首页 > 最新文献

2020 22nd International Conference on Advanced Communication Technology (ICACT)最新文献

英文 中文
Hacking Tool Identification in Penetration Testing 渗透测试中的黑客工具识别
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061401
Da-Yu Kao, Yun-Ya Chen, Fuching Tsai
With the rapid development of information technology, cybercrimes are getting increasingly rampant. The popularity of various toolkits facilitates the cyber-attackers to intrude on online systems and access the vast streams of sensitive data. Prevention is better than cure. Penetration testing (PT) not only defends the illegal attacks but also identify potential vulnerabilities. It is capable of distinguishing network traffic on the massive amount of collected data from the following three phases: data reduction, data analysis, and data classification. This paper analyzes the PT network traffic and observes their tool marks.
随着信息技术的快速发展,网络犯罪日益猖獗。各种工具包的流行为网络攻击者入侵在线系统和访问大量敏感数据提供了便利。预防胜于治疗。渗透测试(PT)不仅可以防御非法攻击,还可以识别潜在的漏洞。它能够从数据约简、数据分析和数据分类三个阶段对大量的采集数据进行网络流量识别。本文对PT网络流量进行了分析,并对其工具标记进行了观察。
{"title":"Hacking Tool Identification in Penetration Testing","authors":"Da-Yu Kao, Yun-Ya Chen, Fuching Tsai","doi":"10.23919/ICACT48636.2020.9061401","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061401","url":null,"abstract":"With the rapid development of information technology, cybercrimes are getting increasingly rampant. The popularity of various toolkits facilitates the cyber-attackers to intrude on online systems and access the vast streams of sensitive data. Prevention is better than cure. Penetration testing (PT) not only defends the illegal attacks but also identify potential vulnerabilities. It is capable of distinguishing network traffic on the massive amount of collected data from the following three phases: data reduction, data analysis, and data classification. This paper analyzes the PT network traffic and observes their tool marks.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"415 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122858649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Electricity Theft Detection Using Deep Bidirectional Recurrent Neural Network 基于深度双向递归神经网络的窃电检测
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061565
Zhongtao Chen, De Meng, Yufan Zhang, Tinglin Xin, Ding Xiao
Electricity theft causes significant harm to social and economic development. In the past few years, it has attracted much attention that electricity theft detection based on electricity consumption data can help to solve this problem. A major challenge is that there are no explicit features in electricity consumption records. However, the existing machine learning-based detection methods mainly suffer from the following two disadvantages. (1) Handcrafted features and shallow-architecture classifiers have poor detection accuracy. (2) Most methods consider electricity consumption as static and cannot capture both the internal time-series natures and external influence factors well. To overcome the above shortcomings, we propose a novel method called Electricity Theft Detection using Deep Bidirectional Recurrent Neural Network (ETD-DBRNN), which can capture the internal characteristics and the external correlation by learning the electricity consumption records and influence factors representation. Experiments on real-world datasets validate the effectiveness of our method.
窃电对社会经济发展造成重大危害。在过去的几年里,基于用电数据的窃电检测可以帮助解决这一问题,引起了人们的广泛关注。一个主要的挑战是在电力消耗记录中没有明确的特征。然而,现有的基于机器学习的检测方法主要存在以下两个缺点。(1)手工特征和浅结构分类器检测精度较差。(2)大多数方法将用电量视为静态的,不能很好地捕捉内部时间序列性质和外部影响因素。为了克服上述缺点,我们提出了一种基于深度双向递归神经网络(ETD-DBRNN)的窃电检测方法,该方法通过学习电力消耗记录和影响因素表示来捕获内部特征和外部相关性。在真实数据集上的实验验证了我们方法的有效性。
{"title":"Electricity Theft Detection Using Deep Bidirectional Recurrent Neural Network","authors":"Zhongtao Chen, De Meng, Yufan Zhang, Tinglin Xin, Ding Xiao","doi":"10.23919/ICACT48636.2020.9061565","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061565","url":null,"abstract":"Electricity theft causes significant harm to social and economic development. In the past few years, it has attracted much attention that electricity theft detection based on electricity consumption data can help to solve this problem. A major challenge is that there are no explicit features in electricity consumption records. However, the existing machine learning-based detection methods mainly suffer from the following two disadvantages. (1) Handcrafted features and shallow-architecture classifiers have poor detection accuracy. (2) Most methods consider electricity consumption as static and cannot capture both the internal time-series natures and external influence factors well. To overcome the above shortcomings, we propose a novel method called Electricity Theft Detection using Deep Bidirectional Recurrent Neural Network (ETD-DBRNN), which can capture the internal characteristics and the external correlation by learning the electricity consumption records and influence factors representation. Experiments on real-world datasets validate the effectiveness of our method.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123448627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Implementation of web application based on Augmentative and Alternative Communication (AAC) method for People with Hearing and Speech Impairment 听觉及言语障碍者基于辅助及替代沟通(AAC)方法的web应用程序的实现
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061515
Khasanboy Kodirov, Khusanboy Kodirov, Young Sil Lee
One of the most important things that humans need in their life is communication. Communication helps to spread knowledge, information and different forms of relationships between people. Unfortunately, millions of people around the world are unable to enjoy this blessing. With this in mind, the number of communication devices, applications, systems, strategies and tools that replace or support natural speech is increasing rapidly. This paper describes an AAC software we developed that helps both disabled children and adults to communicate easily with other people especially in office work, school or social gatherings. To use this software, users should input a sentence and it will converted to audio speech using built-in voices for male or female. In addition to that, it can convert voice that received by microphone into text and display it on the screen for deaf people to read.
