系统的复平面谱减法
Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538418
Shuiping Wang, Shiqiang Li, Chunnian Fan
The performance of speaker recognition systems drops significantly under vehicle interior noisy conditions. The traditional spectral subtraction algorithm is a popular method for noise reduction but suffers from musical noise distortion. To compensate for this problem, we proposed a new complex plane approach for spectral subtraction. The proposed method rectifies the incorrect assumption about the cross terms involving the phase difference between the clean speech and noise signals being zero. We assessed the novel speech enhancement method using utterances corrupted by volvo car-interior noises in different signal-to-noise ratios (SNRs) levels. Spectrogram analysis results show that the complex plane method performs significantly better than the traditional spectral subtraction algorithm. In addition, the new speech enhancement method was evaluated by three groups of speaker data from the TIMIT database with a 32-order Gaussian Mixture Model (GMM) based speaker recognition system. The experiments revealed that the proposed approach performed better than the traditional spectral subtraction in the pre-processing stage of speaker recognition systems1.
在车内噪声条件下,扬声器识别系统的性能明显下降。传统的谱减算法是一种常用的降噪方法,但存在音乐噪声失真的问题。为了弥补这一问题,我们提出了一种新的复平面谱减法。该方法修正了关于干净语音信号与噪声信号相位差为零的交叉项的错误假设。我们以不同信噪比(SNRs)水平的沃尔沃汽车内部噪声所破坏的话语来评估这种新的语音增强方法。谱图分析结果表明,复平面法的性能明显优于传统的谱减法算法。此外,利用基于32阶高斯混合模型(GMM)的说话人识别系统对TIMIT数据库中的三组说话人数据进行了评价。实验表明,该方法在说话人识别系统预处理阶段的性能优于传统的谱减法方法1。
{"title":"A Complex Plane Spectral Subtraction Method for Vehicle Interior Speaker Recognition Systems","authors":"Shuiping Wang, Shiqiang Li, Chunnian Fan","doi":"10.1109/ICSCEE.2018.8538418","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538418","url":null,"abstract":"The performance of speaker recognition systems drops significantly under vehicle interior noisy conditions. The traditional spectral subtraction algorithm is a popular method for noise reduction but suffers from musical noise distortion. To compensate for this problem, we proposed a new complex plane approach for spectral subtraction. The proposed method rectifies the incorrect assumption about the cross terms involving the phase difference between the clean speech and noise signals being zero. We assessed the novel speech enhancement method using utterances corrupted by volvo car-interior noises in different signal-to-noise ratios (SNRs) levels. Spectrogram analysis results show that the complex plane method performs significantly better than the traditional spectral subtraction algorithm. In addition, the new speech enhancement method was evaluated by three groups of speaker data from the TIMIT database with a 32-order Gaussian Mixture Model (GMM) based speaker recognition system. The experiments revealed that the proposed approach performed better than the traditional spectral subtraction in the pre-processing stage of speaker recognition systems1.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115747395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integrated Health Monitoring System using GSM and IoT 使用GSM和物联网的综合健康监测系统
Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538366
Suliman Mohamed Fati, Amgad Muneer, Dheeraj Mungur, Ahmad Badawi
This paper proposes a health monitoring system for the patient in a coma based on GSM and Internet of Things (IoT). In this proposed system, the four health parameters implemented are LM35 temperature sensor, heartbeat sensor, accelerometer sensor and eye blink sensor. Using these four parameters simultaneously, it has been monitored the coma patient’s condition. Hence ruling out the use of the thermometer and other devices to check the condition of the patient. Consequently, there is no need for a lot of clinical staff nor accompanying persons to be physically present to check the condition of the patient because there is GSM module to send SMS message to the mobile phone of the person in charge (nurses/doctor) in case there is any abnormalities in health parameters. Moreover, this system uses Wi-Fi for IoT wherein “Thingspeak” is used to monitor the coma patient online via mobile phone. Alternatively, the patient’s relative can log in easily to the system to check the patient statues. The IoT shows the results online of body temperature, heartbeat, body movement and eye blink along with the time and the date for each parameter. Additionally, the results achieved for the body temperature and the heartbeat are 360° and 87 BPM respectively. Finally, the results obtained by the MPU-6050 gyroscope and the eye blink sensor were very satisfactory.
