首页 > 最新文献

Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications最新文献

英文 中文
Security Protection with Dynamic Assigned Address Mechanism in Industrial Control Systems 基于动态地址分配机制的工业控制系统安全保护
Chuan-Gang Liu, Chin-Jui Wu, I. Liu, Chi-Che Wu, Jung-Shian Li
In recent years, industrial control systems (ICS) are widely used in many occasions, which makes information security of ICS an important issue. This study discusses the communication and management on ICS to make ICS intelligent. We proposed a method to avoid attack of communication, and elaborated the means of our proposed communication in which all communication parties communicate with each other without transmitting IP information. Moreover, as an intelligent ICS, the transmission module we design can detect anomaly in the system and change the transmission rule based on our algorithm, also known as a type of moving target defense. Therefore, we proposed the scheme to improve the transmission security in ICS. The experimental results also show that our scheme can be feasible in ICS.
近年来,工业控制系统被广泛应用于许多场合,使得工业控制系统的信息安全成为一个重要的问题。本文对工业控制系统的通信与管理进行了探讨,以实现工业控制系统的智能化。我们提出了一种避免通信攻击的方法,并详细阐述了我们所提出的通信方式,即通信各方在不传输IP信息的情况下相互通信。此外,我们设计的传输模块作为一种智能ICS,可以检测到系统中的异常,并根据我们的算法改变传输规则,这也被称为一种移动目标防御。因此,我们提出了提高ICS传输安全性的方案。实验结果表明,该方案在工业控制系统中是可行的。
{"title":"Security Protection with Dynamic Assigned Address Mechanism in Industrial Control Systems","authors":"Chuan-Gang Liu, Chin-Jui Wu, I. Liu, Chi-Che Wu, Jung-Shian Li","doi":"10.1145/3440943.3444716","DOIUrl":"https://doi.org/10.1145/3440943.3444716","url":null,"abstract":"In recent years, industrial control systems (ICS) are widely used in many occasions, which makes information security of ICS an important issue. This study discusses the communication and management on ICS to make ICS intelligent. We proposed a method to avoid attack of communication, and elaborated the means of our proposed communication in which all communication parties communicate with each other without transmitting IP information. Moreover, as an intelligent ICS, the transmission module we design can detect anomaly in the system and change the transmission rule based on our algorithm, also known as a type of moving target defense. Therefore, we proposed the scheme to improve the transmission security in ICS. The experimental results also show that our scheme can be feasible in ICS.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"s3-29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130122678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Understanding users' switching behavior of hypermarket marketing methods: An empirical study from the perspective of push-pull-mooring framework 理解大卖场营销方式的用户切换行为:推拉系泊框架视角下的实证研究
Chia-Wen Tsai, K. Chung
1The retail industry is changing as the latest concepts of retail stores came out. (Diallo et al., 2015), and the sort of retail store also become more extensively diversified (Shi et al., 2018). This diversification is a result of demand heterogeneity from diverse consumer groups (González-Benito et al., 2007).The selection of retail channels is one of the important decisions which consumers make when they purchase a product or service. How to select a retail channel involves the information searching of the product, evaluation of alternatives, and making a purchasing decision regarding the product (Ansari, Mela, & Neslin, 2008). Therefore, consumers will have complex purchasing behavior when selecting retail channels in order to consider the availability of various retail channels. Consumers may finish all purchase-related activities with one stop shopping or through multiple retail channels. This study makes analysis based on push-pull-mooring theory. People can understand the crucial factors which customers change their intentions in the retail industry from the perspective of push, pull, and mooring theory. This study is analyzed through spss 22 and smart PLS3.0, then it comes out the result of analysis that the payment risk will affect the intention conversion positively, costs conversion will influence intention conversion negatively, and Corporate Social Responsibility will also effect intention conversion negatively.
