首页 > 最新文献

2015 IEEE International Conference on Intelligence and Security Informatics (ISI)最新文献

英文 中文
Exploring the effect of permission notice on users' initial trust to an application store: The case of China's Android application market 探讨许可通知对用户对应用商店初始信任的影响——以中国Android应用市场为例
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165941
Jie Gu, Heng Xu, An'an Hu, Lihua Huang
Privacy invasion via mobile applications is a big issue in the mobile age. This study focuses on China's Android market where a few application stores are available to adopt applications. Recognizing that these stores vary in presenting permission notice, this study examines the effect of two features of a permission notice, i.e., permission sensitivity and permission explanation, on Android users' privacy-related perceptions. Results of our scenario-based study suggest that while the disclosure of highly sensitive permissions increases users' privacy concerns to an application, it also boosts users' initial trust to an unfamiliar application store. Moreover, users' trust to the application store is a necessary condition for the efficiency of permission explanation to reduce users' privacy concerns. In addition to enhancing our theoretical understanding of the role of initial trust in Chinese Android users' elaboration of permission notice, these findings have important implications for both China's application stores and application developers.
在移动时代,通过移动应用程序侵犯隐私是一个大问题。本研究的重点是中国的Android市场,这里有一些应用商店可以采用应用程序。认识到这些商店在提供许可通知方面各不相同,本研究考察了许可通知的两个特征(即许可敏感性和许可解释)对Android用户隐私相关感知的影响。我们基于场景的研究结果表明,虽然高度敏感权限的披露增加了用户对应用程序的隐私担忧,但它也增强了用户对不熟悉的应用程序商店的初始信任。此外,用户对应用商店的信任是权限解释效率降低用户隐私担忧的必要条件。除了增强我们对初始信任在中国Android用户阐述许可通知中的作用的理论认识外,这些研究结果对中国的应用商店和应用开发者都具有重要的启示意义。
{"title":"Exploring the effect of permission notice on users' initial trust to an application store: The case of China's Android application market","authors":"Jie Gu, Heng Xu, An'an Hu, Lihua Huang","doi":"10.1109/ISI.2015.7165941","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165941","url":null,"abstract":"Privacy invasion via mobile applications is a big issue in the mobile age. This study focuses on China's Android market where a few application stores are available to adopt applications. Recognizing that these stores vary in presenting permission notice, this study examines the effect of two features of a permission notice, i.e., permission sensitivity and permission explanation, on Android users' privacy-related perceptions. Results of our scenario-based study suggest that while the disclosure of highly sensitive permissions increases users' privacy concerns to an application, it also boosts users' initial trust to an unfamiliar application store. Moreover, users' trust to the application store is a necessary condition for the efficiency of permission explanation to reduce users' privacy concerns. In addition to enhancing our theoretical understanding of the role of initial trust in Chinese Android users' elaboration of permission notice, these findings have important implications for both China's application stores and application developers.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115597003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops 探索黑客网络中的威胁和漏洞:论坛、IRC和梳理商店
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165944
Victor A. Benjamin, Weifeng Li, T. Holt, Hsinchun Chen
Cybersecurity is a problem of growing relevance that impacts all facets of society. As a result, many researchers have become interested in studying cybercriminals and online hacker communities in order to develop more effective cyber defenses. In particular, analysis of hacker community contents may reveal existing and emerging threats that pose great risk to individuals, businesses, and government. Thus, we are interested in developing an automated methodology for identifying tangible and verifiable evidence of potential threats within hacker forums, IRC channels, and carding shops. To identify threats, we couple machine learning methodology with information retrieval techniques. Our approach allows us to distill potential threats from the entirety of collected hacker contents. We present several examples of identified threats found through our analysis techniques. Results suggest that hacker communities can be analyzed to aid in cyber threat detection, thus providing promising direction for future work.
