首页 > 最新文献

2022 10th International Conference on Cyber and IT Service Management (CITSM)最新文献

英文 中文
Using Deep Learning Model to Predict Terms Use by Terrorist to Pre-Plan an Attack on A Real-Time Twitter Tweets from Rapid Miner 使用深度学习模型预测恐怖分子使用的术语,以预先计划对Rapid Miner的实时Twitter推文的攻击
Pub Date : 2022-09-20 DOI: 10.1109/CITSM56380.2022.9935880
Viva Arifin, Fatoumatta Binta Jallow, A. Lubis, Rizal Broer Bahaweres, Atep Abdu Rofiq
Terrorism has an impact on people's quality of life by stifling their physical and mental freedom. People are researching harder to investigate new defense systems to defend humanity. To protect people's lives in society and to raise the overall standard of living, counterterrorism strategies have been employed. Recently, artificially intelligent tools for counterterrorism have been developed using machine learning methodologies (AI). In this research, deep learning approaches are researched to comprehend the behavior of terrorist operations because this field of machine learning has recently seen a rise in its popularity. The first experiment, consisting of 10,000 tweets, was collected using five different terrorist terms, and the second experiment, 6,000 tweets from different features, was collected using Rapid Miner and a spreadsheet to collect real-time data. The models are implemented in deep learning model and two machine learning algorithms, i.e. Naïve bayes and kNN using Rapid Miner. The performance of the deep learning model is compared with two machine learning algorithms, and it is shown that the performance of deep learning is 79 to 89 percent in terms of accuracy, precision, recall, and Fl-Score, while traditional machine learning algorithms have only been able to achieve an accuracy of up to 68 percent. This leads to the conclusion that deep learning is an adequate model to utilize for forecasting terrorist activity. As shown by our studies, the dataset for terrorist activities is enormous. A deep learning model is a good choice to handle large datasets and comprehend the underlying patterns in the dataset.
恐怖主义通过扼杀人们的身心自由来影响人们的生活质量。人们正在更加努力地研究新的防御系统来保卫人类。为了保护社会上人民的生命,提高整体生活水平,反恐战略得到了运用。最近,使用机器学习方法(AI)开发了用于反恐的人工智能工具。在本研究中,研究了深度学习方法来理解恐怖行动的行为,因为机器学习的这一领域最近越来越受欢迎。第一个实验由10000条推文组成,使用5种不同的恐怖主义术语收集,第二个实验由6000条不同特征的推文收集,使用Rapid Miner和电子表格收集实时数据。模型在深度学习模型和两种机器学习算法中实现,即Naïve bayes和使用Rapid Miner的kNN。将深度学习模型的性能与两种机器学习算法进行比较,结果表明,深度学习在准确性、精密度、召回率和Fl-Score方面的性能为79%至89%,而传统机器学习算法只能达到高达68%的准确性。由此得出的结论是,深度学习是一种用于预测恐怖活动的适当模型。我们的研究表明,恐怖活动的数据集非常庞大。深度学习模型是处理大型数据集和理解数据集中底层模式的好选择。
{"title":"Using Deep Learning Model to Predict Terms Use by Terrorist to Pre-Plan an Attack on A Real-Time Twitter Tweets from Rapid Miner","authors":"Viva Arifin, Fatoumatta Binta Jallow, A. Lubis, Rizal Broer Bahaweres, Atep Abdu Rofiq","doi":"10.1109/CITSM56380.2022.9935880","DOIUrl":"https://doi.org/10.1109/CITSM56380.2022.9935880","url":null,"abstract":"Terrorism has an impact on people's quality of life by stifling their physical and mental freedom. People are researching harder to investigate new defense systems to defend humanity. To protect people's lives in society and to raise the overall standard of living, counterterrorism strategies have been employed. Recently, artificially intelligent tools for counterterrorism have been developed using machine learning methodologies (AI). In this research, deep learning approaches are researched to comprehend the behavior of terrorist operations because this field of machine learning has recently seen a rise in its popularity. The first experiment, consisting of 10,000 tweets, was collected using five different terrorist terms, and the second experiment, 6,000 tweets from different features, was collected using Rapid Miner and a spreadsheet to collect real-time data. The