首页 > 最新文献

2019 International Conference on Cybersecurity (ICoCSec)最新文献

英文 中文
Instrumenting API Hooking for a Realtime Dynamic Analysis 为实时动态分析检测API挂钩
Pub Date : 2019-09-01 DOI: 10.1109/ICoCSec47621.2019.8971017
Salah Mohammed A. F., M. F. Marhusin, R. Sulaiman
There are various approaches to detect malware. Among them is via dynamic analysis which is a very essential technique capable of detecting unknown malware. The dynamic analysis monitors the behaviour of the executable by providing its execution behaviour information. Since the complexity of the malware is increasing, it is important to monitor the malware and study how malware behaves to help in detecting it. In this paper, we highlighted the instrumentation technique to observe behaviour of Portable Executable execution. We briefly explored some of the related works. We discussed about dynamic analysis and Windows API Calls. We discussed on our realtime behaviour monitor. The concept of n-gram was explained and before concluding, several challenges were highlighted.
检测恶意软件有多种方法。其中,动态分析是检测未知恶意软件的关键技术。动态分析通过提供可执行文件的执行行为信息来监视其行为。由于恶意软件的复杂性正在增加,因此监控恶意软件并研究恶意软件的行为以帮助检测它是很重要的。在本文中,我们重点介绍了观察可移植可执行程序执行行为的检测技术。我们简要地探讨了一些相关的工作。我们讨论了动态分析和Windows API调用。我们讨论了我们的实时行为监视器。解释了n-gram的概念,在结束之前,强调了几个挑战。
{"title":"Instrumenting API Hooking for a Realtime Dynamic Analysis","authors":"Salah Mohammed A. F., M. F. Marhusin, R. Sulaiman","doi":"10.1109/ICoCSec47621.2019.8971017","DOIUrl":"https://doi.org/10.1109/ICoCSec47621.2019.8971017","url":null,"abstract":"There are various approaches to detect malware. Among them is via dynamic analysis which is a very essential technique capable of detecting unknown malware. The dynamic analysis monitors the behaviour of the executable by providing its execution behaviour information. Since the complexity of the malware is increasing, it is important to monitor the malware and study how malware behaves to help in detecting it. In this paper, we highlighted the instrumentation technique to observe behaviour of Portable Executable execution. We briefly explored some of the related works. We discussed about dynamic analysis and Windows API Calls. We discussed on our realtime behaviour monitor. The concept of n-gram was explained and before concluding, several challenges were highlighted.","PeriodicalId":272402,"journal":{"name":"2019 International Conference on Cybersecurity (ICoCSec)","volume":"11 34","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113980017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ICoCSec 2019 Author Index ICoCSec 2019作者索引
Pub Date : 2019-09-01 DOI: 10.1109/icocsec47621.2019.8971047
{"title":"ICoCSec 2019 Author Index","authors":"","doi":"10.1109/icocsec47621.2019.8971047","DOIUrl":"https://doi.org/10.1109/icocsec47621.2019.8971047","url":null,"abstract":"","PeriodicalId":272402,"journal":{"name":"2019 International Conference on Cybersecurity (ICoCSec)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121345571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ransomware Entities Classification with Supervised Learning for Informal Text 基于监督学习的非正式文本勒索软件实体分类
Pub Date : 2019-09-01 DOI: 10.1109/ICoCSec47621.2019.8970801
Nurfadilah Ariffini, A. Zainal, M. A. Maarof, Mohamad Nizam Kassim
Analyzing text especially in Malware domain is quite challenging. Even with Natural Language Processing approach, it limits with the absence of specific Named Entity recognizer to extract related entities of malware from unstructured data like text. It is essential to automate the process of extracting information such as Ransomware entity from text and the information extracted could be used as knowledge reasoning like profiling the behaviour of Ransomware using the information available on the Internet. Although the text itself is unstructured, informal text like Internet forum has its problems and challenges to perform the analysis and extraction process. Thus, the performance of machine learning in carrying out the classification of entities from this type of text depending on the complexity of the model. Therefore, this paper presents the comparison of few supervised learning techniques (CRF, Naive Bayes, and SVM) for model training in extracting Ransomware entities from unstructured text in terms of their performance.
