首页 > 最新文献

2019 International Arab Conference on Information Technology (ACIT)最新文献

英文 中文
Secure Data Quiry Using Unique Hash Indexing Utilizing MAC Address in a Remote Data Storage 基于MAC地址的远程数据存储唯一哈希索引安全查询
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991119
K. Kaabneh, Rakan Alhwaidi
Data privacy and protection is the hottest topic in cloud computing-based systems. Cloud based systems users keen on finding a way to ensure the security of information and maintaining privacy using remote document search to eliminate the need to retrieve data from the cloud. In this paper, we propose a novel model to provide a unique index using SHA-256 Hashing and to utilize the uniqueness of MAC address to produce a unique MAC-HASH with no collision and minimal processing time. The results has been proven to be irreversible and give a unique value for each user and lies in dispersing infiltrators of data and the hacker would have no access to the original data. Therefore, the files will be blind searched and the cloud administrator and the hacker would have no knowledge of your search.
数据隐私和保护是基于云计算的系统中最热门的话题。基于云的系统用户热衷于寻找一种方法来确保信息的安全性,并使用远程文档搜索来维护隐私,以消除从云中检索数据的需要。在本文中,我们提出了一个使用SHA-256哈希提供唯一索引的新模型,并利用MAC地址的唯一性来产生唯一的MAC- hash,无冲突,处理时间最短。结果被证明是不可逆的,对每个用户都有独特的价值,它分散了数据的渗透者,黑客无法访问原始数据。因此,文件将被盲目搜索,云管理员和黑客将不知道您的搜索。
{"title":"Secure Data Quiry Using Unique Hash Indexing Utilizing MAC Address in a Remote Data Storage","authors":"K. Kaabneh, Rakan Alhwaidi","doi":"10.1109/ACIT47987.2019.8991119","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991119","url":null,"abstract":"Data privacy and protection is the hottest topic in cloud computing-based systems. Cloud based systems users keen on finding a way to ensure the security of information and maintaining privacy using remote document search to eliminate the need to retrieve data from the cloud. In this paper, we propose a novel model to provide a unique index using SHA-256 Hashing and to utilize the uniqueness of MAC address to produce a unique MAC-HASH with no collision and minimal processing time. The results has been proven to be irreversible and give a unique value for each user and lies in dispersing infiltrators of data and the hacker would have no access to the original data. Therefore, the files will be blind searched and the cloud administrator and the hacker would have no knowledge of your search.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127732392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Model-Oriented Requirements Traceability Framework for Small and Medium Software Industries 面向模型的中小型软件行业需求跟踪框架
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991116
Gullelala Jadoon, M. Shafi, Sadaqat Jan
The Capability Maturity Model Integration (CMMI) has been a proficient approach to judge the maturity level of any software development business. For all software companies, it is very essential to develop standardize software systems for the characteristics essential for that maturity stage. The revolution in the software industry has brought advancement from programming-oriented development to model-oriented approach. Presently Model-Driven Development is turning into a rising method for creating software solutions most effectively. At Managed, which is the second level of CMMI, we need to keep up the bi-directional trace of the meta-models for better administration of user demands. Keeping up a bi-directional trace in such systems is very difficult for engineers, particularly during the assessment and upgrading stages. In this research, we have foreseen a model-based trace model and assessed its presentation dependent on currently used methodologies. This procedure will give a premise to software designers and scientists to propose progressively productive strategies for trace management in model-based systems for organizations.