提出了一种基于GSM和物联网(IoT)的昏迷患者健康监测系统。在本系统中,实现了LM35温度传感器、心跳传感器、加速度传感器和眨眼传感器四个健康参数。同时使用这四个参数,监测昏迷患者的状态。因此,排除了使用温度计和其他设备来检查病人的情况。因此,不需要大量的临床工作人员或陪同人员亲自检查患者的病情,因为有GSM模块,当健康参数出现异常时,可以向负责人(护士/医生)的手机发送短信。此外,该系统使用Wi-Fi进行物联网,其中使用“Thingspeak”通过手机在线监测昏迷患者。或者,患者的亲属可以很容易地登录到系统来检查患者的状态。物联网可以在线显示体温、心跳、身体运动和眨眼的结果,以及每个参数的时间和日期。此外,体温和心跳的结果分别为360°和87 BPM。最后,MPU-6050陀螺仪和眨眼传感器的测量结果令人满意。
{"title":"Integrated Health Monitoring System using GSM and IoT","authors":"Suliman Mohamed Fati, Amgad Muneer, Dheeraj Mungur, Ahmad Badawi","doi":"10.1109/ICSCEE.2018.8538366","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538366","url":null,"abstract":"This paper proposes a health monitoring system for the patient in a coma based on GSM and Internet of Things (IoT). In this proposed system, the four health parameters implemented are LM35 temperature sensor, heartbeat sensor, accelerometer sensor and eye blink sensor. Using these four parameters simultaneously, it has been monitored the coma patient’s condition. Hence ruling out the use of the thermometer and other devices to check the condition of the patient. Consequently, there is no need for a lot of clinical staff nor accompanying persons to be physically present to check the condition of the patient because there is GSM module to send SMS message to the mobile phone of the person in charge (nurses/doctor) in case there is any abnormalities in health parameters. Moreover, this system uses Wi-Fi for IoT wherein “Thingspeak” is used to monitor the coma patient online via mobile phone. Alternatively, the patient’s relative can log in easily to the system to check the patient statues. The IoT shows the results online of body temperature, heartbeat, body movement and eye blink along with the time and the date for each parameter. Additionally, the results achieved for the body temperature and the heartbeat are 360° and 87 BPM respectively. Finally, the results obtained by the MPU-6050 gyroscope and the eye blink sensor were very satisfactory.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"47 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126048487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Face recognition and detection using Random forest and combination of LBP and HOG features 基于随机森林和LBP与HOG特征相结合的人脸识别与检测
Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538377
HUDA. H. Mady, Shadi M. S. Hilles
the effective facial recognition method should perform well in unregulated environments based on video broadcast to satisfy the demands of applications in real-world However, this still remains a big challenge for most current face recognition algorithms that will affect the accuracy of the system. This study was conducted to develop face recognition method based on video broadcast under illumination variation, facial expressions, different pose, orientation, occlusion, nationality variation and motion. Viola-Jones algorithm was applied to improve face detection which is these method have proven to detect the faces in an uncontrolled environment in the real world simply and high accuracy. A combination of Histograms of Oriented Gradients (HOG) and Local Binary Pattern (LBP) descriptors was conducted for faces features extraction purpose. These descriptors have proven to be lower computational time. The latest and accurate technique was applied for face classification based on Random Forest classifier (RF). To evaluate the efficiency of the Random Forest classifier, compared it with Support Vector Machine classifiers (SVM) is done with different existing feature extraction methods. Four experiments were implemented on Mediu staff database and excellent results have reported the efficiency of proposed algorithm average recognition accuracy 97.6% The Computer Vision and Image Processing MAT LAB 2016b Toolboxes was used for coding the desired system, dataset based on videos.