人类生活中最重要的事情之一就是交流。沟通有助于传播知识、信息和人与人之间不同形式的关系。不幸的是,世界上数以百万计的人无法享受这一祝福。考虑到这一点,取代或支持自然语音的通信设备、应用程序、系统、策略和工具的数量正在迅速增加。本文介绍了我们开发的AAC软件,它可以帮助残疾儿童和成人轻松地与他人交流,特别是在办公室工作,学校或社交聚会中。要使用这款软件,用户应该输入一个句子,它将转换为音频语音,使用内置的男性或女性语音。除此之外,它还可以将麦克风接收到的声音转换成文字显示在屏幕上,供聋哑人阅读。
{"title":"Implementation of web application based on Augmentative and Alternative Communication (AAC) method for People with Hearing and Speech Impairment","authors":"Khasanboy Kodirov, Khusanboy Kodirov, Young Sil Lee","doi":"10.23919/ICACT48636.2020.9061515","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061515","url":null,"abstract":"One of the most important things that humans need in their life is communication. Communication helps to spread knowledge, information and different forms of relationships between people. Unfortunately, millions of people around the world are unable to enjoy this blessing. With this in mind, the number of communication devices, applications, systems, strategies and tools that replace or support natural speech is increasing rapidly. This paper describes an AAC software we developed that helps both disabled children and adults to communicate easily with other people especially in office work, school or social gatherings. To use this software, users should input a sentence and it will converted to audio speech using built-in voices for male or female. In addition to that, it can convert voice that received by microphone into text and display it on the screen for deaf people to read.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123553265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IoT and Modern Marketing: Its Social Implications 物联网与现代营销:其社会影响
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061210
Anooksha Yogesh Rathod, Shubham Pandya, Nishant Doshi
The advent of the Internet of Things and digital marketing has changed the way businesses operate and their interactions with consumers. The digital economy has percolated a wide range of industries and smartphones have ingrained into the consumer's lifestyle. The demand for customized services and goods has increased. However, this leaves the consumers' privacy at stake. Current researches have been conducted on IoT and its security threats, its utility in specific retail space for customer marketing. This kind of research has been limited to certain industries and marketing paradigms. A need to summarize IoT and the marketing potential it offers and the social impact this has on consumer behavior is a research gap we aim to address. The current paper's primary purpose is to reflect upon the concept of marketing 4.0 and the fact that the ever-increasing number of IoT devices are connected and transmitting enormous personal data regularly, to determine a person's personality traits and influence their decisions. Further IoT related ethical marketing strategies are outlined.