能力成熟度模型集成(CMMI)已经成为判断任何软件开发业务成熟度级别的一种熟练方法。对于所有的软件公司来说,为成熟阶段所必需的特征开发标准化的软件系统是非常重要的。软件工业的革命带来了从面向编程的开发到面向模型的方法的进步。目前,模型驱动开发正在成为最有效地创建软件解决方案的一种新兴方法。在Managed,这是CMMI的第二层,我们需要保持元模型的双向跟踪,以便更好地管理用户需求。对于工程师来说,在这种系统中保持双向跟踪是非常困难的,特别是在评估和升级阶段。在这项研究中,我们已经预见了一个基于模型的跟踪模型,并根据当前使用的方法评估了它的表现。这一过程将为软件设计师和科学家提供一个前提,为组织基于模型的系统中的跟踪管理提出逐步生产的策略。
{"title":"A Model-Oriented Requirements Traceability Framework for Small and Medium Software Industries","authors":"Gullelala Jadoon, M. Shafi, Sadaqat Jan","doi":"10.1109/ACIT47987.2019.8991116","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991116","url":null,"abstract":"The Capability Maturity Model Integration (CMMI) has been a proficient approach to judge the maturity level of any software development business. For all software companies, it is very essential to develop standardize software systems for the characteristics essential for that maturity stage. The revolution in the software industry has brought advancement from programming-oriented development to model-oriented approach. Presently Model-Driven Development is turning into a rising method for creating software solutions most effectively. At Managed, which is the second level of CMMI, we need to keep up the bi-directional trace of the meta-models for better administration of user demands. Keeping up a bi-directional trace in such systems is very difficult for engineers, particularly during the assessment and upgrading stages. In this research, we have foreseen a model-based trace model and assessed its presentation dependent on currently used methodologies. This procedure will give a premise to software designers and scientists to propose progressively productive strategies for trace management in model-based systems for organizations.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120953677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Meta-strategy for Multi-issue Negotiation 多议题协商的元策略
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991030
Safeyah Tawil, Khalid Mansour, Yaser A. Al-Lahham
Automated negotiation is a process where multiple software agents interact with each other over certain matters through making offers and counteroffers. This paper considers a buyer agent negotiating with a seller agent over multiple issues. A meta-negotiation strategy is proposed to improve the negotiation process outcomes. The presented negotiation strategy is a cooperative negotiation one that uses both, preference-based and fuzzy similarity mechanisms. The preference-based mechanism is used for generating quantitative offers while the fuzzy similarity is used for in the process of generating qualitative offers. The preference-based mechanism considers the preferences of the opponent when making offers; the agent makes more concessions on the negotiation issues that are believed to be more preferred to the opponent. In the fuzzy similarity approach, the agent formulates an offer that is believed to be most similar to the one received from the opponent in the last negotiation round. The experimental results show that the proposed cooperative negotiation strategy outperforms the basic negotiation strategy in all the evaluation criteria such as utility, agreement rate and Nash product.
自动谈判是一个过程,多个软件代理通过提供和还价在某些事项上相互交互。本文考虑一个买方代理与卖方代理就多个问题进行谈判。提出了一种元协商策略来改善协商过程的结果。所提出的协商策略是一种同时使用基于偏好和模糊相似机制的合作协商策略。定量报价采用基于偏好的机制,定性报价采用模糊相似度机制。基于偏好的机制在发牌时考虑对手的偏好;代理商在谈判问题上做出更多让步,被认为对对手更有利。在模糊相似法中,agent制定一个被认为与对手在最后一轮谈判中收到的报价最相似的报价。实验结果表明,所提出的合作协商策略在效用、协议率和纳什产品等评价指标上均优于基本协商策略。
{"title":"A Meta-strategy for Multi-issue Negotiation","authors":"Safeyah Tawil, Khalid Mansour, Yaser A. Al-Lahham","doi":"10.1109/ACIT47987.2019.8991030","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991030","url":null,"abstract":"Automated negotiation is a process where multiple software agents interact with each other over certain matters through making offers and counteroffers. This paper considers a buyer agent negotiating with a seller agent over multiple issues. A meta-negotiation strategy is proposed to improve the negotiation process outcomes. The presented negotiation strategy is a cooperative negotiation one that uses both, preference-based and fuzzy similarity mechanisms. The preference-based mechanism is used for generating quantitative offers while the fuzzy similarity is used for in the process of generating qualitative offers. The preference-based mechanism considers the preferences of the opponent when making offers; the agent makes more concessions on the negotiation issues that are believed to be more preferred to the opponent. In the fuzzy similarity approach, the agent formulates an offer that is believed to be most similar to the one received from the opponent in the last negotiation round. The experimental results show that the proposed cooperative negotiation strategy outperforms the basic negotiation strategy in all the evaluation criteria such as utility, agreement rate and Nash product.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131147780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Loan Default Prediction Model Improvement through Comprehensive Preprocessing and Features Selection 通过综合预处理和特征选择改进贷款违约预测模型
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991084
Ahmad Al-qerem, Ghazi Al-Naymat, M. Alhasan
For financial institutions and the banking industry, it is very crucial to have predictive models for their financial activities, as they play a major role in risk management. Predicting loan default is one of the critical issues that they focus on, as huge revenue loss could be prevented by predicting customer’s ability to pay back on time. In this paper, different classification methods (Naïve Bayes, Decision Tree, and Random Forest) are being used for prediction, comprehensive different pre-processing techniques are being applied on the dataset, and three different feature extractions algorithms are used to enhance the accuracy and the performance. Results are compared using F1 accuracy measure, and an improvement of over 3% has been obtained.
