首页 > 最新文献

2015 IEEE International Conference on Intelligence and Security Informatics (ISI)最新文献

英文 中文
Modeling emotion entrainment of online users in emergency events 突发事件中网络用户情感卷入建模
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165961
Saike He, Xiaolong Zheng, D. Zeng, Bo Xu, Changliang Li, Guanhua Tian, Lei Wang, Hongwei Hao
Emotion entrainment accounts for the rhythmic convergence of human emotions through social interactions. This phenomenon abounds in various disciplines, i.e. effervescency in soccer games, anger proliferation in violence incidents, or anxiety diffusion in disasters. Although emotion entrainment is highly relevant to the quality of human daily life, the principles underpinning this phenomenon is still unclear. Previous dynamic models try to explain entrainment phenomenon by assuming symmetrical coupling among identical individuals. Yet this assumption clearly does not hold in real-world human interactions. As such, we propose an alternative model that captures asymmetric relationships. In depicting the coupling mechanism, the effect of social influence is also encoded. Experimental results on two emergent social events suggest that the proposed model characterizes emotion trends with high accuracy. Also, we explain the emotion dynamics by analyzing the reconstructed entrainment matrix. Our work may present practical implications for those who want to guide or regulate the emotion evolution in emergency events discussed online.
情感夹带解释了人类情感在社会互动中有节奏地趋同。这种现象在各个学科中都很普遍,比如足球比赛中的沸腾,暴力事件中的愤怒扩散,灾难中的焦虑扩散。尽管情绪卷入与人类日常生活质量密切相关,但支撑这一现象的原理仍不清楚。以前的动态模型试图通过假设相同个体之间的对称耦合来解释夹带现象。然而,这种假设显然不适用于现实世界的人际交往。因此,我们提出了一个捕获不对称关系的替代模型。在描述耦合机制时,社会影响的影响也被编码。在两个突发社会事件上的实验结果表明,该模型能较准确地表征情绪趋势。此外,我们还通过分析重构的夹带矩阵来解释情绪动力学。我们的工作可能为那些想要指导或调节在线讨论的紧急事件中的情绪演变的人提供实际意义。
{"title":"Modeling emotion entrainment of online users in emergency events","authors":"Saike He, Xiaolong Zheng, D. Zeng, Bo Xu, Changliang Li, Guanhua Tian, Lei Wang, Hongwei Hao","doi":"10.1109/ISI.2015.7165961","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165961","url":null,"abstract":"Emotion entrainment accounts for the rhythmic convergence of human emotions through social interactions. This phenomenon abounds in various disciplines, i.e. effervescency in soccer games, anger proliferation in violence incidents, or anxiety diffusion in disasters. Although emotion entrainment is highly relevant to the quality of human daily life, the principles underpinning this phenomenon is still unclear. Previous dynamic models try to explain entrainment phenomenon by assuming symmetrical coupling among identical individuals. Yet this assumption clearly does not hold in real-world human interactions. As such, we propose an alternative model that captures asymmetric relationships. In depicting the coupling mechanism, the effect of social influence is also encoded. Experimental results on two emergent social events suggest that the proposed model characterizes emotion trends with high accuracy. Also, we explain the emotion dynamics by analyzing the reconstructed entrainment matrix. Our work may present practical implications for those who want to guide or regulate the emotion evolution in emergency events discussed online.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114317529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A bottom-up method for constructing topic hierarchies 用于构造主题层次结构的自底向上方法
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165972
Yuhao Zhang, W. Mao, Xiaochen Li
In security-related applications, it is of great need to construct topic hierarchies from the data automatically. It can help us better understand the contents and structure of information and benefit many applications in security informatics. The existing topic hierarchy construction methods either need to specify the structure manually, or are not robust enough for sparse social media data such as microblog. In this paper, we propose an approach to automatically construct topic hierarchies from microblog data in a bottom up manner. We first detect the fine grained topics and then build the topic structure based on a multi-branch hierarchical construction method. We conduct a preliminary empirical study based on Weibo data. The experimental results show that the hierarchical topic structure generated by our method can provide meaningful results.