随着最新零售店概念的出现,零售业正在发生变化。(Diallo et al., 2015),零售商店的种类也变得更加多样化(Shi et al., 2018)。这种多样化是来自不同消费群体的需求异质性的结果(González-Benito等人,2007)。零售渠道的选择是消费者在购买产品或服务时做出的重要决策之一。如何选择零售渠道涉及产品的信息搜索,替代品的评估,并作出关于产品的购买决策(安萨里,梅拉,& Neslin, 2008)。因此,消费者在选择零售渠道时会考虑到各种零售渠道的可用性,从而产生复杂的购买行为。消费者可以通过一站式购物或多种零售渠道完成所有与购买相关的活动。本研究基于推拉系泊理论进行分析。人们可以从推、拉、系泊理论的角度来理解零售业中顾客改变意图的关键因素。本研究通过spss 22和smart PLS3.0进行分析,得出支付风险对意向转化有正向影响,成本转化对意向转化有负向影响,企业社会责任对意向转化有负向影响的分析结果。
{"title":"Understanding users' switching behavior of hypermarket marketing methods: An empirical study from the perspective of push-pull-mooring framework","authors":"Chia-Wen Tsai, K. Chung","doi":"10.1145/3440943.3444349","DOIUrl":"https://doi.org/10.1145/3440943.3444349","url":null,"abstract":"1The retail industry is changing as the latest concepts of retail stores came out. (Diallo et al., 2015), and the sort of retail store also become more extensively diversified (Shi et al., 2018). This diversification is a result of demand heterogeneity from diverse consumer groups (González-Benito et al., 2007).The selection of retail channels is one of the important decisions which consumers make when they purchase a product or service. How to select a retail channel involves the information searching of the product, evaluation of alternatives, and making a purchasing decision regarding the product (Ansari, Mela, & Neslin, 2008). Therefore, consumers will have complex purchasing behavior when selecting retail channels in order to consider the availability of various retail channels. Consumers may finish all purchase-related activities with one stop shopping or through multiple retail channels. This study makes analysis based on push-pull-mooring theory. People can understand the crucial factors which customers change their intentions in the retail industry from the perspective of push, pull, and mooring theory. This study is analyzed through spss 22 and smart PLS3.0, then it comes out the result of analysis that the payment risk will affect the intention conversion positively, costs conversion will influence intention conversion negatively, and Corporate Social Responsibility will also effect intention conversion negatively.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123813181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications 2020年ACM智能计算及其新兴应用国际会议论文集
{"title":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","authors":"","doi":"10.1145/3440943","DOIUrl":"https://doi.org/10.1145/3440943","url":null,"abstract":"","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125087553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on the Digital Forensic Method for Decentralized Web Service 分布式Web服务的数字取证方法研究
Hyunpyo Choi, Jiho Shin, Jung-Taek Seo
In recent years, various decentralized web services have emerged. Note, however, that websites that can be connected using decentralized web services are difficult to access through the use of general search engines. In this paper, ZeroNet, one of the decentralized web services, is analyzed to verify the information generated when used. The analyzed information is used in the digital forensic method to show an example of how to apply the method by presenting a scenario.
近年来,出现了各种分散的web服务。然而,请注意,可以使用分散的网络服务连接的网站很难通过使用一般搜索引擎访问。本文对去中心化web服务之一的ZeroNet进行分析,验证其在使用过程中产生的信息。在数字取证方法中使用所分析的信息,以通过呈现场景来展示如何应用该方法的示例。
{"title":"A Study on the Digital Forensic Method for Decentralized Web Service","authors":"Hyunpyo Choi, Jiho Shin, Jung-Taek Seo","doi":"10.1145/3440943.3444736","DOIUrl":"https://doi.org/10.1145/3440943.3444736","url":null,"abstract":"In recent years, various decentralized web services have emerged. Note, however, that websites that can be connected using decentralized web services are difficult to access through the use of general search engines. In this paper, ZeroNet, one of the decentralized web services, is analyzed to verify the information generated when used. The analyzed information is used in the digital forensic method to show an example of how to apply the method by presenting a scenario.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124359306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Implementation of IoT-based Smart Laboratory Management System 基于物联网的智能实验室管理系统的实现
Nan-Kai Hsieh, T. Kang, Tzer-Long Chen, Jhih-Chung Chang, M. Wang, Tzer-Shyong Chen, Yu-Fang Chung
With the coming of information age, the laboratory and the manufacture factory begins to import smart monitor system to enhance safety. The smart monitor system can save human costs. The information system can prevent unsafety event from happening. Smart Laboratory Administrator System was developed to cooperate with IoT (Internet of things) to prevent illegal invasion and achieve internal security. If unexpected events happen, it will work and switch on an alarm to prevent objects in the laboratory from being stolen. Hence, the Smart Laboratory Administrator System can save the human cost and enhance the security of laboratory.