对于金融机构和银行业来说,金融活动的预测模型是非常重要的,因为它们在风险管理中起着重要作用。预测贷款违约是他们关注的关键问题之一,因为通过预测客户按时还款的能力可以防止巨大的收入损失。本文使用不同的分类方法(Naïve贝叶斯、决策树和随机森林)进行预测,在数据集上应用了综合的不同预处理技术,并使用了三种不同的特征提取算法来提高准确性和性能。结果与F1精度测量结果进行了比较,得到了3%以上的改进。
{"title":"Loan Default Prediction Model Improvement through Comprehensive Preprocessing and Features Selection","authors":"Ahmad Al-qerem, Ghazi Al-Naymat, M. Alhasan","doi":"10.1109/ACIT47987.2019.8991084","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991084","url":null,"abstract":"For financial institutions and the banking industry, it is very crucial to have predictive models for their financial activities, as they play a major role in risk management. Predicting loan default is one of the critical issues that they focus on, as huge revenue loss could be prevented by predicting customer’s ability to pay back on time. In this paper, different classification methods (Naïve Bayes, Decision Tree, and Random Forest) are being used for prediction, comprehensive different pre-processing techniques are being applied on the dataset, and three different feature extractions algorithms are used to enhance the accuracy and the performance. Results are compared using F1 accuracy measure, and an improvement of over 3% has been obtained.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114422690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Privacy Preserving of Shared Data in Deep Learning 深度学习中共享数据的隐私保护
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991105
Ahmad Al-qerem, Eman Al Nagi
In the age of Big Data the need of developing machine learning algorithms has increased. Such algorithms are used to extract valuable information needed for different types of sectors; health, education, financial …etc. In many cases data has to be shared among several parties to guarantee better accuracy of the results of such algorithms. In these cases privacy of data would be questionable. In this paper a survey has been conducted on research that focused on Privacy Preserving techniques when applying deep learning algorithms on distributed or shared data.
在大数据时代,开发机器学习算法的需求增加了。这些算法用于提取不同类型扇区所需的有价值信息;健康、教育、金融……等等。在许多情况下,数据必须在多方之间共享,以保证此类算法结果的更好准确性。在这些情况下,数据隐私是值得怀疑的。本文对在分布式或共享数据上应用深度学习算法时关注隐私保护技术的研究进行了调查。
{"title":"Privacy Preserving of Shared Data in Deep Learning","authors":"Ahmad Al-qerem, Eman Al Nagi","doi":"10.1109/ACIT47987.2019.8991105","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991105","url":null,"abstract":"In the age of Big Data the need of developing machine learning algorithms has increased. Such algorithms are used to extract valuable information needed for different types of sectors; health, education, financial …etc. In many cases data has to be shared among several parties to guarantee better accuracy of the results of such algorithms. In these cases privacy of data would be questionable. In this paper a survey has been conducted on research that focused on Privacy Preserving techniques when applying deep learning algorithms on distributed or shared data.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114477169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Copyright notice] (版权)
Pub Date : 2019-12-01 DOI: 10.1109/acit47987.2019.8990978
{"title":"[Copyright notice]","authors":"","doi":"10.1109/acit47987.2019.8990978","DOIUrl":"https://doi.org/10.1109/acit47987.2019.8990978","url":null,"abstract":"","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114774698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power Controlled Medium Access Control Design For Cognitive Radio Ad-Hoc Network 认知无线电Ad-Hoc网络的功率控制介质访问控制设计
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991072
Ala’eddin Masadeh, H. Salameh, A. Abu-El-Haija
In this work, we propose efficient channel assignment as well as transmission power control (TPC) algorithm to improve the performance of multi-channel single-radio cognitive radio ad-hoc networks (CRAHNs). The channel assignment algorithm aims to assign channels among users in a way that reduces the probability of collision. The TPC aims to tune the transmit power used by nodes. By this mechanism several goals can be achieved, which are: prolonging the battery life, reducing the interference among users, and increasing the frequency spatial reuse. The results show that an enhancement can be achieved when the proposed protocol is integrated to ad-hoc networks, which can be seen through increase in the network’s throughput performance and decrease in access delay. Here, the network simulator 2 (NS2) has been used to verify the theoretical model, which indicates a significant enhancement in network performance.