物联网和数字营销的出现改变了企业的运营方式以及与消费者的互动。数字经济已经渗透到各行各业,智能手机已经深入到消费者的生活方式中。对定制服务和商品的需求有所增加。然而,这使得消费者的隐私处于危险之中。目前的研究已经进行了物联网及其安全威胁,它在特定零售空间的客户营销的效用。这类研究仅限于某些行业和营销模式。总结物联网及其提供的营销潜力及其对消费者行为的社会影响是我们旨在解决的研究缺口。本文的主要目的是反思营销4.0的概念,以及越来越多的物联网设备连接并定期传输大量个人数据的事实,以确定一个人的个性特征并影响他们的决策。进一步概述了与物联网相关的道德营销策略。
{"title":"IoT and Modern Marketing: Its Social Implications","authors":"Anooksha Yogesh Rathod, Shubham Pandya, Nishant Doshi","doi":"10.23919/ICACT48636.2020.9061210","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061210","url":null,"abstract":"The advent of the Internet of Things and digital marketing has changed the way businesses operate and their interactions with consumers. The digital economy has percolated a wide range of industries and smartphones have ingrained into the consumer's lifestyle. The demand for customized services and goods has increased. However, this leaves the consumers' privacy at stake. Current researches have been conducted on IoT and its security threats, its utility in specific retail space for customer marketing. This kind of research has been limited to certain industries and marketing paradigms. A need to summarize IoT and the marketing potential it offers and the social impact this has on consumer behavior is a research gap we aim to address. The current paper's primary purpose is to reflect upon the concept of marketing 4.0 and the fact that the ever-increasing number of IoT devices are connected and transmitting enormous personal data regularly, to determine a person's personality traits and influence their decisions. Further IoT related ethical marketing strategies are outlined.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128524020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Hybrid Blockchain-based Unification ID in Smart Environment 智能环境下基于混合区块链的统一ID
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061430
Nakhoon Choi, Heeyoul Kim
Recently, with the increase of smart factories, smart cities, and the 4th industrial revolution, internal user authentication is emerging as an important issue. The existing user authentication and Access Control architecture can use the centralized system to forge access history by the service manager, which can cause problems such as evasion of responsibility and internal corruption. In addition, the user must independently manage the ID or physical authentication medium for authentication of each service, it is difficult to manage the subscribed services. This paper proposes a Hybrid blockchain-based integrated ID model to solve the above problems. The user creates authentication information based on the electronic signature of the Ethereum Account, a public blockchain, and provides authentication to a service provider composed of a Hyperledger Fabric, a private blockchain. The service provider ensures the integrity of the information by recording the Access History and authentication information in the Internal-Ledger. Through the proposed architecture, we can integrate the physical pass or application for user authentication and authorization into one Unification ID. Service providers can prevent non-Repudiation of responsibility by recording their authority and access history in ledger.
近年来,随着智能工厂、智慧城市和第四次工业革命的兴起,内部用户认证成为一个重要问题。现有的用户认证和访问控制体系结构可以利用集中式系统伪造访问历史记录,从而导致服务管理人员逃避责任和内部腐败等问题。此外,用户必须独立管理每个服务的ID或物理认证介质进行认证,难以管理订阅的服务。本文提出了一种基于混合区块链的集成ID模型来解决上述问题。用户基于以太坊账户(一个公共区块链)的电子签名创建身份验证信息,并向由超级账本结构(一个私有区块链)组成的服务提供商提供身份验证。服务提供商通过在内部账本中记录访问历史和认证信息来确保信息的完整性。通过提出的体系结构,我们可以将用于用户身份验证和授权的物理通行证或应用程序集成到一个统一ID中。服务提供者可以通过在分类账中记录其权限和访问历史来防止不可抵赖责任。
{"title":"Hybrid Blockchain-based Unification ID in Smart Environment","authors":"Nakhoon Choi, Heeyoul Kim","doi":"10.23919/ICACT48636.2020.9061430","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061430","url":null,"abstract":"Recently, with the increase of smart factories, smart cities, and the 4th industrial revolution, internal user authentication is emerging as an important issue. The existing user authentication and Access Control architecture can use the centralized system to forge access history by the service manager, which can cause problems such as evasion of responsibility and internal corruption. In addition, the user must independently manage the ID or physical authentication medium for authentication of each service, it is difficult to manage the subscribed services. This paper proposes a Hybrid blockchain-based integrated ID model to solve the above problems. The user creates authentication information based on the electronic signature of the Ethereum Account, a public blockchain, and provides authentication to a service provider composed of a Hyperledger Fabric, a private blockchain. The service provider ensures the integrity of the information by recording the Access History and authentication information in the Internal-Ledger. Through the proposed architecture, we can integrate the physical pass or application for user authentication and authorization into one Unification ID. Service providers can prevent non-Repudiation of responsibility by recording their authority and access history in ledger.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127303882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Robust Semantic Segmentation for Street Fashion Photos 街头时尚照片鲁棒语义分割
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061408
Anh H. Dang, W. Kameyama
In this paper, we aim to produce the state-of-the-art semantic segmentation for street fashion photos with three contributions. Firstly, we propose a high-performance semantic segmentation network that follows the encoder-decoder structure. Secondly, we propose a guided training process using multiple auxiliary losses. And thirdly, the 2D max-pooling-based scaling operation to produce segmentation feature maps for the aforementioned guided training process. We also propose mIoU+ metric taking noise into account for better evaluation. Evaluations with the ModaNet data set show that the proposed network achieves high benchmark results with less computational cost compared to ever-proposed methods.
