首页 > 最新文献

2015 IEEE International Conference on Intelligence and Security Informatics (ISI)最新文献

英文 中文
Filtering spam in Weibo using ensemble imbalanced classification and knowledge expansion 基于集成不平衡分类和知识扩展的微博垃圾邮件过滤
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165952
Zhipeng Jin, Qiudan Li, D. Zeng, Lei Wang
Weibo has become an important information sharing platform in our daily life in China. Many applications utilize Weibo data to analyze hot topic and opinion evolution patterns to gain insights into user behavior. However, various spam messages degrade the performance of these applications and thus are essential to be filtered. In this paper, we propose a unified spam detection approach, which utilizes external knowledge sources to expand keywords features and applies an ensemble under-sampling based strategy to handle the class-imbalance problem. The experimental results show the effectiveness and robustness of our approach in Weibo data.
在中国,微博已经成为我们日常生活中重要的信息分享平台。许多应用程序利用微博数据来分析热门话题和意见演变模式,以深入了解用户行为。但是,各种垃圾邮件会降低这些应用程序的性能,因此必须对其进行过滤。本文提出了一种统一的垃圾邮件检测方法,该方法利用外部知识来源扩展关键词特征,并采用基于集合欠采样的策略来处理类不平衡问题。实验结果表明了该方法在微博数据中的有效性和鲁棒性。
{"title":"Filtering spam in Weibo using ensemble imbalanced classification and knowledge expansion","authors":"Zhipeng Jin, Qiudan Li, D. Zeng, Lei Wang","doi":"10.1109/ISI.2015.7165952","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165952","url":null,"abstract":"Weibo has become an important information sharing platform in our daily life in China. Many applications utilize Weibo data to analyze hot topic and opinion evolution patterns to gain insights into user behavior. However, various spam messages degrade the performance of these applications and thus are essential to be filtered. In this paper, we propose a unified spam detection approach, which utilizes external knowledge sources to expand keywords features and applies an ensemble under-sampling based strategy to handle the class-imbalance problem. The experimental results show the effectiveness and robustness of our approach in Weibo data.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132942653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Nonproliferation informatics: Employing Bayesian analysis, agent based modeling, and information theory for dynamic proliferation pathway studies 防扩散信息学:运用贝叶斯分析、agent建模和信息论进行动态扩散途径研究
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165937
Royal A. Elmore, W. Charlton
Decision making on weapons of mass effect (WME) proliferation and counter-proliferation is information driven. However, the large data requirements, along with associated knowledge gaps and intelligence uncertainties, impedes optimal strategy selection. Combining Bayesian analysis, agent based modeling (ABM), and information theory within a security informatics context can aid understanding of dynamic WME proliferation and counter-proliferation pathways and possibilities. The Bayesian ABM Nonproliferation Enterprise (BANE) was developed to incorporate large databases and information sets. There are three broad BANE agent classes: 1) proliferator, 2) defensive, and 3) neutral. Within each agent class exists significant flexibility for them pursuing different objectives. Bayesian analysis cover the technical linkages realistically tying proliferation pathway process steps together. In BANE, Bayesian networks using the Netica software program provide a wide array of scientific and engineering pathway options. Information theory, especially entropy reduction and mutual information, in a Bayesian security informatics arrangement help identify optimal technical areas to master or disrupt. Concurrently, interlocking factors such as available resources, technical sophistication, time horizons, detection risks, and agent affinities impact agents' ability to achieve their goals. Actions taken by one BANE agent on the proliferation or counter-proliferation front affect its future opportunities and those of potential partner or adversarial agents. An explanation of the BANE framework and several key security informatics aspects crucial to WME proliferation and counter-proliferation analysis are provided.