网络安全是一个日益相关的问题,影响着社会的各个方面。因此,许多研究人员对研究网络罪犯和在线黑客社区产生了兴趣,以便开发更有效的网络防御。特别是,对黑客社区内容的分析可能会揭示对个人、企业和政府构成巨大风险的现有和新出现的威胁。因此,我们有兴趣开发一种自动化的方法,用于识别黑客论坛、IRC频道和梳理商店中潜在威胁的有形和可验证的证据。为了识别威胁,我们将机器学习方法与信息检索技术结合起来。我们的方法使我们能够从收集到的全部黑客内容中提炼出潜在的威胁。我们提供了几个通过我们的分析技术发现的已识别威胁的例子。结果表明,分析黑客社区可以帮助检测网络威胁,从而为未来的工作提供了有希望的方向。
{"title":"Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops","authors":"Victor A. Benjamin, Weifeng Li, T. Holt, Hsinchun Chen","doi":"10.1109/ISI.2015.7165944","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165944","url":null,"abstract":"Cybersecurity is a problem of growing relevance that impacts all facets of society. As a result, many researchers have become interested in studying cybercriminals and online hacker communities in order to develop more effective cyber defenses. In particular, analysis of hacker community contents may reveal existing and emerging threats that pose great risk to individuals, businesses, and government. Thus, we are interested in developing an automated methodology for identifying tangible and verifiable evidence of potential threats within hacker forums, IRC channels, and carding shops. To identify threats, we couple machine learning methodology with information retrieval techniques. Our approach allows us to distill potential threats from the entirety of collected hacker contents. We present several examples of identified threats found through our analysis techniques. Results suggest that hacker communities can be analyzed to aid in cyber threat detection, thus providing promising direction for future work.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122960990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
Emotion extraction and entrainment in social media: The case of U.S. immigration and border security 社交媒体中的情感提取和娱乐:以美国移民和边境安全为例
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165939
Wingyan Chung, Saike He, D. Zeng, Victor A. Benjamin
Emotion plays an important role in shaping public policy and business decisions. The growth of social media has allowed people to express their emotion publicly in an unprecedented manner. Textual content and user linkages fostered by social media networks can be used to examine emotion types, intensity, and contagion. However, research into how emotion evolves and entrains in social media that influence security issues is scarce. In this research, we developed an approach to analyzing emotion expressed in political social media. We compared two methods of emotion analysis to identify influential users and to trace their contagion effects on public emotion, and report preliminary findings of analyzing the emotion of 105,304 users who posted 189,012 tweets on the U.S. immigration and border security issues in November 2014. The results provide strong implication for understanding social actions and for collecting social intelligence for security informatics. This research should contribute to helping decision makers and security personnel to use public emotion effectively to develop appropriate strategies.
情感在制定公共政策和商业决策方面发挥着重要作用。社交媒体的发展使人们能够以前所未有的方式公开表达自己的情感。社交媒体网络培养的文本内容和用户联系可用于检查情感类型、强度和传染性。然而,关于情感如何在影响安全问题的社交媒体中演变和保留的研究很少。在这项研究中,我们开发了一种分析政治社交媒体中表达的情感的方法。我们比较了两种情绪分析方法,以识别有影响力的用户,并追踪他们对公众情绪的传染效应,并报告了对2014年11月发布189,012条关于美国移民和边境安全问题推文的105,304名用户的情绪分析的初步结果。研究结果对理解社会行为和安全信息学的社会情报收集具有重要意义。本研究将有助于决策者及保安人员有效运用公众情绪,制定适当的策略。
{"title":"Emotion extraction and entrainment in social media: The case of U.S. immigration and border security","authors":"Wingyan Chung, Saike He, D. Zeng, Victor A. Benjamin","doi":"10.1109/ISI.2015.7165939","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165939","url":null,"abstract":"Emotion plays an important role in shaping public policy and business decisions. The growth of social media has allowed people to express their emotion publicly in an unprecedented manner. Textual content and user linkages fostered by social media networks can be used to examine emotion types, intensity, and contagion. However, research into how emotion evolves and entrains in social media that influence security issues is scarce. In this research, we developed an approach to analyzing emotion expressed in political social media. We compared two methods of emotion analysis to identify influential users and to trace their contagion effects on public emotion, and report preliminary findings of analyzing the emotion of 105,304 users who posted 189,012 tweets on the U.S. immigration and border security issues in November 2014. The results provide strong implication for understanding social actions and for collecting social intelligence for security informatics. This research should contribute to helping decision makers and security personnel to use public emotion effectively to develop appropriate strategies.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123679410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Persistent threat pattern discovery 持久性威胁模式发现
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165967
Faisal Quader, V. Janeja, Justin Stauffer
Advanced Persistent Threat (APT) is a complex (Advanced) cyber-attack (Threat) against specific targets over long periods of time (Persistent) carried out by nation states or terrorist groups with highly sophisticated levels of expertise to establish entries into organizations, which are critical to a country's socio-economic status. The key identifier in such persistent threats is that patterns are long term, could be high priority, and occur consistently over a period of time. This paper focuses on identifying persistent threat patterns in network data, particularly data collected from Intrusion Detection Systems. We utilize Association Rule Mining (ARM) to detect persistent threat patterns on network data. We identify potential persistent threat patterns, which are frequent but at the same time unusual as compared with the other frequent patterns.