有效的人脸识别方法必须在基于视频广播的非规范环境中表现良好,才能满足现实应用的需求。然而,这对于目前大多数人脸识别算法来说仍然是一个很大的挑战,会影响系统的准确性。本文研究了基于光照变化、面部表情、不同姿势、方位、遮挡、国籍变化和运动的视频播放人脸识别方法。采用Viola-Jones算法对人脸检测进行改进,证明该方法在现实世界非受控环境下的人脸检测简单、准确率高。结合定向梯度直方图(HOG)和局部二值模式(LBP)描述符进行人脸特征提取。这些描述符已被证明具有较低的计算时间。将随机森林分类器应用于人脸分类中。为了评价随机森林分类器的效率,将其与支持向量机分类器(SVM)进行了比较,采用不同的现有特征提取方法。在Mediu staff数据库上进行了四次实验,取得了良好的结果,所提出的算法效率高,平均识别准确率为97.6%。计算机视觉与图像处理MAT LAB 2016b工具箱用于编码所需的系统,基于视频的数据集。
{"title":"Face recognition and detection using Random forest and combination of LBP and HOG features","authors":"HUDA. H. Mady, Shadi M. S. Hilles","doi":"10.1109/ICSCEE.2018.8538377","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538377","url":null,"abstract":"the effective facial recognition method should perform well in unregulated environments based on video broadcast to satisfy the demands of applications in real-world However, this still remains a big challenge for most current face recognition algorithms that will affect the accuracy of the system. This study was conducted to develop face recognition method based on video broadcast under illumination variation, facial expressions, different pose, orientation, occlusion, nationality variation and motion. Viola-Jones algorithm was applied to improve face detection which is these method have proven to detect the faces in an uncontrolled environment in the real world simply and high accuracy. A combination of Histograms of Oriented Gradients (HOG) and Local Binary Pattern (LBP) descriptors was conducted for faces features extraction purpose. These descriptors have proven to be lower computational time. The latest and accurate technique was applied for face classification based on Random Forest classifier (RF). To evaluate the efficiency of the Random Forest classifier, compared it with Support Vector Machine classifiers (SVM) is done with different existing feature extraction methods. Four experiments were implemented on Mediu staff database and excellent results have reported the efficiency of proposed algorithm average recognition accuracy 97.6% The Computer Vision and Image Processing MAT LAB 2016b Toolboxes was used for coding the desired system, dataset based on videos.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126642230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Reducing USB Attack Surface: A Lightweight Authentication and Delegation Protocol 减少USB攻击面:一个轻量级的身份验证和授权协议
Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538400
Arash Mahboubi, S. Çamtepe, Hasmukh Morarji
A privately owned smart device connected to a corporate network using a USB connection creates a potential channel for malware infection and its subsequent spread. For example, air-gapped (a.k.a. isolated) systems are considered to be the most secure and safest places for storing critical datasets. However, unlike network communications, USB connection streams have no authentication and filtering. Consequently, intentional or unintentional piggybacking of a malware infected USB storage or a mobile device through the air-gap is sufficient to spread infection into such systems. Our findings show that the contact rate has an exceptional impact on malware spread and destabilizing free malware equilibrium. This work proposes a USB authentication and delegation protocol based on radiofrequency identification (RFID) in order to stabilize the free malware equilibrium in air-gapped networks. The proposed protocol is modelled using Coloured Petri nets (CPN) and the model is verified and validated through CPN tools.