随着信息时代的到来,实验室和制造工厂开始引进智能监控系统来提高安全性。智能监控系统可以节省人力成本。信息系统可以防止不安全事件的发生。开发智能实验室管理员系统,配合物联网,防止非法入侵,实现内部安全。如果发生意外事件,它会工作并打开警报,以防止实验室中的物品被盗。因此,智能实验室管理员系统可以节省人力成本,提高实验室的安全性。
{"title":"The Implementation of IoT-based Smart Laboratory Management System","authors":"Nan-Kai Hsieh, T. Kang, Tzer-Long Chen, Jhih-Chung Chang, M. Wang, Tzer-Shyong Chen, Yu-Fang Chung","doi":"10.1145/3440943.3442721","DOIUrl":"https://doi.org/10.1145/3440943.3442721","url":null,"abstract":"With the coming of information age, the laboratory and the manufacture factory begins to import smart monitor system to enhance safety. The smart monitor system can save human costs. The information system can prevent unsafety event from happening. Smart Laboratory Administrator System was developed to cooperate with IoT (Internet of things) to prevent illegal invasion and achieve internal security. If unexpected events happen, it will work and switch on an alarm to prevent objects in the laboratory from being stolen. Hence, the Smart Laboratory Administrator System can save the human cost and enhance the security of laboratory.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124071773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Development of UAV-based Air Quality Monitor System 基于无人机的空气质量监测系统的研制
Lie Yang, Shicheng Shao, Chien-Erh Weng, Yung-Cheng Yao
This paper proposes the development of real-time air quality monitor system based on unmanned aerial vehicle (UAV), which can effectively compensate for the lack of mobility and immediateness of air pollution monitoring operations. The system includes a detection sampling site and a ground receiving station, using wireless communication to performs data transmission and remote control. And the detection sampling terminal uses an unmanned aerial vehicle equipped with a microcontroller, volatile organic compounds, temperature and humidity sensing modules. The detection sampling terminal can detect air quality, and carries a gas sampling tank to collect air samples. The ground receiving station can remotely control the detection sampling terminal, display and record the received air data.