models are implemented in deep learning model and two machine learning algorithms, i.e. Naïve bayes and kNN using Rapid Miner. The performance of the deep learning model is compared with two machine learning algorithms, and it is shown that the performance of deep learning is 79 to 89 percent in terms of accuracy, precision, recall, and Fl-Score, while traditional machine learning algorithms have only been able to achieve an accuracy of up to 68 percent. This leads to the conclusion that deep learning is an adequate model to utilize for forecasting terrorist activity. As shown by our studies, the dataset for terrorist activities is enormous. A deep learning model is a good choice to handle large datasets and comprehend the underlying patterns in the dataset.","PeriodicalId":342813,"journal":{"name":"2022 10th International Conference on Cyber and IT Service Management (CITSM)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131000516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of Bird Species using K-Nearest Neighbor Algorithm 基于k -最近邻算法的鸟类分类
Pub Date : 2022-09-20 DOI: 10.1109/CITSM56380.2022.9936012
Ichsan Budiman, D. R. Ramdania, Y. A. Gerhana, Alif Rakasha Pratama Putra, Nisairrizqy Nabilah Faizah, M. Harika
Birds play an essential role in the functioning of the world's ecosystems by directly impacting human health, economy, and food production and benefiting millions of other species. The diversity of bird habitats shows that there are many types of bird species. This study aims to provide a new treasure for the ontology field by applying a machine learning algorithm to classify bird species based on K-Nearest Neighbor (KNN). A total of 400 species of bird images with a total of 58388 images of data were tested in this study. The test scenario was carried out in 3 stages: 400, 200, and 100 species. The results of testing the accuracy of the K-Nearest Neighbor model applied to the bird image dataset are 26.846%, with a value of $mathrm{K}=1$. The comparison of training data with test data is 95:5 percent (%). This result shows that the KNN algorithm can classify bird species.
鸟类通过直接影响人类健康、经济和粮食生产,并使数百万其他物种受益,在世界生态系统的功能中发挥着至关重要的作用。鸟类栖息地的多样性表明鸟类种类繁多。本研究旨在通过基于k -最近邻(KNN)的机器学习算法对鸟类进行分类,为本体领域提供新的宝藏。本研究共检测了400种鸟类图像,共58388张图像数据。试验场景分3个阶段进行,分别为400、200和100种。K-最近邻模型应用于鸟类图像数据集的准确率测试结果为26.846%,其值为$mathrm{K}=1$。训练数据与测试数据的对比率为95%(%)。结果表明,KNN算法可以对鸟类进行分类。
{"title":"Classification of Bird Species using K-Nearest Neighbor Algorithm","authors":"Ichsan Budiman, D. R. Ramdania, Y. A. Gerhana, Alif Rakasha Pratama Putra, Nisairrizqy Nabilah Faizah, M. Harika","doi":"10.1109/CITSM56380.2022.9936012","DOIUrl":"https://doi.org/10.1109/CITSM56380.2022.9936012","url":null,"abstract":"Birds play an essential role in the functioning of the world's ecosystems by directly impacting human health, economy, and food production and benefiting millions of other species. The diversity of bird habitats shows that there are many types of bird species. This study aims to provide a new treasure for the ontology field by applying a machine learning algorithm to classify bird species based on K-Nearest Neighbor (KNN). A total of 400 species of bird images with a total of 58388 images of data were tested in this study. The test scenario was carried out in 3 stages: 400, 200, and 100 species. The results of testing the accuracy of the K-Nearest Neighbor model applied to the bird image dataset are 26.846%, with a value of $mathrm{K}=1$. The comparison of training data with test data is 95:5 percent (%). This result shows that the KNN algorithm can classify bird species.","PeriodicalId":342813,"journal":{"name":"2022 10th International Conference on Cyber and IT Service Management (CITSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130639251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Need of Physical Improvement of Online Marketing: The Case of Agribusiness e-Commerce in Indonesia 网络营销实体改进的必要性:以印尼农业电子商务为例