私人拥有的智能设备通过USB连接到公司网络,为恶意软件感染和随后的传播创造了一个潜在的渠道。例如,气隙(又名隔离)系统被认为是存储关键数据集最安全的地方。但是,与网络通信不同,USB连接流没有身份验证和过滤。因此,有意或无意地通过气隙携带恶意软件感染的USB存储或移动设备足以将感染传播到此类系统中。我们的研究结果表明,接触率对恶意软件的传播和破坏自由恶意软件的平衡有特殊的影响。本文提出了一种基于射频识别(RFID)的USB认证和授权协议,以稳定气隙网络中自由恶意软件的平衡。提出的协议使用彩色Petri网(CPN)建模,并通过CPN工具对模型进行验证和验证。
{"title":"Reducing USB Attack Surface: A Lightweight Authentication and Delegation Protocol","authors":"Arash Mahboubi, S. Çamtepe, Hasmukh Morarji","doi":"10.1109/ICSCEE.2018.8538400","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538400","url":null,"abstract":"A privately owned smart device connected to a corporate network using a USB connection creates a potential channel for malware infection and its subsequent spread. For example, air-gapped (a.k.a. isolated) systems are considered to be the most secure and safest places for storing critical datasets. However, unlike network communications, USB connection streams have no authentication and filtering. Consequently, intentional or unintentional piggybacking of a malware infected USB storage or a mobile device through the air-gap is sufficient to spread infection into such systems. Our findings show that the contact rate has an exceptional impact on malware spread and destabilizing free malware equilibrium. This work proposes a USB authentication and delegation protocol based on radiofrequency identification (RFID) in order to stabilize the free malware equilibrium in air-gapped networks. The proposed protocol is modelled using Coloured Petri nets (CPN) and the model is verified and validated through CPN tools.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122309887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Extended User Centered Design (UCD) Process in the Aspect of Human Computer Interaction 扩展用户中心设计(UCD)过程在人机交互方面
Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538388
A. Mithun, W. Yafooz
Design methodology of the Human-computer interaction (HCI) ensures stability, efficiency, and usability of the future artifacts. HCI concerned for the development of interaction methods as well as user interfaces. Several methods are used since the term HCI was coined. HCI methodologies are formed into various certain features and the features are based on the user acceptance, usability, and technical issues, indeed each method based on a specific affair. A method or process ‘User-Centered design’ (UCD) is exercising in a broad area of HCI. In spite of existing UCD process significance, in a while, several boundaries and limitations arise during the development of the artifacts. UCD process is not static, and the variations in UCD incorporated into various approaches depending on needs, and task. The principle of UCD process is to involve the user participation in the development to ensure users demand and interests. For the variations of UCD process researchers are developing the model by extending diverse technical and conceptual terms depending on respective activities, therefore occasionally the process draws inappropriate images of the future artifacts, although ISO 9241-210 defined an ideal UCD process guidelines to HCI development. This research analyzed the significance, usability, and the absence of existing UCD process and extended a conceptual term as Elicitation. Respective section illustrated the extended term significance, practice and approaches to HCI design. The key concern is to develop the UCD method in this research, alongside discuss the existing methods limitations and absences for future HCI development.
人机交互(HCI)的设计方法确保了未来工件的稳定性、效率和可用性。人机交互关注交互方法和用户界面的开发。自术语HCI被创造出来以来,使用了几种方法。HCI方法被形成各种特定的特征,这些特征是基于用户接受度、可用性和技术问题,实际上每个方法都基于一个特定的事务。“以用户为中心的设计”(UCD)方法或过程在HCI的广泛领域得到了应用。尽管存在UCD过程的重要性,但在工件的开发过程中出现了一些边界和限制。UCD过程不是静态的,根据需求和任务的不同,UCD中的变化被合并到不同的方法中。UCD过程的原则是让用户参与开发,以确保用户的需求和利益。对于UCD过程的变化,研究人员正在根据各自的活动扩展不同的技术和概念术语来开发模型,因此,尽管ISO 9241-210为HCI开发定义了理想的UCD过程指南,但偶尔过程会绘制未来工件的不适当图像。本研究分析了现有UCD过程的重要性、可用性和缺位,并扩展了一个概念术语“Elicitation”。各部分分别阐述了HCI设计的长期意义、实践和方法。关键问题是在本研究中开发UCD方法,同时讨论现有方法的局限性和未来HCI发展的不足。