在与安全相关的应用中,从数据中自动构造主题层次结构是非常必要的。它可以帮助我们更好地理解信息的内容和结构,有利于安全信息学的许多应用。现有的主题层次结构构建方法要么需要手工指定结构,要么对于微博等稀疏的社交媒体数据鲁棒性不够。本文提出了一种基于自底向上的微博数据自动构建主题层次结构的方法。我们首先检测细粒度主题,然后基于多分支分层构建方法构建主题结构。我们基于微博数据进行了初步的实证研究。实验结果表明,该方法生成的分层主题结构能够提供有意义的结果。
{"title":"A bottom-up method for constructing topic hierarchies","authors":"Yuhao Zhang, W. Mao, Xiaochen Li","doi":"10.1109/ISI.2015.7165972","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165972","url":null,"abstract":"In security-related applications, it is of great need to construct topic hierarchies from the data automatically. It can help us better understand the contents and structure of information and benefit many applications in security informatics. The existing topic hierarchy construction methods either need to specify the structure manually, or are not robust enough for sparse social media data such as microblog. In this paper, we propose an approach to automatically construct topic hierarchies from microblog data in a bottom up manner. We first detect the fine grained topics and then build the topic structure based on a multi-branch hierarchical construction method. We conduct a preliminary empirical study based on Weibo data. The experimental results show that the hierarchical topic structure generated by our method can provide meaningful results.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"311 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132752136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication 说谎者,说谎者,即时通讯:自发在线交流中的欺骗性语言-行为线索
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165960
S. Ho, Jeffrey T. Hancock, Cheryl Booth, Xiuwen Liu, Shashanka Surya Timmarajus, M. Burmester
With an increasing number of online users, the potential danger of online deception grows accordingly - as does the importance of better understanding human behavior online to mitigate these risks. One critical element to address such online threat is to identify intentional deception in spontaneous online communication. For this study, we designed an interactive online game that creates player scenarios to encourage deception. Data was collected and analyzed in October 2014 to identify certain deceptive cues. Players' interactive dialogue was analyzed using linear regression analysis. The results reveal that certain language features are highly significant predictors of deception in synchronous, spontaneous online communication.
随着网络用户数量的增加,网络欺骗的潜在危险也随之增加——更好地了解人们在网上的行为以减轻这些风险的重要性也在增加。解决这种在线威胁的一个关键因素是识别自发在线通信中的故意欺骗。在这项研究中,我们设计了一个互动的在线游戏,创造玩家场景来鼓励欺骗。2014年10月收集并分析了数据,以识别某些欺骗性线索。对玩家互动对话进行线性回归分析。结果表明,在同步的、自发的在线交流中,某些语言特征是非常重要的欺骗预测因子。
{"title":"Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication","authors":"S. Ho, Jeffrey T. Hancock, Cheryl Booth, Xiuwen Liu, Shashanka Surya Timmarajus, M. Burmester","doi":"10.1109/ISI.2015.7165960","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165960","url":null,"abstract":"With an increasing number of online users, the potential danger of online deception grows accordingly - as does the importance of better understanding human behavior online to mitigate these risks. One critical element to address such online threat is to identify intentional deception in spontaneous online communication. For this study, we designed an interactive online game that creates player scenarios to encourage deception. Data was collected and analyzed in October 2014 to identify certain deceptive cues. Players' interactive dialogue was analyzed using linear regression analysis. The results reveal that certain language features are highly significant predictors of deception in synchronous, spontaneous online communication.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133092427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Power-function-based observation-weighting method for mining actionable behavioral rules 基于幂函数的可操作行为规则的观察加权挖掘方法
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165970
Peng Su, W. Mao
Among the most important and distinctive actionable knowledge are actionable behavioral rules that can directly and explicitly suggest specific actions to take to influence (restrain or encourage) the behavior in the users' best interest. The problem of mining such rules is a search problem in a framework of support and expected utility. The previous definition of a rule's support assumes that each instance which supports a rule has the uniform contribution to the support. However, this assumption is usually violated in practice to some extent, and thus will hinder the performance of algorithms for mining such rules. In this paper, to handle this problem, a power-function-based observation-weighting model for support and corresponding mining algorithm are proposed. The experimental results strongly suggest the validity and the superiority of our approach.