本文提出开发基于无人机的空气质量实时监测系统,可以有效弥补空气污染监测操作机动性和即时性的不足。该系统包括一个检测采样点和一个地面接收站,利用无线通信进行数据传输和远程控制。而检测采样终端采用的是搭载微控制器、挥发性有机物、温湿度传感模块的无人机。检测采样终端可以检测空气质量,并携带气体采样罐采集空气样本。地面接收站可以远程控制探测采样终端,显示并记录接收到的大气数据。
{"title":"The Development of UAV-based Air Quality Monitor System","authors":"Lie Yang, Shicheng Shao, Chien-Erh Weng, Yung-Cheng Yao","doi":"10.1145/3440943.3444350","DOIUrl":"https://doi.org/10.1145/3440943.3444350","url":null,"abstract":"This paper proposes the development of real-time air quality monitor system based on unmanned aerial vehicle (UAV), which can effectively compensate for the lack of mobility and immediateness of air pollution monitoring operations. The system includes a detection sampling site and a ground receiving station, using wireless communication to performs data transmission and remote control. And the detection sampling terminal uses an unmanned aerial vehicle equipped with a microcontroller, volatile organic compounds, temperature and humidity sensing modules. The detection sampling terminal can detect air quality, and carries a gas sampling tank to collect air samples. The ground receiving station can remotely control the detection sampling terminal, display and record the received air data.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121541201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault Injection Method for Hardware-implemented AES without Artificial Triggering 硬件实现AES无人工触发的故障注入方法
HanSeop Lim, Taeho Lee, Seong-Yong Lim, Jaeseong Han, Bo-Yeon Sim, Dong‐Guk Han
The theoretical process of fault injection attacks requires artificial triggering for target operation experimental easement. In real-world scenarios, artificial triggering depends on a powerful assumption, e.g., internal codes manipulating on the target device. Therefore, Lim et al. proposed a fault injection system that uses the I/O signals of target devices as a trigger to relax attacker assumptions. This system does not require the implementation of artificial triggering because input signals are used as a trigger in the transmission of plaintexts for fault injection attacks. The proposed fault injection system was applied in the experimental verification of an algorithm implemented in software; however, verification was not performed for a hardware-implemented algorithm. In this paper, we propose an eased triggering system that can also be used in hardware implemented algorithms. In the proposed system, Start/Done signals are used as a trigger. In addition, we propose an algorithm to analyze hardware-implemented AES, even if the fault injected range is widened.
故障注入攻击的理论过程需要人为触发以进行目标操作实验简化。在现实场景中,人工触发依赖于一个强大的假设,例如,目标设备上的内部代码操作。因此,Lim等人提出了一种故障注入系统,该系统使用目标设备的I/O信号作为触发器来放松攻击者的假设。该系统不需要实现人工触发,因为输入信号在传输明文时被用作触发故障注入攻击的触发器。将所提出的故障注入系统应用于软件实现算法的实验验证;但是,没有对硬件实现的算法执行验证。在本文中,我们提出了一个简单的触发系统,也可以用于硬件实现的算法。在建议的系统中,启动/完成信号用作触发器。此外,我们提出了一种算法来分析硬件实现的AES,即使故障注入范围扩大。
{"title":"Fault Injection Method for Hardware-implemented AES without Artificial Triggering","authors":"HanSeop Lim, Taeho Lee, Seong-Yong Lim, Jaeseong Han, Bo-Yeon Sim, Dong‐Guk Han","doi":"10.1145/3440943.3444739","DOIUrl":"https://doi.org/10.1145/3440943.3444739","url":null,"abstract":"The theoretical process of fault injection attacks requires artificial triggering for target operation experimental easement. In real-world scenarios, artificial triggering depends on a powerful assumption, e.g., internal codes manipulating on the target device. Therefore, Lim et al. proposed a fault injection system that uses the I/O signals of target devices as a trigger to relax attacker assumptions. This system does not require the implementation of artificial triggering because input signals are used as a trigger in the transmission of plaintexts for fault injection attacks. The proposed fault injection system was applied in the experimental verification of an algorithm implemented in software; however, verification was not performed for a hardware-implemented algorithm. In this paper, we propose an eased triggering system that can also be used in hardware implemented algorithms. In the proposed system, Start/Done signals are used as a trigger. In addition, we propose an algorithm to analyze hardware-implemented AES, even if the fault injected range is widened.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121570381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Understand the public insurance purchase orientation through the triangle theory of love 通过爱的三角理论来理解大众保险的购买取向
Ying-Chi Chen, K. Chung
1In today's Taiwanese society, all citizens must have national health insurance, which allows people across the country to not have to bear huge medical expenses when registering for medical treatment. An analysis of Taiwan's data over the past 10 years shows that a 1% increase in the previous period's CPI will result in a decrease of 3.2% to 4.4% in the next period of premium income. We also found that there is a considerable degree of positive correlation between the growth rate of premium income (both life insurance and property insurance) and the economic growth rate over the same period. The Baoxian industry has a great influence on our economic development. This research is analyzed through Smart PLS and SPSS. The results of the research show that the three components of this research show the complexity of the emotional boundary through the relationship-oriented service industry of the triangle of love transaction, which is reflected in the emotional structure. The research results show that the insurance industry will focus more on relationship marketing on the emotional side. In the insurance industry, the nature of customer sentiment towards companies is driven by commitment in the relationship-oriented service industry. This discovery can help insurance practitioners to reduce time and money losses in developing relationship marketing research.