文本分析是一项非常具有挑战性的工作,尤其是在恶意软件领域。即使使用自然语言处理方法,由于缺乏特定的命名实体识别器,因此无法从文本等非结构化数据中提取相关的恶意软件实体。从文本中提取勒索软件实体等信息的自动化过程是至关重要的,提取的信息可以用作知识推理,如利用互联网上可用的信息来分析勒索软件的行为。虽然文本本身是非结构化的,但像互联网论坛这样的非正式文本在进行分析和提取过程中存在着问题和挑战。因此,机器学习在从这种类型的文本中执行实体分类时的性能取决于模型的复杂性。因此,本文比较了几种监督学习技术(CRF、朴素贝叶斯和支持向量机)在从非结构化文本中提取勒索软件实体的模型训练中的性能。
{"title":"Ransomware Entities Classification with Supervised Learning for Informal Text","authors":"Nurfadilah Ariffini, A. Zainal, M. A. Maarof, Mohamad Nizam Kassim","doi":"10.1109/ICoCSec47621.2019.8970801","DOIUrl":"https://doi.org/10.1109/ICoCSec47621.2019.8970801","url":null,"abstract":"Analyzing text especially in Malware domain is quite challenging. Even with Natural Language Processing approach, it limits with the absence of specific Named Entity recognizer to extract related entities of malware from unstructured data like text. It is essential to automate the process of extracting information such as Ransomware entity from text and the information extracted could be used as knowledge reasoning like profiling the behaviour of Ransomware using the information available on the Internet. Although the text itself is unstructured, informal text like Internet forum has its problems and challenges to perform the analysis and extraction process. Thus, the performance of machine learning in carrying out the classification of entities from this type of text depending on the complexity of the model. Therefore, this paper presents the comparison of few supervised learning techniques (CRF, Naive Bayes, and SVM) for model training in extracting Ransomware entities from unstructured text in terms of their performance.","PeriodicalId":272402,"journal":{"name":"2019 International Conference on Cybersecurity (ICoCSec)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122343429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using Attack Pattern for Cyber Attack Attribution 基于攻击模式的网络攻击归因研究
Pub Date : 2019-09-01 DOI: 10.1109/ICoCSec47621.2019.8970906
Florent Avellaneda, El-Hackemi Alikacem, Femi Jaafar
A cyber attack is a malicious and deliberate attempt by an individual or organization to breach the integrity, confidentiality, and/or availability of data or services of an information system of another individual or organization. Being able to attribute a cyber attack is a crucial question for security but this question is also known to be a difficult problem. The main reason why there is currently no solution that automatically identifies the initiator of an attack is that attackers usually use proxies, i.e. an intermediate node that relays a host over the network. In this paper, we propose to formalize the problem of identifying the initiator of a cyber attack. We show that if the attack scenario used by the attacker is known, then we are able to resolve the cyber attribution problem. Indeed, we propose a model to formalize these attack scenarios, that we call attack patterns, and give an efficient algorithm to search for attack pattern on a communication history. Finally, we experimentally show the relevance of our approach.