在这项工作中,我们提出了有效的信道分配和发射功率控制(TPC)算法来提高多通道单无线电认知无线电自组织网络(CRAHNs)的性能。信道分配算法的目的是在用户之间分配信道,以减少碰撞的概率。TPC旨在调整节点使用的传输功率。通过这种机制可以达到延长电池寿命、减少用户之间的干扰和增加频率空间复用的几个目标。结果表明,将所提出的协议集成到ad-hoc网络中,可以实现网络吞吐量性能的提高和访问延迟的降低。本文使用网络模拟器2 (NS2)对理论模型进行了验证,结果表明网络性能得到了显著提高。
{"title":"Power Controlled Medium Access Control Design For Cognitive Radio Ad-Hoc Network","authors":"Ala’eddin Masadeh, H. Salameh, A. Abu-El-Haija","doi":"10.1109/ACIT47987.2019.8991072","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991072","url":null,"abstract":"In this work, we propose efficient channel assignment as well as transmission power control (TPC) algorithm to improve the performance of multi-channel single-radio cognitive radio ad-hoc networks (CRAHNs). The channel assignment algorithm aims to assign channels among users in a way that reduces the probability of collision. The TPC aims to tune the transmit power used by nodes. By this mechanism several goals can be achieved, which are: prolonging the battery life, reducing the interference among users, and increasing the frequency spatial reuse. The results show that an enhancement can be achieved when the proposed protocol is integrated to ad-hoc networks, which can be seen through increase in the network’s throughput performance and decrease in access delay. Here, the network simulator 2 (NS2) has been used to verify the theoretical model, which indicates a significant enhancement in network performance.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129625325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Paradoxes in the Middle East: A Content Analysis from Instagram 中东的隐私悖论:来自Instagram的内容分析
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991070
Faten F. Kharbat, Ajayeb S. Abu Daabes
In this research we present several interpretations of the privacy paradox from the point view of youth people in UAE. Privacy is not a major concern in general, privacy paradox is a complex phenomenon that needs more effort and more research focus..
在这项研究中,我们从阿联酋年轻人的角度提出了对隐私悖论的几种解释。一般来说,隐私问题并不是人们关注的焦点,隐私悖论是一个复杂的现象,需要更多的努力和更多的研究。
{"title":"Privacy Paradoxes in the Middle East: A Content Analysis from Instagram","authors":"Faten F. Kharbat, Ajayeb S. Abu Daabes","doi":"10.1109/ACIT47987.2019.8991070","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991070","url":null,"abstract":"In this research we present several interpretations of the privacy paradox from the point view of youth people in UAE. Privacy is not a major concern in general, privacy paradox is a complex phenomenon that needs more effort and more research focus..","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128721144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge Sharing Platform for Multi-site Organisation 多站点组织的知识共享平台
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991121
Ahmad Ghandour
in today’s dynamic and highly agile business environment, Knowledge Management (KM) have become increasingly important factor in competitiveness and sustainability. Organizations are facing growing challenges in documenting, sharing and reusing the knowledge across teams and geographic locations due to the absence of a collaborative platform. Organizational knowledge accumulated over time needs to be indexed and shared among employees. In this paper, a framework to design a KM platform with multiple portals is proposed to be implemented as internal information sharing platforms for a multi-site organization. A meta-requirements were collected from literature and then translated into design principles for efficient and effective KM system development for multi-site organizations
在当今充满活力和高度敏捷的商业环境中,知识管理(KM)已成为竞争力和可持续性日益重要的因素。由于缺乏协作平台,组织在跨团队和跨地理位置记录、共享和重用知识方面面临着越来越大的挑战。随着时间的推移积累的组织知识需要被索引,并在员工之间共享。本文提出了一个具有多个门户的知识管理平台的设计框架,并将其作为多站点组织的内部信息共享平台来实现。从文献中收集元需求,然后将其转化为设计原则,用于多站点组织的高效和有效的知识管理系统开发