在本文中,我们的目标是产生最先进的街头时尚照片的语义分割有三个贡献。首先,我们提出了一个遵循编码器-解码器结构的高性能语义分割网络。其次,我们提出了一个使用多个辅助损失的引导训练过程。第三,基于二维最大池的缩放操作生成分割特征映射,用于前面提到的引导训练过程。我们还提出了考虑噪声的mIoU+度量,以便更好地进行评估。使用ModaNet数据集进行的评估表明,与已有的方法相比,所提出的网络以更少的计算成本获得了较高的基准测试结果。
{"title":"Robust Semantic Segmentation for Street Fashion Photos","authors":"Anh H. Dang, W. Kameyama","doi":"10.23919/ICACT48636.2020.9061408","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061408","url":null,"abstract":"In this paper, we aim to produce the state-of-the-art semantic segmentation for street fashion photos with three contributions. Firstly, we propose a high-performance semantic segmentation network that follows the encoder-decoder structure. Secondly, we propose a guided training process using multiple auxiliary losses. And thirdly, the 2D max-pooling-based scaling operation to produce segmentation feature maps for the aforementioned guided training process. We also propose mIoU+ metric taking noise into account for better evaluation. Evaluations with the ModaNet data set show that the proposed network achieves high benchmark results with less computational cost compared to ever-proposed methods.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116829594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evasion Attack in Show and Tell Model 展示和讲述模式中的闪避攻击
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061558
Dongseop Lee, Hyunjin Kim, Jaecheol Ryou
Recently, deep learning technology has been applied to various fields with high performance and various services. Image recognition is also used in various fields with high performance by incorporating deep learning technology. However, deep learning technology is vulnerable to evasion attacks that cause the model to be misclassified by modulating the original image. In this paper, we generate an adversarial example using the forward-backward-splitting iterative procedure. Then perform an evasion attack on the show and tell model.
近年来,深度学习技术以高性能和多种服务被应用于各个领域。通过结合深度学习技术,图像识别也被用于各种高性能领域。然而,深度学习技术很容易受到逃避攻击,这种攻击会导致模型通过调制原始图像而被错误分类。在本文中,我们使用前向后分裂迭代过程生成一个对抗示例。然后对秀秀模特进行闪避攻击。
{"title":"Evasion Attack in Show and Tell Model","authors":"Dongseop Lee, Hyunjin Kim, Jaecheol Ryou","doi":"10.23919/ICACT48636.2020.9061558","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061558","url":null,"abstract":"Recently, deep learning technology has been applied to various fields with high performance and various services. Image recognition is also used in various fields with high performance by incorporating deep learning technology. However, deep learning technology is vulnerable to evasion attacks that cause the model to be misclassified by modulating the original image. In this paper, we generate an adversarial example using the forward-backward-splitting iterative procedure. Then perform an evasion attack on the show and tell model.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114926707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of software weakness detection of CBMC based on CWE 基于CWE的CBMC软件漏洞检测分析
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061281
Minjae Byun, Yongjun Lee, Jin-Young Choi
Model checking is a method of verifying whether a target system satisfies a specific property using mathematical and logical proofs. Model checking tools to verify design (1) require a formal description of the design and (2) there can be discrepancies between the model and actual implementation. To solve these problems, various tools such as CBMC and BLAST that can directly input C codes have been proposed. However, in terms of security, it is difficult to figure out which software weaknesses these tools can verify. In this paper, we matched the properties that CBMC can verify with corresponding CWEs, considering interdependencies of CWEs. We also conducted an experiment using Juliet Test Suite to check CBMC can actually verify the codes including these CWEs.