高级持续性威胁(APT)是一种针对特定目标的复杂(高级)网络攻击(威胁),这种攻击(威胁)是由民族国家或恐怖组织实施的,具有高度复杂的专业知识水平,可以进入组织,这对一个国家的社会经济地位至关重要。这种持续性威胁的关键标识符是模式是长期的,可以是高优先级的,并且在一段时间内一致地发生。本文的重点是识别网络数据中的持续威胁模式,特别是从入侵检测系统收集的数据。我们利用关联规则挖掘(ARM)来检测网络数据上的持续威胁模式。我们识别潜在的持续威胁模式,与其他频繁的模式相比,这些模式是频繁的,但同时也是不寻常的。
{"title":"Persistent threat pattern discovery","authors":"Faisal Quader, V. Janeja, Justin Stauffer","doi":"10.1109/ISI.2015.7165967","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165967","url":null,"abstract":"Advanced Persistent Threat (APT) is a complex (Advanced) cyber-attack (Threat) against specific targets over long periods of time (Persistent) carried out by nation states or terrorist groups with highly sophisticated levels of expertise to establish entries into organizations, which are critical to a country's socio-economic status. The key identifier in such persistent threats is that patterns are long term, could be high priority, and occur consistently over a period of time. This paper focuses on identifying persistent threat patterns in network data, particularly data collected from Intrusion Detection Systems. We utilize Association Rule Mining (ARM) to detect persistent threat patterns on network data. We identify potential persistent threat patterns, which are frequent but at the same time unusual as compared with the other frequent patterns.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125558397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Elliptic curve cryptography in Java Java中的椭圆曲线密码
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165975
L. Deligiannidis
The strength of public key cryptography utilizing Elliptic Curves relies on the difficulty of computing discrete logarithms in a finite field. Other public key cryptographic algorithms, such as RSA, rely on the difficulty of integer factorization. We will describe how we can implement several cryptographic ECC algorithms in java, such as digital signatures, encryption/decryption and key-exchange. We will show implementation details that would help students, practitioners, and researchers implement and experiment with such algorithms.
利用椭圆曲线进行公钥加密的强度取决于在有限域中计算离散对数的难度。其他公钥加密算法,如RSA,依赖于整数分解的难度。我们将描述如何在java中实现几种加密ECC算法,如数字签名、加密/解密和密钥交换。我们将展示实现细节,以帮助学生、从业者和研究人员实现和实验这些算法。
{"title":"Elliptic curve cryptography in Java","authors":"L. Deligiannidis","doi":"10.1109/ISI.2015.7165975","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165975","url":null,"abstract":"The strength of public key cryptography utilizing Elliptic Curves relies on the difficulty of computing discrete logarithms in a finite field. Other public key cryptographic algorithms, such as RSA, rely on the difficulty of integer factorization. We will describe how we can implement several cryptographic ECC algorithms in java, such as digital signatures, encryption/decryption and key-exchange. We will show implementation details that would help students, practitioners, and researchers implement and experiment with such algorithms.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123955501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Inferring social influence and meme interaction with Hawkes processes 用霍克斯过程推断社会影响和模因交互作用
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165953
Chuan Luo, Xiaolong Zheng, D. Zeng
Revealing underlying social influence among users in social media is critical to understanding how users interact, on which a lot of security intelligence applications can be built. Existing methods fail to take into account the interaction relationships among memes. In this paper, we propose to simultaneously model social influence and meme interaction in information diffusion with novel multidimensional Hawkes processes. Experimental results on both synthetic and real world social media data show the efficacy of the proposed approach.