{"title":"Knowledge Sharing Platform for Multi-site Organisation","authors":"Ahmad Ghandour","doi":"10.1109/ACIT47987.2019.8991121","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991121","url":null,"abstract":"in today’s dynamic and highly agile business environment, Knowledge Management (KM) have become increasingly important factor in competitiveness and sustainability. Organizations are facing growing challenges in documenting, sharing and reusing the knowledge across teams and geographic locations due to the absence of a collaborative platform. Organizational knowledge accumulated over time needs to be indexed and shared among employees. In this paper, a framework to design a KM platform with multiple portals is proposed to be implemented as internal information sharing platforms for a multi-site organization. A meta-requirements were collected from literature and then translated into design principles for efficient and effective KM system development for multi-site organizations","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127861302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy Based Threat Assessment Model (FTAM) 基于模糊的威胁评估模型
Pub Date : 2019-12-01 DOI: 10.1109/ACIT47987.2019.8991129
Nevrus Kaja, A. Shaout, Di Ma
Threat assessment is the process of identifying and characterizing a cybersecurity threat by evaluating and assessing its properties. This is a tool used by many organizations around the globe in order to evaluate their systems and perform a risk analysis against common threats. SAE J3061 guidelines provide a set of principles for automotive cybersecurity which includes threat identification, assessment, and analysis. This standard defines threat assessment as “an analysis technique that is applied in the concept phase to help identify potential threats to a feature and to assess the risk associated with the identified threats”. This paper presents an innovative, Fuzzy Based Threat Assessment Model (FTAM). FTAM leverages the threat characterization from established threat assessment models, while focusing on improving its assessment capabilities by using Fuzzy Logic. Through this methodology, FTAM is able to improve the efficiency and accuracy of the threat assessment process to determine the “degree” of the threat. This is different from using subjective assessment processes based on table look-ups or scoring like some of the current threat assessment models do. This paper provides an analysis on the design and performance of FTAM as well as benchmarking with other existing models.
威胁评估是通过评估和评估网络安全威胁的属性来识别和描述网络安全威胁的过程。这是全球许多组织用来评估其系统并针对常见威胁执行风险分析的工具。SAE J3061指南为汽车网络安全提供了一套原则,包括威胁识别、评估和分析。该标准将威胁评估定义为“一种在概念阶段应用的分析技术,以帮助识别对某一特性的潜在威胁,并评估与已识别的威胁相关的风险”。提出了一种创新的基于模糊的威胁评估模型(FTAM)。FTAM利用已建立的威胁评估模型中的威胁特征,同时专注于通过使用模糊逻辑来提高其评估能力。通过这种方法,FTAM能够提高威胁评估过程的效率和准确性,以确定威胁的“程度”。这不同于使用基于表查找或评分的主观评估过程,就像一些当前的威胁评估模型所做的那样。本文对FTAM的设计和性能进行了分析,并与其他现有模型进行了基准测试。
{"title":"Fuzzy Based Threat Assessment Model (FTAM)","authors":"Nevrus Kaja, A. Shaout, Di Ma","doi":"10.1109/ACIT47987.2019.8991129","DOIUrl":"https://doi.org/10.1109/ACIT47987.2019.8991129","url":null,"abstract":"Threat assessment is the process of identifying and characterizing a cybersecurity threat by evaluating and assessing its properties. This is a tool used by many organizations around the globe in order to evaluate their systems and perform a risk analysis against common threats. SAE J3061 guidelines provide a set of principles for automotive cybersecurity which includes threat identification, assessment, and analysis. This standard defines threat assessment as “an analysis technique that is applied in the concept phase to help identify potential threats to a feature and to assess the risk associated with the identified threats”. This paper presents an innovative, Fuzzy Based Threat Assessment Model (FTAM). FTAM leverages the threat characterization from established threat assessment models, while focusing on improving its assessment capabilities by using Fuzzy Logic. Through this methodology, FTAM is able to improve the efficiency and accuracy of the threat assessment process to determine the “degree” of the threat. This is different from using subjective assessment processes based on table look-ups or scoring like some of the current threat assessment models do. This paper provides an analysis on the design and performance of FTAM as well as benchmarking with other existing models.","PeriodicalId":314091,"journal":{"name":"2019 International Arab Conference on Information Technology (ACIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125181468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 International Arab Conference on Information Technology (ACIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1