在最重要和最独特的可操作知识中,可操作的行为规则可以直接和明确地建议采取具体行动,以影响(限制或鼓励)用户的最佳利益行为。挖掘这些规则的问题是在支持度和期望效用框架下的搜索问题。规则支持的前面定义假设支持规则的每个实例对支持的贡献是一致的。然而,在实践中,这一假设通常会在一定程度上被违反,从而会影响挖掘此类规则的算法的性能。针对这一问题,本文提出了一种基于幂函数的观测加权支持模型和相应的挖掘算法。实验结果有力地证明了该方法的有效性和优越性。
{"title":"Power-function-based observation-weighting method for mining actionable behavioral rules","authors":"Peng Su, W. Mao","doi":"10.1109/ISI.2015.7165970","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165970","url":null,"abstract":"Among the most important and distinctive actionable knowledge are actionable behavioral rules that can directly and explicitly suggest specific actions to take to influence (restrain or encourage) the behavior in the users' best interest. The problem of mining such rules is a search problem in a framework of support and expected utility. The previous definition of a rule's support assumes that each instance which supports a rule has the uniform contribution to the support. However, this assumption is usually violated in practice to some extent, and thus will hinder the performance of algorithms for mining such rules. In this paper, to handle this problem, a power-function-based observation-weighting model for support and corresponding mining algorithm are proposed. The experimental results strongly suggest the validity and the superiority of our approach.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133189929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Pass-pic: A mobile user authentication Pass-pic:移动用户认证
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165977
Garima Bajwa, R. Dantu, Ryan Aldridge
Conventional authentication methods utilizing alphanumeric username and passwords, PIN numbers, or any combination thereof have many weaknesses. On modern smart phones there are multiple ways users can authenticate. The traditional username password combination is used often as well as PIN passwords and pattern based passwords. The problem with these methods is that they are still vulnerable. A short password or to a much greater extent a PIN, or a pattern password can be defeated by various techniques such as smudge attacks, key loggers and so on. Our aim with Pass-Pic is to implement a picture based authentication system that is both more secure and easier for the user to both input and remember.
使用字母数字用户名和密码、PIN码或它们的任何组合的传统身份验证方法有许多弱点。在现代智能手机上,用户可以通过多种方式进行身份验证。通常使用传统的用户名密码组合以及PIN密码和基于模式的密码。这些方法的问题在于它们仍然很脆弱。短密码或更大程度上的PIN或模式密码可以被各种技术攻破,例如污迹攻击、密钥记录器等。我们使用Pass-Pic的目的是实现一个基于图片的身份验证系统,该系统既安全又易于用户输入和记忆。
{"title":"Pass-pic: A mobile user authentication","authors":"Garima Bajwa, R. Dantu, Ryan Aldridge","doi":"10.1109/ISI.2015.7165977","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165977","url":null,"abstract":"Conventional authentication methods utilizing alphanumeric username and passwords, PIN numbers, or any combination thereof have many weaknesses. On modern smart phones there are multiple ways users can authenticate. The traditional username password combination is used often as well as PIN passwords and pattern based passwords. The problem with these methods is that they are still vulnerable. A short password or to a much greater extent a PIN, or a pattern password can be defeated by various techniques such as smudge attacks, key loggers and so on. Our aim with Pass-Pic is to implement a picture based authentication system that is both more secure and easier for the user to both input and remember.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127819363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Online/off-line ring signature scheme with provable security 具有可证明安全性的在线/离线环签名方案
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165979
J. Kar
The article proposes an Online/Off-line Ring Signature Scheme in random oracle model. Security of the scheme relies on both Computational Diffie-Hellman and k-CAA problems. In Online/Off-line signature scheme. The proposed scheme is secure against Existential Unforgeability. It has Signer Ambiguity and robustness property where the misbehavior of the signer can be detected.