网络攻击是指个人或组织蓄意破坏另一个个人或组织的信息系统的数据或服务的完整性、保密性和/或可用性的恶意企图。能够确定网络攻击的原因是安全的一个关键问题,但这个问题也被认为是一个难题。目前没有自动识别攻击发起者的解决方案的主要原因是攻击者通常使用代理,即通过网络中继主机的中间节点。在本文中,我们建议形式化识别网络攻击发起者的问题。我们表明,如果攻击者使用的攻击场景是已知的,那么我们就能够解决网络归因问题。实际上,我们提出了一个模型来形式化这些攻击场景,我们称之为攻击模式,并给出了一个有效的算法来搜索通信历史上的攻击模式。最后,我们通过实验证明了我们的方法的相关性。
{"title":"Using Attack Pattern for Cyber Attack Attribution","authors":"Florent Avellaneda, El-Hackemi Alikacem, Femi Jaafar","doi":"10.1109/ICoCSec47621.2019.8970906","DOIUrl":"https://doi.org/10.1109/ICoCSec47621.2019.8970906","url":null,"abstract":"A cyber attack is a malicious and deliberate attempt by an individual or organization to breach the integrity, confidentiality, and/or availability of data or services of an information system of another individual or organization. Being able to attribute a cyber attack is a crucial question for security but this question is also known to be a difficult problem. The main reason why there is currently no solution that automatically identifies the initiator of an attack is that attackers usually use proxies, i.e. an intermediate node that relays a host over the network. In this paper, we propose to formalize the problem of identifying the initiator of a cyber attack. We show that if the attack scenario used by the attacker is known, then we are able to resolve the cyber attribution problem. Indeed, we propose a model to formalize these attack scenarios, that we call attack patterns, and give an efficient algorithm to search for attack pattern on a communication history. Finally, we experimentally show the relevance of our approach.","PeriodicalId":272402,"journal":{"name":"2019 International Conference on Cybersecurity (ICoCSec)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125604796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Analysis of the Impact of Scheduling Plans in Safety Critical Requirements in Virtualization 虚拟化环境下安全关键需求调度计划的影响分析
Pub Date : 2019-09-01 DOI: 10.1109/ICoCSec47621.2019.8971126
Asmaa Tellabi, Jaafar Fehmi, Sabri Abdelbast, C. Ruland
Over the years, virtualization has been deployed due to the benefits it offers, such as a better interoperability and improved performances. Two popular architectures of computers have been widely used in virtualization, x86 and ARM processors. The key component in virtualization is the hypervisor, which is a virtual machine manager that allows multiple guest operating systems (OS) to run on a single host system at the same time. Researchers and practitioners identified the challenge of enabling critical applications to share a common hardware platform without interfering one another as one of the main virtualization safety challenges. In this context, XtratuM was specified as a hypervisor designed to meet safety critical requirements in virtualization. In this paper, a comparison between XtratuM communication performances will be provided for ARM and x86 architectures. Different schedules will be given to partitions in order to examine the effect it has on each communication channel. As it will be demonstrated in this paper, Queuing messages (QC) are slower than Sampling Messages (SP), and this is caused by the internal structure and how messages are sent between partitions. As seen from tests, the version of XtratuM for x86 processors is faster than the one for ARM processors; this is also caused by the differences found in both architectures. In addition, a modified system’s architecture based on a previous architecture will be presented, which was modified in order to fit more the limits of XtratuM.