{"title":"Extended User Centered Design (UCD) Process in the Aspect of Human Computer Interaction","authors":"A. Mithun, W. Yafooz","doi":"10.1109/ICSCEE.2018.8538388","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538388","url":null,"abstract":"Design methodology of the Human-computer interaction (HCI) ensures stability, efficiency, and usability of the future artifacts. HCI concerned for the development of interaction methods as well as user interfaces. Several methods are used since the term HCI was coined. HCI methodologies are formed into various certain features and the features are based on the user acceptance, usability, and technical issues, indeed each method based on a specific affair. A method or process ‘User-Centered design’ (UCD) is exercising in a broad area of HCI. In spite of existing UCD process significance, in a while, several boundaries and limitations arise during the development of the artifacts. UCD process is not static, and the variations in UCD incorporated into various approaches depending on needs, and task. The principle of UCD process is to involve the user participation in the development to ensure users demand and interests. For the variations of UCD process researchers are developing the model by extending diverse technical and conceptual terms depending on respective activities, therefore occasionally the process draws inappropriate images of the future artifacts, although ISO 9241-210 defined an ideal UCD process guidelines to HCI development. This research analyzed the significance, usability, and the absence of existing UCD process and extended a conceptual term as Elicitation. Respective section illustrated the extended term significance, practice and approaches to HCI design. The key concern is to develop the UCD method in this research, alongside discuss the existing methods limitations and absences for future HCI development.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114349005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Latent Fingerprint Enhancement Based On Directional Total Variation Model With Lost Minutiae Reconstruction 基于丢失细节重建的方向性全变分模型的潜在指纹增强
Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538417
A. Liban, Shadi M. S. Hilles
Latent fingerprint matching assists for law enforcement agencies to identify criminals. Image enhancement plays an important role in automatic latent fingerprint segmentation and matching systems. Even-though sufficient progress done in both rolled and plain fingerprint images enhancement, latent fingerprint enhancement still a challenging problem and existing issue in the current research. This is due to the existence of poor quality images in latent fingerprint with unclear ridge structure and various overlapping patterns together with presence of structured noise. Prior to latent fingerprint segmentation and feature extraction, latent fingerprint image enhancement is necessary step to suppress different noises and improve the clarity of ridge structure. This paper reviews the current techniques used for the latent fingerprint enhancement. Thus, it presents hybrid model which is combination of edge directional total variation model (EDTV) and quality image enhancement with lost minutia reconstruction. NIST SD27 database has been used to test the proposed techniques and RMSE, PSNR to measure the performance. The result of the proposed technique shows enhancement of clarity of input latent fingerprint images and well de-noising of good, bad and ugly images of latent fingerprint. There is a statistically significant difference in the mean length of PSNR and RMSE for different categories of the latent fingerprint images (good, bad and ugly). It’s observed that the proposed technique performs well for the good latent fingerprint images compare to bad and ugly images. The result after enhancement present RMSE average 0.018373, 0.022287, and 0.023199 for the three different image categories available in SD27 data set good, bad and ugly images respectively while the PSNR average achieved 82.99068, 81.39749, and 81.07826 respectively. The proposed enhancement technique improved the matching accuracy of latent fingerprint images about 30{%
潜在指纹匹配协助执法机构识别罪犯。图像增强在自动潜指纹分割与匹配系统中起着重要的作用。尽管在指纹图像的增强方面取得了长足的进展,但指纹图像的潜在增强仍然是当前研究中具有挑战性和存在的问题。这是由于潜在指纹图像质量较差,脊状结构不清晰,重叠图案多种多样,同时存在结构化噪声。在潜在指纹分割和特征提取之前,潜在指纹图像增强是抑制不同噪声和提高脊结构清晰度的必要步骤。本文综述了目前用于潜在指纹增强的技术。为此,提出了边缘定向全变分模型(EDTV)与图像质量增强和丢失细节重建相结合的混合模型。已使用NIST SD27数据库对所提出的技术进行了测试,并使用RMSE、PSNR来衡量性能。实验结果表明,该方法增强了输入指纹潜影图像的清晰度,对指纹潜影图像的好、坏、丑都有较好的去噪效果。不同类别指纹潜像(好、坏、丑)的平均PSNR和RMSE长度差异有统计学意义。实验结果表明,该方法对较好的潜在指纹图像处理效果优于较差和较丑的潜在指纹图像。增强后的结果显示,SD27数据集中三种不同图像类别的good、bad和ugly图像的RMSE平均值分别为0.018373、0.022287和0.023199,PSNR平均值分别为82.99068、81.39749和81.07826。所提出的增强技术可使潜在指纹图像的匹配精度提高约30 %