模型检验是一种利用数学和逻辑证明验证目标系统是否满足特定属性的方法。验证设计的模型检查工具(1)需要对设计进行正式描述,(2)模型和实际实现之间可能存在差异。为了解决这些问题,人们提出了各种可以直接输入C代码的工具,如CBMC、BLAST等。然而,就安全性而言,很难确定这些工具可以验证哪些软件弱点。在本文中,我们将CBMC可以验证的属性与相应的CWEs进行匹配,考虑到CWEs之间的相互依赖性。我们还使用Juliet Test Suite进行了一个实验,以检查CBMC是否可以实际验证包含这些CWEs的代码。
{"title":"Analysis of software weakness detection of CBMC based on CWE","authors":"Minjae Byun, Yongjun Lee, Jin-Young Choi","doi":"10.23919/ICACT48636.2020.9061281","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061281","url":null,"abstract":"Model checking is a method of verifying whether a target system satisfies a specific property using mathematical and logical proofs. Model checking tools to verify design (1) require a formal description of the design and (2) there can be discrepancies between the model and actual implementation. To solve these problems, various tools such as CBMC and BLAST that can directly input C codes have been proposed. However, in terms of security, it is difficult to figure out which software weaknesses these tools can verify. In this paper, we matched the properties that CBMC can verify with corresponding CWEs, considering interdependencies of CWEs. We also conducted an experiment using Juliet Test Suite to check CBMC can actually verify the codes including these CWEs.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131099893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Tool Mark Identification of Skype Traffic 工具标记识别Skype流量
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061405
Da-Yu Kao, Fang-Yu Lu, Fuching Tsai
Law enforcement agencies (LEAs) face a challenging problem to detect the tool marks of Skype traffic. Analyzing digital packets is an essential job in digital forensics. This study collects these packets, traces their routings, analyzes the relevant information, and explores the tool mark identification of Skype packets. It uses experimental data on a personal computer, investigates the characteristics of Skype traffic, and provides a tool mark analysis of network traffic. The study can assist the investigator in identifying the suspect using a Skype communication application to commit the crime.
执法机构(LEAs)面临着一个具有挑战性的问题,以检测Skype流量的工具标记。分析数字数据包是数字取证中的一项重要工作。本研究收集这些数据包,跟踪其路由,分析相关信息,并探讨Skype数据包的工具标记识别。利用个人计算机上的实验数据,研究了Skype流量的特点,并提供了一个网络流量分析工具标记。该研究可以帮助调查人员识别使用Skype通信应用程序实施犯罪的嫌疑人。
{"title":"Tool Mark Identification of Skype Traffic","authors":"Da-Yu Kao, Fang-Yu Lu, Fuching Tsai","doi":"10.23919/ICACT48636.2020.9061405","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061405","url":null,"abstract":"Law enforcement agencies (LEAs) face a challenging problem to detect the tool marks of Skype traffic. Analyzing digital packets is an essential job in digital forensics. This study collects these packets, traces their routings, analyzes the relevant information, and explores the tool mark identification of Skype packets. It uses experimental data on a personal computer, investigates the characteristics of Skype traffic, and provides a tool mark analysis of network traffic. The study can assist the investigator in identifying the suspect using a Skype communication application to commit the crime.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130614053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Day-Ahead Electricity Market State-Space Model and Its Power Production, Demand and Price Forecasting Algorithm Using H-infinity Filter 日前电力市场状态空间模型及其基于h∞滤波器的产、需、价预测算法
Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061388
M. Rana, A. Abdelhadi
Development of an electricity market model is very important step of forecasting power of generators and client demand. This paper proposes a day-ahead state-space power system model which is obtained by a set of partial differential equations. After simplifications, the 4th order user-friendly state-space power system model is obtained where the measurements are obtained by a set of sensors. Secondly, we proposed an H-infinity based power system states forecasting algorithm where process and measurement noise covariances are not need to know. In each iteration, the residual error between true and forecasted states are minimised lead to an accurate forecasted system states. Numerical simulation illustrates that the proposed scheme can able to forecast the system states within 1–12 seconds.
电力市场模型的建立是预测发电机组功率和用户需求的重要步骤。本文提出了一种由一组偏微分方程得到的日前状态空间电力系统模型。经过简化,得到四阶用户友好的状态空间电力系统模型,其中测量由一组传感器获得。其次,提出了一种不需要知道过程噪声和测量噪声协方差的基于h∞的电力系统状态预测算法。在每次迭代中,将真实状态与预测状态之间的残差最小化,从而得到准确的预测系统状态。数值仿真结果表明,该方法能够在1 ~ 12秒内预测系统状态。
{"title":"Day-Ahead Electricity Market State-Space Model and Its Power Production, Demand and Price Forecasting Algorithm Using H-infinity Filter","authors":"M. Rana, A. Abdelhadi","doi":"10.23919/ICACT48636.2020.9061388","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061388","url":null,"abstract":"Development of an electricity market model is very important step of forecasting power of generators and client demand. This paper proposes a day-ahead state-space power system model which is obtained by a set of partial differential equations. After simplifications, the 4th order user-friendly state-space power system model is obtained where the measurements are obtained by a set of sensors. Secondly, we proposed an H-infinity based power system states forecasting algorithm where process and measurement noise covariances are not need to know. In each iteration, the residual error between true and forecasted states are minimised lead to an accurate forecasted system states. Numerical simulation illustrates that the proposed scheme can able to forecast the system states within 1–12 seconds.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129123660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 22nd International Conference on Advanced Communication Technology (ICACT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1