多年来,由于虚拟化提供的好处,例如更好的互操作性和改进的性能,虚拟化已经被部署。两种流行的计算机架构在虚拟化中得到了广泛的应用,x86和ARM处理器。虚拟化中的关键组件是hypervisor,它是一个虚拟机管理器,允许多个客户机操作系统(OS)同时在单个主机系统上运行。研究人员和从业人员认为,使关键应用程序能够共享公共硬件平台而不相互干扰是虚拟化安全面临的主要挑战之一。在这种情况下,XtratuM被指定为旨在满足虚拟化中的安全关键需求的管理程序。本文将比较XtratuM在ARM和x86架构下的通信性能。将为分区提供不同的调度,以便检查它对每个通信通道的影响。正如本文将演示的那样,排队消息(QC)比采样消息(SP)慢,这是由内部结构和在分区之间发送消息的方式引起的。从测试来看,XtratuM在x86处理器上的版本比ARM处理器上的版本要快;这也是由于两种体系结构中的差异造成的。此外,还将介绍基于先前架构的修改后的系统架构,该架构经过修改以适应XtratuM的更多限制。
{"title":"On the Analysis of the Impact of Scheduling Plans in Safety Critical Requirements in Virtualization","authors":"Asmaa Tellabi, Jaafar Fehmi, Sabri Abdelbast, C. Ruland","doi":"10.1109/ICoCSec47621.2019.8971126","DOIUrl":"https://doi.org/10.1109/ICoCSec47621.2019.8971126","url":null,"abstract":"Over the years, virtualization has been deployed due to the benefits it offers, such as a better interoperability and improved performances. Two popular architectures of computers have been widely used in virtualization, x86 and ARM processors. The key component in virtualization is the hypervisor, which is a virtual machine manager that allows multiple guest operating systems (OS) to run on a single host system at the same time. Researchers and practitioners identified the challenge of enabling critical applications to share a common hardware platform without interfering one another as one of the main virtualization safety challenges. In this context, XtratuM was specified as a hypervisor designed to meet safety critical requirements in virtualization. In this paper, a comparison between XtratuM communication performances will be provided for ARM and x86 architectures. Different schedules will be given to partitions in order to examine the effect it has on each communication channel. As it will be demonstrated in this paper, Queuing messages (QC) are slower than Sampling Messages (SP), and this is caused by the internal structure and how messages are sent between partitions. As seen from tests, the version of XtratuM for x86 processors is faster than the one for ARM processors; this is also caused by the differences found in both architectures. In addition, a modified system’s architecture based on a previous architecture will be presented, which was modified in order to fit more the limits of XtratuM.","PeriodicalId":272402,"journal":{"name":"2019 International Conference on Cybersecurity (ICoCSec)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131707072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The primarily study of Electronic Records Management System (ERMS) for Yemen Oil and Gas Corporation (YOGC) Subsidiaries 主要研究也门石油和天然气公司(YOGC)子公司的电子记录管理系统(ERMS)
Pub Date : 2019-09-01 DOI: 10.1109/ICoCSec47621.2019.8971076
Burkan Hawash, U. A. Mokhtar, Z. M. Yusof
The growing volume of records in Oil and Gas corporations, especially in developing countries, is problematic because they are managed manually which causes the risk of losing information. Therefore, organizations should adopt electronic systems in order to avoid this problem. The success of Electronic Records Management System (ERMS) adoption by many organizations in developed and developing countries encourages its adoption in the Yemen Oil and Gas Corporation (YOGC) subsidiaries. This study intends to investigate the current practice of Records Management in YOGC subsidiaries including how YOGC manages records to meet the legislative requirements in the country while achieving their operational and strategic objectives. The study uses literature content analysis to identify the ERMS adoption challenges that similar organizations faced in developing countries. The data collected via phone interviews with twelve IT managers in the subsidiaries and in the Ministry of Oil and Minerals. Results show that YOGC Subsidiaries encounter substantial challenges when managing records including the capability to comply with government regulations and policies when creating records, difficult to identify records and the continuous need for storage space. This study concludes that ERMS should be adopted by the Subsidiaries to streamline and strengthen the system for management of records to remain competitive in the market.