在今天的台湾社会,所有公民都必须拥有全民健康保险,这使得全国人民在登记就医时不必承担巨额的医疗费用。对台湾过去10年数据的分析表明,上一期CPI每上涨1%,将导致下一期保费收入下降3.2%至4.4%。我们还发现,保费收入增长率(包括寿险和财产险)与同期经济增长率之间存在相当程度的正相关关系。宝县产业对我们的经济发展有很大的影响。本研究通过Smart PLS和SPSS进行分析。研究结果表明,本研究的三个组成部分通过恋爱三角交易的关系导向服务业显示了情感边界的复杂性,这种复杂性体现在情感结构上。研究结果表明,保险行业将更加注重情感方面的关系营销。在保险行业中,客户对公司的情感本质是由关系导向型服务行业的承诺驱动的。这一发现可以帮助保险从业者在开展关系营销研究时减少时间和金钱损失。
{"title":"Understand the public insurance purchase orientation through the triangle theory of love","authors":"Ying-Chi Chen, K. Chung","doi":"10.1145/3440943.3444348","DOIUrl":"https://doi.org/10.1145/3440943.3444348","url":null,"abstract":"1In today's Taiwanese society, all citizens must have national health insurance, which allows people across the country to not have to bear huge medical expenses when registering for medical treatment. An analysis of Taiwan's data over the past 10 years shows that a 1% increase in the previous period's CPI will result in a decrease of 3.2% to 4.4% in the next period of premium income. We also found that there is a considerable degree of positive correlation between the growth rate of premium income (both life insurance and property insurance) and the economic growth rate over the same period. The Baoxian industry has a great influence on our economic development. This research is analyzed through Smart PLS and SPSS. The results of the research show that the three components of this research show the complexity of the emotional boundary through the relationship-oriented service industry of the triangle of love transaction, which is reflected in the emotional structure. The research results show that the insurance industry will focus more on relationship marketing on the emotional side. In the insurance industry, the nature of customer sentiment towards companies is driven by commitment in the relationship-oriented service industry. This discovery can help insurance practitioners to reduce time and money losses in developing relationship marketing research.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121772811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Hybrid Cloud-based Cyber Threat Intelligence Sharing Model Requirements Analysis 基于混合云的网络威胁情报共享模型需求分析研究
Jae-Wook Heo, Yonas Engida Gebremariam, Hoonyong Park, Bonam Kim, I. You
Because of the phenomenal growth of internet connectivity and unceasing improvements over hardware and software technology, everything is connected without any boundaries creating the Internet of Things, which becomes part of cyberspace. As the volume of cyberspace is overgrowing, the attackers' capabilities and strategies to find new vulnerabilities are increasing too. In order to defend the attackers from stealing and poisoning critical information of cyberspace, it is crucial to implement Cyber Threat Intelligence (CTI). However, it is not a straightforward process to implement CTI for individuals and organizations because of the resource constraints such as time, capability, and cost. Hence, different stakeholders (individuals or organizations) can collaborate and create a CTI sharing platform to improve their security stances and other organizations. It is well-known that when connected devices are rapidly intensifying in IoT, the cyber threat to information will also rise. So, to own a reliable, scalable, and high-speed CTI sharing platform, the deployment model should be wisely studied. This research carefully analyzed different forms of CTI sharing deployment models: private cloud, public cloud, hybrid cloud, and on-premises. Finally, we suggest the hybrid cloud-based deployment model as a convenient solution for CTI sharing due to its desirable features such as scalability, security, reliability, and high speed.