大规模效应武器扩散和反扩散的决策是信息驱动的。然而,大数据需求,以及相关的知识差距和情报不确定性,阻碍了最优策略选择。在安全信息学环境中结合贝叶斯分析、基于代理的建模(ABM)和信息论可以帮助理解动态WME扩散和反扩散的途径和可能性。贝叶斯反弹道导弹防扩散企业(BANE)是为整合大型数据库和信息集而开发的。有三种主要的毒药类型:1)增殖剂,2)防御剂,和3)中性剂。每个代理类都有很大的灵活性,可以让它们追求不同的目标。贝叶斯分析涵盖了实际上将扩散途径过程步骤联系在一起的技术联系。在贝恩,使用Netica软件程序的贝叶斯网络提供了广泛的科学和工程路径选择。信息理论,特别是熵降和互信息,在贝叶斯安全信息学安排中有助于确定掌握或破坏的最佳技术领域。同时,诸如可用资源、技术成熟度、时间范围、检测风险和代理亲和力等连锁因素影响代理实现其目标的能力。一种杀伤剂在扩散或反扩散战线上采取的行动会影响其未来的机会以及潜在伙伴或对抗剂的机会。对贝恩框架和对WME扩散和反扩散分析至关重要的几个关键安全信息学方面进行了解释。
{"title":"Nonproliferation informatics: Employing Bayesian analysis, agent based modeling, and information theory for dynamic proliferation pathway studies","authors":"Royal A. Elmore, W. Charlton","doi":"10.1109/ISI.2015.7165937","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165937","url":null,"abstract":"Decision making on weapons of mass effect (WME) proliferation and counter-proliferation is information driven. However, the large data requirements, along with associated knowledge gaps and intelligence uncertainties, impedes optimal strategy selection. Combining Bayesian analysis, agent based modeling (ABM), and information theory within a security informatics context can aid understanding of dynamic WME proliferation and counter-proliferation pathways and possibilities. The Bayesian ABM Nonproliferation Enterprise (BANE) was developed to incorporate large databases and information sets. There are three broad BANE agent classes: 1) proliferator, 2) defensive, and 3) neutral. Within each agent class exists significant flexibility for them pursuing different objectives. Bayesian analysis cover the technical linkages realistically tying proliferation pathway process steps together. In BANE, Bayesian networks using the Netica software program provide a wide array of scientific and engineering pathway options. Information theory, especially entropy reduction and mutual information, in a Bayesian security informatics arrangement help identify optimal technical areas to master or disrupt. Concurrently, interlocking factors such as available resources, technical sophistication, time horizons, detection risks, and agent affinities impact agents' ability to achieve their goals. Actions taken by one BANE agent on the proliferation or counter-proliferation front affect its future opportunities and those of potential partner or adversarial agents. An explanation of the BANE framework and several key security informatics aspects crucial to WME proliferation and counter-proliferation analysis are provided.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131015030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Random anonymization of mobile sensor data: Modified Android framework 移动传感器数据随机匿名化:修改的Android框架
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165968
Cynthia L. Claiborne, C. Ncube, R. Dantu
With the increasing ability to accurately classify activities of mobile users from what was once viewed as innocuous mobile sensor data, the risk of users compromising their privacy has risen exponentially. Currently, mobile owners cannot control how various applications handle the privacy of their sensor data, or even determine if a service provider is adversarial or trustworthy. To address these privacy concerns, third party applications have been designed to allow mobile users to have control over the data that is sent to service providers. However, these applications require users to set flags and parameters that place restrictions on the anonymized or real sensor data that is sent to the requestor. Therefore, in this paper, we introduce a new framework, RANDSOM, that moves the decision-making from the application level to the operating system level.
随着从曾经被视为无害的移动传感器数据中准确分类移动用户活动的能力不断提高,用户泄露其隐私的风险呈指数级上升。目前,手机用户无法控制各种应用程序如何处理其传感器数据的隐私,甚至无法确定服务提供商是敌对的还是值得信赖的。为了解决这些隐私问题,第三方应用程序被设计成允许移动用户控制发送给服务提供商的数据。然而,这些应用程序要求用户设置对发送给请求者的匿名或真实传感器数据进行限制的标志和参数。因此,在本文中,我们引入了一个新的框架RANDSOM,它将决策从应用层移动到操作系统层。
{"title":"Random anonymization of mobile sensor data: Modified Android framework","authors":"Cynthia L. Claiborne, C. Ncube, R. Dantu","doi":"10.1109/ISI.2015.7165968","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165968","url":null,"abstract":"With the increasing ability to accurately classify activities of mobile users from what was once viewed as innocuous mobile sensor data, the risk of users compromising their privacy has risen exponentially. Currently, mobile owners cannot control how various applications handle the privacy of their sensor data, or even determine if a service provider is adversarial or trustworthy. To address these privacy concerns, third party applications have been designed to allow mobile users to have control over the data that is sent to service providers. However, these applications require users to set flags and parameters that place restrictions on the anonymized or real sensor data that is sent to the requestor. Therefore, in this paper, we introduce a new framework, RANDSOM, that moves the decision-making from the application level to the operating system level.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134360573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Assessment of user home location geoinference methods 评估用户家庭位置的地理推断方法
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165957
Joshua J. Harrison, Eric Bell, Courtney Corley, Chase P. Dowling, A. Cowell
This study presents an assessment of multiple approaches to determine the home and/or other important locations to a Twitter user. In this study, we present a unique approach to the problem of geotagged data sparsity in social media when performing geoinferencing tasks. Given the sparsity of explicitly geotagged Twitter data, the ability to perform accurate and reliable user geolocation from a limited number of geotagged posts has proven to be quite useful. In our survey, we have achieved accuracy rates of over 86% in matching Twitter user profile locations with their inferred home locations derived from geotagged posts.