石油和天然气公司,特别是发展中国家的石油和天然气公司的记录量不断增加,这是一个问题,因为它们是人工管理的,这导致了信息丢失的风险。因此,组织应该采用电子系统来避免这个问题。发达国家和发展中国家的许多组织成功采用了电子记录管理系统(ERMS),这鼓励了也门石油和天然气公司(YOGC)子公司采用该系统。本研究旨在调查YOGC子公司目前的记录管理实践,包括YOGC如何管理记录以满足该国的立法要求,同时实现其运营和战略目标。该研究使用文献内容分析来确定发展中国家类似组织在采用ERMS时面临的挑战。这些数据是通过电话采访子公司和石油和矿产部的12名IT经理收集的。结果表明,YOGC子公司在管理记录时遇到了重大挑战,包括在创建记录时遵守政府法规和政策的能力,难以识别记录以及对存储空间的持续需求。本研究的结论是,附属公司应采用ERMS,以精简和加强档案管理系统,以保持市场竞争力。
{"title":"The primarily study of Electronic Records Management System (ERMS) for Yemen Oil and Gas Corporation (YOGC) Subsidiaries","authors":"Burkan Hawash, U. A. Mokhtar, Z. M. Yusof","doi":"10.1109/ICoCSec47621.2019.8971076","DOIUrl":"https://doi.org/10.1109/ICoCSec47621.2019.8971076","url":null,"abstract":"The growing volume of records in Oil and Gas corporations, especially in developing countries, is problematic because they are managed manually which causes the risk of losing information. Therefore, organizations should adopt electronic systems in order to avoid this problem. The success of Electronic Records Management System (ERMS) adoption by many organizations in developed and developing countries encourages its adoption in the Yemen Oil and Gas Corporation (YOGC) subsidiaries. This study intends to investigate the current practice of Records Management in YOGC subsidiaries including how YOGC manages records to meet the legislative requirements in the country while achieving their operational and strategic objectives. The study uses literature content analysis to identify the ERMS adoption challenges that similar organizations faced in developing countries. The data collected via phone interviews with twelve IT managers in the subsidiaries and in the Ministry of Oil and Minerals. Results show that YOGC Subsidiaries encounter substantial challenges when managing records including the capability to comply with government regulations and policies when creating records, difficult to identify records and the continuous need for storage space. This study concludes that ERMS should be adopted by the Subsidiaries to streamline and strengthen the system for management of records to remain competitive in the market.","PeriodicalId":272402,"journal":{"name":"2019 International Conference on Cybersecurity (ICoCSec)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134009627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Intrusion Detection System to Enhance Network Security Using Raspberry PI Honeypot in Kali Linux Kali Linux下基于树莓派蜜罐的入侵检测系统增强网络安全
Pub Date : 2019-09-01 DOI: 10.1109/ICoCSec47621.2019.8971117
June Jeremiah
In this ever-changing digital connected world of Internet of Things (IoT) and new innovative technologies of software and application developments, cyber security has drastically changed and become critical issue for individuals and businesses globally. Security is one of the critical requirements in today’s world where by network devices are connected together and easily accessible anytime anywhere. Data integrity and protecting access of information between connected devices is the basic need to secure today cyber space. This paper aims at implementation of a decoy based technology, Honeypot along with a Raspberry Pi to enhance network security by simulating weak security and vulnerabilities to attract attackers. The Honeypot will monitor and record all the malicious activities launched by the attacker, the data will be used for security auditing to improve security where needed easily and cost effectively.
在这个不断变化的物联网(IoT)数字连接世界以及软件和应用开发的新创新技术中,网络安全已经发生了巨大变化,成为全球个人和企业的关键问题。在当今世界,通过网络设备连接在一起并随时随地轻松访问,安全性是关键需求之一。数据完整性和保护连接设备之间的信息访问是当今网络空间安全的基本需求。本文旨在实现基于诱饵的技术,蜜罐和树莓派通过模拟弱安全性和漏洞来吸引攻击者来增强网络安全性。Honeypot将监控和记录攻击者发起的所有恶意活动,这些数据将用于安全审计,以便在需要时轻松有效地提高安全性。