揭示社交媒体中用户潜在的社会影响对于理解用户如何互动至关重要,而许多安全智能应用程序都可以在此基础上构建。现有的方法没有考虑到模因之间的交互关系。本文提出了一种新的多维Hawkes过程模型来同时模拟信息传播中的社会影响和模因交互作用。在合成和真实世界社交媒体数据上的实验结果表明了该方法的有效性。
{"title":"Inferring social influence and meme interaction with Hawkes processes","authors":"Chuan Luo, Xiaolong Zheng, D. Zeng","doi":"10.1109/ISI.2015.7165953","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165953","url":null,"abstract":"Revealing underlying social influence among users in social media is critical to understanding how users interact, on which a lot of security intelligence applications can be built. Existing methods fail to take into account the interaction relationships among memes. In this paper, we propose to simultaneously model social influence and meme interaction in information diffusion with novel multidimensional Hawkes processes. Experimental results on both synthetic and real world social media data show the efficacy of the proposed approach.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129219850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A new mobile payment protocol (GMPCP) by using a new key agreement protocol (GC) 采用新的密钥协议(GC)的移动支付协议(GMPCP)
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165964
Mohammad Vahidalizadehdizaj, Lixin Tao
According to the advancement of mobile devices and wireless network technology, these portable devices became the potential devices that can be used for different types of payments. Recently, most of the people would rather to do their activities by their cellphones. On the other hand, there are some issues that hamper the widespread acceptance of mobile payment among people. The traditional ways of mobile payment are not secure enough, since they follow the traditional flow of data. This paper is going to suggest a new protocol named Golden Mobile Pay Center Protocol that is based on client centric model. The suggested protocol downgrade the computational operations and communications that are necessary between the engaging parties and achieves a completely privacy protection for the engaging parties. It avoids transaction repudiation among the engaging parties and will decrease replay attack s risk. The goal of the protocol is to help n users to have payments to each others'. Besides, it will utilize a new key agreement protocol named Golden Circle that is working by employing symmetric key operations. GMPCP uses GC for generating a shared session key between n users.
随着移动设备和无线网络技术的进步,这些便携式设备成为了可以用于不同类型支付的潜在设备。最近,大多数人宁愿用手机来做他们的活动。另一方面,还有一些问题阻碍了人们对移动支付的广泛接受。传统的移动支付方式不够安全,因为它们遵循传统的数据流。本文提出了一种基于客户中心模型的新协议——黄金移动支付中心协议。建议的协议降低了参与方之间必要的计算操作和通信,实现了参与方的完全隐私保护。它避免了交易各方之间的交易抵赖,降低了重放攻击的风险。该协议的目标是帮助用户相互支付。此外,它将利用一个名为Golden Circle的新密钥协议,该协议通过对称密钥操作来工作。GMPCP使用GC在n个用户之间生成共享会话密钥。
{"title":"A new mobile payment protocol (GMPCP) by using a new key agreement protocol (GC)","authors":"Mohammad Vahidalizadehdizaj, Lixin Tao","doi":"10.1109/ISI.2015.7165964","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165964","url":null,"abstract":"According to the advancement of mobile devices and wireless network technology, these portable devices became the potential devices that can be used for different types of payments. Recently, most of the people would rather to do their activities by their cellphones. On the other hand, there are some issues that hamper the widespread acceptance of mobile payment among people. The traditional ways of mobile payment are not secure enough, since they follow the traditional flow of data. This paper is going to suggest a new protocol named Golden Mobile Pay Center Protocol that is based on client centric model. The suggested protocol downgrade the computational operations and communications that are necessary between the engaging parties and achieves a completely privacy protection for the engaging parties. It avoids transaction repudiation among the engaging parties and will decrease replay attack s risk. The goal of the protocol is to help n users to have payments to each others'. Besides, it will utilize a new key agreement protocol named Golden Circle that is working by employing symmetric key operations. GMPCP uses GC for generating a shared session key between n users.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126826457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multi-granular aggregation of network flows for security analysis 网络流的多粒度聚合,用于安全分析
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165965
Tao Ding, Ahmed Aleroud, George Karabatis
Investigating network flows is an approach of detecting attacks by identifying known patterns. Flow statistics are used to discover anomalies by aggregating network traces and then using machine-learning classifiers to discover suspicious activities. However, the efficiency and effectiveness of the flow classification models depends on the granularity of aggregation. This paper describes a novel approach that aggregates packets into network flows and correlates them with security events generated by payload-based IDSs for detection of cyber-attacks.
调查网络流是一种通过识别已知模式来检测攻击的方法。流量统计用于通过聚合网络痕迹来发现异常,然后使用机器学习分类器来发现可疑活动。然而,流分类模型的效率和有效性取决于聚合的粒度。本文描述了一种新颖的方法,该方法将数据包聚合到网络流中,并将它们与基于有效负载的ids生成的安全事件相关联,以检测网络攻击。
{"title":"Multi-granular aggregation of network flows for security analysis","authors":"Tao Ding, Ahmed Aleroud, George Karabatis","doi":"10.1109/ISI.2015.7165965","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165965","url":null,"abstract":"Investigating network flows is an approach of detecting attacks by identifying known patterns. Flow statistics are used to discover anomalies by aggregating network traces and then using machine-learning classifiers to discover suspicious activities. However, the efficiency and effectiveness of the flow classification models depends on the granularity of aggregation. This paper describes a novel approach that aggregates packets into network flows and correlates them with security events generated by payload-based IDSs for detection of cyber-attacks.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124991365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
An access control resistant to shoulder-surfing 一种防肩部冲浪的访问控制
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165978
Jaejin Jang, I. Jung
An enhanced access control is proposed to address shoulder-surfing attack. This approach prevents the attack using double authentication with password and IoT Devices' identification. It is simple because it does not require users to do something. Nevertheless, it tightens security.