这项研究提出了多种方法的评估,以确定家庭和/或其他重要位置的推特用户。在本研究中,我们提出了一种独特的方法来解决社交媒体中执行地理推断任务时地理标记数据稀疏性的问题。考虑到明确地标记了地理位置的Twitter数据的稀疏性,从有限数量的标记了地理位置的帖子中执行准确可靠的用户地理定位的能力已被证明是非常有用的。在我们的调查中,我们已经实现了超过86%的准确率,将Twitter用户的个人资料位置与他们从地理标记帖子中推断出的家庭位置相匹配。
{"title":"Assessment of user home location geoinference methods","authors":"Joshua J. Harrison, Eric Bell, Courtney Corley, Chase P. Dowling, A. Cowell","doi":"10.1109/ISI.2015.7165957","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165957","url":null,"abstract":"This study presents an assessment of multiple approaches to determine the home and/or other important locations to a Twitter user. In this study, we present a unique approach to the problem of geotagged data sparsity in social media when performing geoinferencing tasks. Given the sparsity of explicitly geotagged Twitter data, the ability to perform accurate and reliable user geolocation from a limited number of geotagged posts has proven to be quite useful. In our survey, we have achieved accuracy rates of over 86% in matching Twitter user profile locations with their inferred home locations derived from geotagged posts.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133711274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Personality based public sentiment classification in microblog 基于个性的微博舆情分类
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165958
Junjie Lin, W. Mao
In recent years, microblog has become one of the most widely used social media for people to exchange ideas and express emotions. As information propagates fast in social network, it's crucial for governments and public agencies to effectively monitor public sentiment implied in user-generated content. Most previous work of public sentiment analysis takes tweets of different users as a whole without considering the diverse word use of people. Thus, some sentiment words may be neglected in the process of analysis because they are only used by people of specific groups. Inspired by previous psychological findings that personality influences the ways people write and talk, we propose a personality based sentiment classification method. In order to capture more useful but not widely used sentiment words, our approach extracts textual features for people of different personality traits based on the Big Five model. Moreover, we adopt an ensemble learning strategy to utilize both personality related and commonly used textual features. Experimental study shows the effectiveness of our method.