由于互联网连接的惊人增长和硬件和软件技术的不断改进,一切都没有边界地连接在一起,形成了物联网,成为网络空间的一部分。随着网络空间的过度增长,攻击者寻找新漏洞的能力和策略也在增加。为了防止攻击者窃取和毒害网络空间的关键信息,实施网络威胁情报(CTI)至关重要。然而,由于时间、能力和成本等资源限制,为个人和组织实现CTI并不是一个简单的过程。因此,不同的利益相关者(个人或组织)可以协作并创建CTI共享平台,以改善他们和其他组织的安全状况。众所周知,当物联网中的连接设备迅速加强时,对信息的网络威胁也将上升。因此,为了拥有一个可靠的、可扩展的、高速的CTI共享平台,应该明智地研究部署模型。本研究仔细分析了CTI共享部署模型的不同形式:私有云、公共云、混合云和本地部署。最后,我们建议基于混合云的部署模型作为CTI共享的方便解决方案,因为它具有可扩展性、安全性、可靠性和高速等理想特性。
{"title":"Study on Hybrid Cloud-based Cyber Threat Intelligence Sharing Model Requirements Analysis","authors":"Jae-Wook Heo, Yonas Engida Gebremariam, Hoonyong Park, Bonam Kim, I. You","doi":"10.1145/3440943.3444737","DOIUrl":"https://doi.org/10.1145/3440943.3444737","url":null,"abstract":"Because of the phenomenal growth of internet connectivity and unceasing improvements over hardware and software technology, everything is connected without any boundaries creating the Internet of Things, which becomes part of cyberspace. As the volume of cyberspace is overgrowing, the attackers' capabilities and strategies to find new vulnerabilities are increasing too. In order to defend the attackers from stealing and poisoning critical information of cyberspace, it is crucial to implement Cyber Threat Intelligence (CTI). However, it is not a straightforward process to implement CTI for individuals and organizations because of the resource constraints such as time, capability, and cost. Hence, different stakeholders (individuals or organizations) can collaborate and create a CTI sharing platform to improve their security stances and other organizations. It is well-known that when connected devices are rapidly intensifying in IoT, the cyber threat to information will also rise. So, to own a reliable, scalable, and high-speed CTI sharing platform, the deployment model should be wisely studied. This research carefully analyzed different forms of CTI sharing deployment models: private cloud, public cloud, hybrid cloud, and on-premises. Finally, we suggest the hybrid cloud-based deployment model as a convenient solution for CTI sharing due to its desirable features such as scalability, security, reliability, and high speed.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125928032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Developing a Model to Explore Consumer Buying Behaviors through Long Short-Term Memory 建立一个通过长短期记忆探索消费者购买行为的模型
Yueh-Shiu Lee, I-Yun Chen, Tsung-Yao Lin, Yen-Chiao Chuang, Hsu-Jung Liu
1This article aspires to develop a model to explore consumer buying behaviors through Long Short-Term Memory (LSTM); from building a marketing system and integrating online and offline information, marketers can employ diverse approaches to execute their marketing strategies and attract more customers for improving the overall sales.
本文试图建立一个通过长短期记忆(LSTM)来探索消费者购买行为的模型;营销人员可以通过建立营销体系,整合线上线下信息,采用多种方式来执行营销策略,吸引更多的客户,从而提高整体销售额。
{"title":"Developing a Model to Explore Consumer Buying Behaviors through Long Short-Term Memory","authors":"Yueh-Shiu Lee, I-Yun Chen, Tsung-Yao Lin, Yen-Chiao Chuang, Hsu-Jung Liu","doi":"10.1145/3440943.3444748","DOIUrl":"https://doi.org/10.1145/3440943.3444748","url":null,"abstract":"1This article aspires to develop a model to explore consumer buying behaviors through Long Short-Term Memory (LSTM); from building a marketing system and integrating online and offline information, marketers can employ diverse approaches to execute their marketing strategies and attract more customers for improving the overall sales.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127209689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1