{"title":"Latent Fingerprint Enhancement Based On Directional Total Variation Model With Lost Minutiae Reconstruction","authors":"A. Liban, Shadi M. S. Hilles","doi":"10.1109/ICSCEE.2018.8538417","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538417","url":null,"abstract":"Latent fingerprint matching assists for law enforcement agencies to identify criminals. Image enhancement plays an important role in automatic latent fingerprint segmentation and matching systems. Even-though sufficient progress done in both rolled and plain fingerprint images enhancement, latent fingerprint enhancement still a challenging problem and existing issue in the current research. This is due to the existence of poor quality images in latent fingerprint with unclear ridge structure and various overlapping patterns together with presence of structured noise. Prior to latent fingerprint segmentation and feature extraction, latent fingerprint image enhancement is necessary step to suppress different noises and improve the clarity of ridge structure. This paper reviews the current techniques used for the latent fingerprint enhancement. Thus, it presents hybrid model which is combination of edge directional total variation model (EDTV) and quality image enhancement with lost minutia reconstruction. NIST SD27 database has been used to test the proposed techniques and RMSE, PSNR to measure the performance. The result of the proposed technique shows enhancement of clarity of input latent fingerprint images and well de-noising of good, bad and ugly images of latent fingerprint. There is a statistically significant difference in the mean length of PSNR and RMSE for different categories of the latent fingerprint images (good, bad and ugly). It’s observed that the proposed technique performs well for the good latent fingerprint images compare to bad and ugly images. The result after enhancement present RMSE average 0.018373, 0.022287, and 0.023199 for the three different image categories available in SD27 data set good, bad and ugly images respectively while the PSNR average achieved 82.99068, 81.39749, and 81.07826 respectively. The proposed enhancement technique improved the matching accuracy of latent fingerprint images about 30{%","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131718502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Anomaly detection in cyber security attacks on networks using MLP deep learning 基于MLP深度学习的网络安全攻击异常检测
Pub Date : 2018-07-01 DOI: 10.1109/ICSCEE.2018.8538395
T. Teoh, G. Chiew, E. J. Franco, P. C. Ng, M. Benjamin, Y. Goh
Malicious traffic has garnered more attention in recent years, owing to the rapid growth of information technology in today’s world. In 2007 alone, an estimated loss of 13 billion dollars was made from malware attacks. Malware data in today’s context is massive. To understand such information using primitive methods would be a tedious task. In this publication we demonstrate some of the most advanced deep learning techniques available, multilayer perceptron (MLP) and J48 (also known as C4.5 or ID3) on our selected dataset, Advanced Security Network Metrics & Non-Payload-Based Obfuscations (ASNM-NPBO) to show that the answer to managing cyber security threats lie in the fore-mentioned methodologies.
近年来,由于当今世界信息技术的快速发展,恶意流量越来越受到人们的关注。仅在2007年,恶意软件攻击造成的损失估计就高达130亿美元。今天的恶意软件数据是巨大的。使用原始方法理解这些信息将是一项乏味的任务。在本出版物中,我们展示了一些最先进的深度学习技术,多层感知器(MLP)和J48(也称为C4.5或ID3)在我们选择的数据集,高级安全网络指标和非基于有效负载的混淆(ASNM-NPBO)上,以表明管理网络安全威胁的答案在于上述方法。
{"title":"Anomaly detection in cyber security attacks on networks using MLP deep learning","authors":"T. Teoh, G. Chiew, E. J. Franco, P. C. Ng, M. Benjamin, Y. Goh","doi":"10.1109/ICSCEE.2018.8538395","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538395","url":null,"abstract":"Malicious traffic has garnered more attention in recent years, owing to the rapid growth of information technology in today’s world. In 2007 alone, an estimated loss of 13 billion dollars was made from malware attacks. Malware data in today’s context is massive. To understand such information using primitive methods would be a tedious task. In this publication we demonstrate some of the most advanced deep learning techniques available, multilayer perceptron (MLP) and J48 (also known as C4.5 or ID3) on our selected dataset, Advanced Security Network Metrics & Non-Payload-Based Obfuscations (ASNM-NPBO) to show that the answer to managing cyber security threats lie in the fore-mentioned methodologies.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131215061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1