近年来,微博已经成为人们交流思想和表达情感的最广泛使用的社交媒体之一。随着社交网络中信息的快速传播,政府和公共机构有效监控用户生成内容中隐含的公众情绪至关重要。以往的舆情分析工作大多是将不同用户的推文作为一个整体,而没有考虑到人们使用词语的多样性。因此,在分析过程中可能会忽略一些情感词,因为它们只被特定群体的人使用。受以往心理学研究结果的启发,我们提出了一种基于人格的情感分类方法。为了捕获更多有用但不被广泛使用的情感词,我们的方法基于Big Five模型提取不同人格特质的文本特征。此外,我们采用集成学习策略来利用与个性相关的和常用的文本特征。实验研究表明了该方法的有效性。
{"title":"Personality based public sentiment classification in microblog","authors":"Junjie Lin, W. Mao","doi":"10.1109/ISI.2015.7165958","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165958","url":null,"abstract":"In recent years, microblog has become one of the most widely used social media for people to exchange ideas and express emotions. As information propagates fast in social network, it's crucial for governments and public agencies to effectively monitor public sentiment implied in user-generated content. Most previous work of public sentiment analysis takes tweets of different users as a whole without considering the diverse word use of people. Thus, some sentiment words may be neglected in the process of analysis because they are only used by people of specific groups. Inspired by previous psychological findings that personality influences the ways people write and talk, we propose a personality based sentiment classification method. In order to capture more useful but not widely used sentiment words, our approach extracts textual features for people of different personality traits based on the Big Five model. Moreover, we adopt an ensemble learning strategy to utilize both personality related and commonly used textual features. Experimental study shows the effectiveness of our method.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121235012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SPINN: Suspicion prediction in nuclear networks SPINN:核网络中的怀疑预测
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165933
Ian A. Andrews, Srijan Kumar, Francesca Spezzano, V. S. Subrahmanian
The best known analyses to date of nuclear proliferation networks are qualitative analyses of networks consisting of just hundreds of nodes and edges. We propose SPINN - a computational framework that performs the following tasks. Starting from existing lists of sanctioned entities, SPINN automatically builds a highly augmented network by scraping connections between individuals, companies, and government organizations from sources like LinkedIN and public company data from Bloomberg. By analyzing this open source information alone, we have built up a network of over 74K nodes and 1.09M edges, containing a smaller whitelist and a blacklist. We develop numerous “features” of nodes in such networks that take both intrinsic node properties and network properties into account, and based on these, we develop methods to classify previously unclassified nodes as suspicious or unsuspicious. On 10-fold cross validation on ground truth data, we obtain a Matthews Correlation Coefficient for our best classifier of just over 0.9. We show that of the 10 most relevant features for distinguishing between suspicious and non-suspicious nodes, the top 8 are network related measures including a novel notion of suspicion rank.
迄今为止,对核扩散网络最著名的分析是对仅由数百个节点和边缘组成的网络进行定性分析。我们提出SPINN——一个执行以下任务的计算框架。SPINN从现有的制裁实体名单开始,通过从LinkedIN等来源和彭博社的上市公司数据中收集个人、公司和政府组织之间的联系,自动构建一个高度增强的网络。通过单独分析这些开源信息,我们已经建立了一个超过74K个节点和109万条边的网络,其中包含一个较小的白名单和一个黑名单。我们开发了这种网络中节点的许多“特征”,这些特征考虑了节点的内在属性和网络属性,并在此基础上开发了将先前未分类的节点分类为可疑或不可疑的方法。在地面真实数据的10倍交叉验证中,我们获得了我们最好的分类器的马修斯相关系数刚刚超过0.9。我们表明,在区分可疑和非可疑节点的10个最相关特征中,前8个是与网络相关的度量,包括怀疑等级的新概念。
{"title":"SPINN: Suspicion prediction in nuclear networks","authors":"Ian A. Andrews, Srijan Kumar, Francesca Spezzano, V. S. Subrahmanian","doi":"10.1109/ISI.2015.7165933","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165933","url":null,"abstract":"The best known analyses to date of nuclear proliferation networks are qualitative analyses of networks consisting of just hundreds of nodes and edges. We propose SPINN - a computational framework that performs the following tasks. Starting from existing lists of sanctioned entities, SPINN automatically builds a highly augmented network by scraping connections between individuals, companies, and government organizations from sources like LinkedIN and public company data from Bloomberg. By analyzing this open source information alone, we have built up a network of over 74K nodes and 1.09M edges, containing a smaller whitelist and a blacklist. We develop numerous “features” of nodes in such networks that take both intrinsic node properties and network properties into account, and based on these, we develop methods to classify previously unclassified nodes as suspicious or unsuspicious. On 10-fold cross validation on ground truth data, we obtain a Matthews Correlation Coefficient for our best classifier of just over 0.9. We show that of the 10 most relevant features for distinguishing between suspicious and non-suspicious nodes, the top 8 are network related measures including a novel notion of suspicion rank.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131542069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analyzing the social media footprint of street gangs 分析街头帮派的社交媒体足迹
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165945
Sanjaya Wijeratne, Derek Doran, A. Sheth, Jack L. Dustin
Gangs utilize social media as a way to maintain threatening virtual presences, to communicate about their activities, and to intimidate others. Such usage has gained the attention of many justice service agencies that wish to create better crime prevention and judicial services. However, these agencies use analysis methods that are labor intensive and only lead to basic, qualitative data interpretations. This paper presents the architecture of a modern platform to discover the structure, function, and operation of gangs through the lens of social media. Preliminary analysis of social media posts shared in the greater Chicago, IL region demonstrate the platform's capability to understand gang members' social media usage patterns.