{"title":"Intrusion Detection System to Enhance Network Security Using Raspberry PI Honeypot in Kali Linux","authors":"June Jeremiah","doi":"10.1109/ICoCSec47621.2019.8971117","DOIUrl":"https://doi.org/10.1109/ICoCSec47621.2019.8971117","url":null,"abstract":"In this ever-changing digital connected world of Internet of Things (IoT) and new innovative technologies of software and application developments, cyber security has drastically changed and become critical issue for individuals and businesses globally. Security is one of the critical requirements in today’s world where by network devices are connected together and easily accessible anytime anywhere. Data integrity and protecting access of information between connected devices is the basic need to secure today cyber space. This paper aims at implementation of a decoy based technology, Honeypot along with a Raspberry Pi to enhance network security by simulating weak security and vulnerabilities to attract attackers. The Honeypot will monitor and record all the malicious activities launched by the attacker, the data will be used for security auditing to improve security where needed easily and cost effectively.","PeriodicalId":272402,"journal":{"name":"2019 International Conference on Cybersecurity (ICoCSec)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134073694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Crime in virtual reality: discussion 虚拟现实中的犯罪:讨论
Pub Date : 2019-09-01 DOI: 10.1109/ICoCSec47621.2019.8970947
R. Dremliuga, A. Iakovenko, N. Prisekina
Virtual reality technologies have a huge and not yet fully realized potential to change the existing practices of life, production and education. Despite all the advantages of using this technology, it can be used to commit crimes. Moreover, the use of this technology as a means of committing a crime gives the offender a number of advantages. Despite all the advantages of using this technology, it can be used to commit crimes. Moreover, the use of this technology as a means of committing a crime gives the offender a number of advantages. These advantages include: a multijurisdictional problem in prosecuting the offender, the ability of such a virtual environment to create an illusion of realism for the user, an integration of virtual-world environments with devices that can affect the user in the real world. Al of which allows the commission of crimes with characteristics not previously available. In addition, paper is devoted to a number of issues related to VR that have prerequisites to fall within the scope of criminal law.
虚拟现实技术在改变现有的生活、生产和教育实践方面具有巨大而尚未充分实现的潜力。尽管使用这项技术有很多好处,但它也可能被用来犯罪。此外,使用这种技术作为犯罪手段给罪犯带来了许多好处。尽管使用这项技术有很多好处,但它也可能被用来犯罪。此外,使用这种技术作为犯罪手段给罪犯带来了许多好处。这些优势包括:起诉违法者的多司法管辖问题,这种虚拟环境能够为用户创造一种现实主义的幻觉,将虚拟世界环境与可以影响现实世界用户的设备相结合。所有这些都使犯罪行为具有以前不具备的特征。此外,本文还专门讨论了一些与虚拟现实相关的问题,这些问题具有属于刑法范围的先决条件。
{"title":"Crime in virtual reality: discussion","authors":"R. Dremliuga, A. Iakovenko, N. Prisekina","doi":"10.1109/ICoCSec47621.2019.8970947","DOIUrl":"https://doi.org/10.1109/ICoCSec47621.2019.8970947","url":null,"abstract":"Virtual reality technologies have a huge and not yet fully realized potential to change the existing practices of life, production and education. Despite all the advantages of using this technology, it can be used to commit crimes. Moreover, the use of this technology as a means of committing a crime gives the offender a number of advantages. Despite all the advantages of using this technology, it can be used to commit crimes. Moreover, the use of this technology as a means of committing a crime gives the offender a number of advantages. These advantages include: a multijurisdictional problem in prosecuting the offender, the ability of such a virtual environment to create an illusion of realism for the user, an integration of virtual-world environments with devices that can affect the user in the real world. Al of which allows the commission of crimes with characteristics not previously available. In addition, paper is devoted to a number of issues related to VR that have prerequisites to fall within the scope of criminal law.","PeriodicalId":272402,"journal":{"name":"2019 International Conference on Cybersecurity (ICoCSec)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125564093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ICoCSec 2019 Table of contents ICoCSec 2019目录
Pub Date : 2019-09-01 DOI: 10.1109/icocsec47621.2019.8971046
{"title":"ICoCSec 2019 Table of contents","authors":"","doi":"10.1109/icocsec47621.2019.8971046","DOIUrl":"https://doi.org/10.1109/icocsec47621.2019.8971046","url":null,"abstract":"","PeriodicalId":272402,"journal":{"name":"2019 International Conference on Cybersecurity (ICoCSec)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122271413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 International Conference on Cybersecurity (ICoCSec)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1