提出了一种基于随机oracle模型的在线/离线环签名方案。该方案的安全性依赖于计算Diffie-Hellman问题和k-CAA问题。“在线/离线签名方案”中。所提出的方案是安全的,不受存在不可伪造性的影响。它具有签名者模糊性和鲁棒性,签名者的错误行为可以被检测到。
{"title":"Online/off-line ring signature scheme with provable security","authors":"J. Kar","doi":"10.1109/ISI.2015.7165979","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165979","url":null,"abstract":"The article proposes an Online/Off-line Ring Signature Scheme in random oracle model. Security of the scheme relies on both Computational Diffie-Hellman and k-CAA problems. In Online/Off-line signature scheme. The proposed scheme is secure against Existential Unforgeability. It has Signer Ambiguity and robustness property where the misbehavior of the signer can be detected.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123781848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An opportunistic encryption extension for the DNS protocol DNS协议的机会加密扩展
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165976
Theogene Hakiza Bucuti, R. Dantu
Confidentiality for DNS transactions has been a low-priority concern in DNS security for a long time due to performance requirements for the functionality of DNS and the fact that data in the DNS is considered public. However, the information carried in DNS transactions, if collected and analyzed, can pose real threats to personal privacy. This makes DNS a good target for passive eavesdropping to collect data for many purposes some of which may be malicious. The protocol described in this document is intended to facilitate an opportunistic negotiation of encryption in the DNS to provide confidentiality for the last mile of DNS resolution. It defines procedures to discover encryption-aware servers and how to establish a relationship with them with minimum overhead.
长期以来,由于对DNS功能的性能要求以及DNS中的数据被认为是公开的这一事实,DNS事务的机密性在DNS安全性中一直是一个低优先级的问题。然而,DNS交易中携带的信息,如果被收集和分析,可能会对个人隐私构成真正的威胁。这使得DNS成为被动窃听的一个很好的目标,以便为许多目的收集数据,其中一些目的可能是恶意的。本文档中描述的协议旨在促进DNS中加密的机会协商,从而为DNS解析的最后一英里提供机密性。它定义了发现加密感知服务器的过程,以及如何以最小的开销与它们建立关系。
{"title":"An opportunistic encryption extension for the DNS protocol","authors":"Theogene Hakiza Bucuti, R. Dantu","doi":"10.1109/ISI.2015.7165976","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165976","url":null,"abstract":"Confidentiality for DNS transactions has been a low-priority concern in DNS security for a long time due to performance requirements for the functionality of DNS and the fact that data in the DNS is considered public. However, the information carried in DNS transactions, if collected and analyzed, can pose real threats to personal privacy. This makes DNS a good target for passive eavesdropping to collect data for many purposes some of which may be malicious. The protocol described in this document is intended to facilitate an opportunistic negotiation of encryption in the DNS to provide confidentiality for the last mile of DNS resolution. It defines procedures to discover encryption-aware servers and how to establish a relationship with them with minimum overhead.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126375529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A comparison of features for automatic deception detection in synchronous computer-mediated communication 同步计算机中介通信中自动欺骗检测的特征比较
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165955
Jinie Pak, Lina Zhou
This research aims to compare the performance of automatic deception detection in synchronous computer-mediated communication (CMC) with and without incorporating structural features. In addition, the development of deception detection models draws on the linguistic features that have been widely studied in the online deception literature. The results suggest that structural features can be effective in detecting deception and combining the structural features with linguistic features can improve the performance of detecting deception.
本研究旨在比较同步计算机中介通信(CMC)中包含和不包含结构特征的自动欺骗检测性能。此外,欺骗检测模型的发展借鉴了在线欺骗文献中广泛研究的语言特征。结果表明,结构特征可以有效地检测欺骗,将结构特征与语言特征相结合可以提高检测欺骗的性能。
{"title":"A comparison of features for automatic deception detection in synchronous computer-mediated communication","authors":"Jinie Pak, Lina Zhou","doi":"10.1109/ISI.2015.7165955","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165955","url":null,"abstract":"This research aims to compare the performance of automatic deception detection in synchronous computer-mediated communication (CMC) with and without incorporating structural features. In addition, the development of deception detection models draws on the linguistic features that have been widely studied in the online deception literature. The results suggest that structural features can be effective in detecting deception and combining the structural features with linguistic features can improve the performance of detecting deception.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132165468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Spectral malware behavior clustering 频谱恶意软件行为聚类
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165931
C. Giannella, E. Bloedorn
We develop a version of spectral clustering and empirically study its performance when applied to behavior-based malware clustering. In 2011, a behavior-based malware clustering algorithm was reported by Rieck et al. We hypothesize that, owing to the more complex nature of our algorithm, it will exhibit higher accuracy than Rieck's but will require greater run-time. Through experiments using three different malware datasets, we largely substantiate this hypothesis. Our approach had comparable or superior accuracy to Rieck's over all of its parameter settings examined and ours had higher run-times (nonetheless, ours had run-times of less than one minute on all datasets). We also found our algorithm had no clear accuracy advantage, but much smaller run-times than Hierarchical Agglomerative Clustering.