帮派利用社交媒体作为一种保持威胁虚拟存在的方式,来交流他们的活动,并恐吓他人。这种用法引起了许多希望创造更好的预防犯罪和司法服务的司法服务机构的注意。然而,这些机构使用的分析方法是劳动密集型的,只能导致基本的,定性的数据解释。本文提出了一个现代平台的架构,通过社交媒体的视角来发现帮派的结构、功能和运作。对伊利诺伊州大芝加哥地区分享的社交媒体帖子的初步分析表明,该平台有能力了解帮派成员的社交媒体使用模式。
{"title":"Analyzing the social media footprint of street gangs","authors":"Sanjaya Wijeratne, Derek Doran, A. Sheth, Jack L. Dustin","doi":"10.1109/ISI.2015.7165945","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165945","url":null,"abstract":"Gangs utilize social media as a way to maintain threatening virtual presences, to communicate about their activities, and to intimidate others. Such usage has gained the attention of many justice service agencies that wish to create better crime prevention and judicial services. However, these agencies use analysis methods that are labor intensive and only lead to basic, qualitative data interpretations. This paper presents the architecture of a modern platform to discover the structure, function, and operation of gangs through the lens of social media. Preliminary analysis of social media posts shared in the greater Chicago, IL region demonstrate the platform's capability to understand gang members' social media usage patterns.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132450517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
LECENing places to hide: Geo-mapping child exploitation material 查找隐藏地点:绘制儿童剥削材料的地理地图
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165942
Bryan Monk, Russell Allsup, Richard Frank
The advent of the internet has unfortunately increased the scale and complexity of child exploitation material (CEM) with content increasingly moving online, forming online CEM networks through a series of websites that are hyperlinked to each other and lead consumers from one website to another. Extending on prior research focusing on examining network structure and network disruption strategies it was prudent to expand avenues to increase attack strategies. Geolocation and Whois data were utilized to map the prevalence of CEM globally. Differences in the Geolocation and Whois data were observed, suggesting both are critical pieces of information in generating accurate geo-mapping of CEM. These maps show how multi-jurisdictional attack strategies may be employed to attack these networks and remove this content.
不幸的是,互联网的出现增加了儿童剥削材料(CEM)的规模和复杂性,内容越来越多地转移到网上,通过一系列相互超链接的网站形成在线CEM网络,并将消费者从一个网站引导到另一个网站。延伸先前的研究重点是检查网络结构和网络中断策略,这是谨慎的,以扩大途径,以增加攻击策略。利用地理定位和Whois数据来绘制全球CEM的流行情况。我们观察到地理定位和Whois数据的差异,这表明两者都是生成准确地理地图的关键信息。这些地图显示了如何使用多管辖攻击策略来攻击这些网络并删除这些内容。
{"title":"LECENing places to hide: Geo-mapping child exploitation material","authors":"Bryan Monk, Russell Allsup, Richard Frank","doi":"10.1109/ISI.2015.7165942","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165942","url":null,"abstract":"The advent of the internet has unfortunately increased the scale and complexity of child exploitation material (CEM) with content increasingly moving online, forming online CEM networks through a series of websites that are hyperlinked to each other and lead consumers from one website to another. Extending on prior research focusing on examining network structure and network disruption strategies it was prudent to expand avenues to increase attack strategies. Geolocation and Whois data were utilized to map the prevalence of CEM globally. Differences in the Geolocation and Whois data were observed, suggesting both are critical pieces of information in generating accurate geo-mapping of CEM. These maps show how multi-jurisdictional attack strategies may be employed to attack these networks and remove this content.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125926709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A privacy protection procedure for large scale individual level data 大规模个人数据的隐私保护程序
Pub Date : 2015-05-01 DOI: 10.1109/ISI.2015.7165950
Julius Adebayo, Lalana Kagal
We present a transformation procedure for large scale individual level data that produces output data in which no linear combinations of the resulting attributes can yield the original sensitive attributes from the transformed data. In doing this, our procedure eliminates all linear information regarding a sensitive attribute from the input data. The algorithm combines principal components analysis of the data set with orthogonal projection onto the subspace containing the sensitive attribute(s). The algorithm presented is motivated by applications where there is a need to drastically `sanitize' a data set of all information relating to sensitive attribute(s) before analysis of the data using a data mining algorithm. Sensitive attribute removal (sanitization) is often needed to prevent disparate impact and discrimination on the basis of race, gender, and sexual orientation in high stakes contexts such as determination of access to loans, credit, employment, and insurance. We show through experiments that our proposed algorithm outperforms other privacy preserving techniques by more than 20 percent in lowering the ability to reconstruct sensitive attributes from large scale data.