针对肩冲浪攻击,提出了一种增强的访问控制方法。这种方法可以防止使用密码和物联网设备身份进行双重身份验证的攻击。它很简单,因为它不需要用户做任何事情。然而,它加强了安全。
{"title":"An access control resistant to shoulder-surfing","authors":"Jaejin Jang, I. Jung","doi":"10.1109/ISI.2015.7165978","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165978","url":null,"abstract":"An enhanced access control is proposed to address shoulder-surfing attack. This approach prevents the attack using double authentication with password and IoT Devices' identification. It is simple because it does not require users to do something. Nevertheless, it tightens security.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125686912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-objective evolutionary algorithms and multiagent models for optimizing police dispatch 警务调度优化的多目标进化算法和多智能体模型
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165936
Ricardo Guedes, Vasco Furtado, T. Pequeno
In this article we investigate Multi-agent simulation and Multi-objective Evolutionary Algorithms for optimizing resource allocation in Public Safety. We describe a tool that helps Law Enforcement authorities to evaluate, in a controlled environment, different strategies for allocating and dispatching resources, aiming at reducing conflicting goals such as response time, the number of unattended calls and cost of displacement of police cars. This tool is a multi-agent model to represent police cars that lives in a grid in which emergency occurrences appear. A comparison of the strategies for resource dispatch in this environment shows that serving first those calls with low estimated attendance times delivers the best overall performance in terms of waiting time. However this is practically impossible since prioritization of certain crime types is necessary leading to the increase of the waiting time in the queue. Instead of manually trying to identify the best allocation strategy to apply, we have coupled a multi-objective evolutionary algorithm to the simulation model in order to uncover automatically a function to rank the calls in the best order for attendance satisfying multiple and sometimes conflicting goals.
本文研究了公共安全资源优化配置的多智能体模拟和多目标进化算法。我们描述了一种工具,可以帮助执法当局在受控环境中评估分配和调度资源的不同策略,旨在减少相互冲突的目标,如响应时间、无人值勤呼叫的数量和警车的转移成本。该工具是一个多智能体模型,用于表示生活在紧急事件发生网格中的警车。对此环境中资源调度策略的比较表明,首先服务那些估计出勤时间较低的呼叫,在等待时间方面提供了最佳的总体性能。然而,这实际上是不可能的,因为某些犯罪类型的优先级是必要的,这会导致排队等待时间的增加。我们没有手动尝试确定要应用的最佳分配策略,而是将多目标进化算法与模拟模型相结合,以便自动发现一个函数,以满足多个(有时是相互冲突的)出勤目标的最佳顺序对呼叫进行排序。
{"title":"Multi-objective evolutionary algorithms and multiagent models for optimizing police dispatch","authors":"Ricardo Guedes, Vasco Furtado, T. Pequeno","doi":"10.1109/ISI.2015.7165936","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165936","url":null,"abstract":"In this article we investigate Multi-agent simulation and Multi-objective Evolutionary Algorithms for optimizing resource allocation in Public Safety. We describe a tool that helps Law Enforcement authorities to evaluate, in a controlled environment, different strategies for allocating and dispatching resources, aiming at reducing conflicting goals such as response time, the number of unattended calls and cost of displacement of police cars. This tool is a multi-agent model to represent police cars that lives in a grid in which emergency occurrences appear. A comparison of the strategies for resource dispatch in this environment shows that serving first those calls with low estimated attendance times delivers the best overall performance in terms of waiting time. However this is practically impossible since prioritization of certain crime types is necessary leading to the increase of the waiting time in the queue. Instead of manually trying to identify the best allocation strategy to apply, we have coupled a multi-objective evolutionary algorithm to the simulation model in order to uncover automatically a function to rank the calls in the best order for attendance satisfying multiple and sometimes conflicting goals.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116603829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2015 IEEE International Conference on Intelligence and Security Informatics (ISI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1