我们开发了一种谱聚类方法,并对其应用于基于行为的恶意软件聚类的性能进行了实证研究。2011年,Rieck等人报道了一种基于行为的恶意软件聚类算法。我们假设,由于我们的算法更复杂,它将比Rieck的算法显示出更高的准确性,但需要更长的运行时间。通过使用三种不同的恶意软件数据集的实验,我们在很大程度上证实了这一假设。我们的方法在所有参数设置上与Rieck的方法具有相当或更高的准确性,并且我们的方法具有更高的运行时间(尽管如此,我们的方法在所有数据集上的运行时间都不到一分钟)。我们还发现,我们的算法没有明显的准确性优势,但比分层凝聚聚类的运行时间要短得多。
{"title":"Spectral malware behavior clustering","authors":"C. Giannella, E. Bloedorn","doi":"10.1109/ISI.2015.7165931","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165931","url":null,"abstract":"We develop a version of spectral clustering and empirically study its performance when applied to behavior-based malware clustering. In 2011, a behavior-based malware clustering algorithm was reported by Rieck et al. We hypothesize that, owing to the more complex nature of our algorithm, it will exhibit higher accuracy than Rieck's but will require greater run-time. Through experiments using three different malware datasets, we largely substantiate this hypothesis. Our approach had comparable or superior accuracy to Rieck's over all of its parameter settings examined and ours had higher run-times (nonetheless, ours had run-times of less than one minute on all datasets). We also found our algorithm had no clear accuracy advantage, but much smaller run-times than Hierarchical Agglomerative Clustering.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132218589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Research on construction methods of the Shanghai cooperation organization meta-network model 上海合作组织元网络模型构建方法研究
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165974
Kun Wang, Duoyong Sun
The Shanghai Cooperation Organization (SCO) has an extraordinary role to play in many aspects since its establishment. However, previous achievements of the organization were mainly under political and historical perspective, and quantitative study is scarce. The Social Network Analysis (SNA) is considered to be a powerful data mining tool, and it has become a new hotspot of international relations studies in recent years. This manuscript attempts to explore the relational structure of SCO though the SNA. We gathered some relevant data on Military Exercise of the SCO from the Internet. And then, we made a trial to construct the meta-network models, and obtain evolution of its relationship.
上海合作组织自成立以来,在许多方面发挥了非凡的作用。然而,以往对该组织的研究成果主要是在政治和历史的视角下进行的,定量研究较少。社会网络分析(Social Network Analysis, SNA)被认为是一种强大的数据挖掘工具,近年来成为国际关系研究的一个新热点。本文试图通过SNA探讨上海合作组织的关系结构。我们从网上搜集了上海合作组织军演的有关资料。然后,我们尝试构建元网络模型,并得到其关系的演化。
{"title":"Research on construction methods of the Shanghai cooperation organization meta-network model","authors":"Kun Wang, Duoyong Sun","doi":"10.1109/ISI.2015.7165974","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165974","url":null,"abstract":"The Shanghai Cooperation Organization (SCO) has an extraordinary role to play in many aspects since its establishment. However, previous achievements of the organization were mainly under political and historical perspective, and quantitative study is scarce. The Social Network Analysis (SNA) is considered to be a powerful data mining tool, and it has become a new hotspot of international relations studies in recent years. This manuscript attempts to explore the relational structure of SCO though the SNA. We gathered some relevant data on Military Exercise of the SCO from the Internet. And then, we made a trial to construct the meta-network models, and obtain evolution of its relationship.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128336758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2015 IEEE International Conference on Intelligence and Security Informatics (ISI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1