我们提出了一种大规模个人级数据的转换过程,该过程产生的输出数据中,结果属性的线性组合不能从转换后的数据中产生原始敏感属性。在这样做的过程中,我们的过程从输入数据中消除了关于敏感属性的所有线性信息。该算法将数据集的主成分分析与在包含敏感属性的子空间上的正交投影相结合。在使用数据挖掘算法分析数据之前,需要彻底“净化”与敏感属性相关的所有信息的数据集的应用程序激发了本文提出的算法。在高风险环境中,如确定获得贷款、信贷、就业和保险的机会,通常需要去除敏感属性(消毒),以防止基于种族、性别和性取向的不同影响和歧视。我们通过实验表明,我们提出的算法在降低从大规模数据重建敏感属性的能力方面优于其他隐私保护技术20%以上。
{"title":"A privacy protection procedure for large scale individual level data","authors":"Julius Adebayo, Lalana Kagal","doi":"10.1109/ISI.2015.7165950","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165950","url":null,"abstract":"We present a transformation procedure for large scale individual level data that produces output data in which no linear combinations of the resulting attributes can yield the original sensitive attributes from the transformed data. In doing this, our procedure eliminates all linear information regarding a sensitive attribute from the input data. The algorithm combines principal components analysis of the data set with orthogonal projection onto the subspace containing the sensitive attribute(s). The algorithm presented is motivated by applications where there is a need to drastically `sanitize' a data set of all information relating to sensitive attribute(s) before analysis of the data using a data mining algorithm. Sensitive attribute removal (sanitization) is often needed to prevent disparate impact and discrimination on the basis of race, gender, and sexual orientation in high stakes contexts such as determination of access to loans, credit, employment, and insurance. We show through experiments that our proposed algorithm outperforms other privacy preserving techniques by more than 20 percent in lowering the ability to reconstruct sensitive attributes from large scale data.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130162259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Empirical assessment of al qaeda, ISIS, and taliban propaganda 对基地组织、ISIS和塔利班宣传的实证评估
Pub Date : 2015-01-07 DOI: 10.1109/ISI.2015.7165940
D. Skillicorn
The jihadist groups AQAP, ISIS, and the Taliban have all produced glossy English magazines designed to influence Western sympathizers. We examine these magazines empirically with respect to models of the intensity of informative, imaginative, deceptive, jihadist, and gamification language. This allows their success to be estimated and their similarities and differences to be exposed. We also develop and validate an empirical model of propaganda; according to this model Dabiq, ISIS's magazine ranks highest of the three.
阿拉伯半岛基地组织(AQAP)、伊斯兰国(ISIS)和塔利班(Taliban)等圣战组织都出版了精美的英文杂志,旨在影响西方的同情者。我们对这些杂志进行了实证研究,考察了信息性、想象力、欺骗性、圣战主义和游戏化语言的强度模型。这样就可以估计他们的成功,并暴露他们的异同。我们还开发并验证了宣传的经验模型;根据这个Dabiq模型,ISIS的杂志在三者中排名最高。
{"title":"Empirical assessment of al qaeda, ISIS, and taliban propaganda","authors":"D. Skillicorn","doi":"10.1109/ISI.2015.7165940","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165940","url":null,"abstract":"The jihadist groups AQAP, ISIS, and the Taliban have all produced glossy English magazines designed to influence Western sympathizers. We examine these magazines empirically with respect to models of the intensity of informative, imaginative, deceptive, jihadist, and gamification language. This allows their success to be estimated and their similarities and differences to be exposed. We also develop and validate an empirical model of propaganda; according to this model Dabiq, ISIS's magazine ranks highest of the three.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130154443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
期刊
2015 IEEE International Conference on Intelligence and Security Informatics (ISI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1