Pub Date : 2022-09-20 DOI: 10.1109/CITSM56380.2022.9935886
U. Maman, Abuddin Nata, Rusdiono Mukri, Nindyantoro, Faisal Hendra, Zirmansyah
By the development of agribusiness e-commerce, the physical contact between seller and buyer is decreasing or even disappearing. The question in this context is whether the tangibility dimension is still needed or - at least -- what are the attributes of tangibility dimension are required in e-commerce of agribusiness. Thus, this research aims to explore the required attributes, the attributes need to remediate, and the attributes which have been completely performed for the tangibility aspect in agribusiness e-commerce. Based on literature review and in-depth interview, this research finds six attributes of tangibility aspect required in agribusiness e-commerce- By the survey to the 100 customers of online marketing in Indonesia - which sample size is determined by Lemeshow formula and taken by accidental sampling - and data analysis adopts the Importance Performance Analysis, this research proves product freshness needs to remediate; while the packaging facilities and product hygiene are the achievement of company services needs to maintain as a good work. The extension education is valuable to maintain the performed attributes and to remediate unperformed tangibility attribute in e-commerce services.
随着农业电子商务的发展,卖方和买方之间的物理接触正在减少甚至消失。在这种背景下的问题是,是否仍然需要有形维度,或者-至少-在农业企业电子商务中需要有形维度的哪些属性。因此,本研究旨在探索农业电子商务有形方面的必要属性、需要补救的属性以及已经完全履行的属性。通过文献综述和深度访谈,本研究发现农商电子商务所需要的有形方面的六个属性——通过对印度尼西亚100个网络营销客户的调查,样本量由Lemeshow公式确定,采用偶然抽样,数据分析采用重要性绩效分析,本研究证明产品新鲜度需要修复;而包装设施和产品卫生是实现公司服务需要维护作为一项好的工作。推广教育对于维护电子商务服务的履行属性和弥补电子商务服务的不履行有形属性具有重要的价值。
{"title":"The Need of Physical Improvement of Online Marketing: The Case of Agribusiness e-Commerce in Indonesia","authors":"U. Maman, Abuddin Nata, Rusdiono Mukri, Nindyantoro, Faisal Hendra, Zirmansyah","doi":"10.1109/CITSM56380.2022.9935886","DOIUrl":"https://doi.org/10.1109/CITSM56380.2022.9935886","url":null,"abstract":"By the development of agribusiness e-commerce, the physical contact between seller and buyer is decreasing or even disappearing. The question in this context is whether the tangibility dimension is still needed or - at least -- what are the attributes of tangibility dimension are required in e-commerce of agribusiness. Thus, this research aims to explore the required attributes, the attributes need to remediate, and the attributes which have been completely performed for the tangibility aspect in agribusiness e-commerce. Based on literature review and in-depth interview, this research finds six attributes of tangibility aspect required in agribusiness e-commerce- By the survey to the 100 customers of online marketing in Indonesia - which sample size is determined by Lemeshow formula and taken by accidental sampling - and data analysis adopts the Importance Performance Analysis, this research proves product freshness needs to remediate; while the packaging facilities and product hygiene are the achievement of company services needs to maintain as a good work. The extension education is valuable to maintain the performed attributes and to remediate unperformed tangibility attribute in e-commerce services.","PeriodicalId":342813,"journal":{"name":"2022 10th International Conference on Cyber and IT Service Management (CITSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116837941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Viola-Jones Algorithm for Face Detection using Wider Face Dataset 基于更宽人脸数据集的Viola-Jones人脸检测算法
Pub Date : 2022-09-20 DOI: 10.1109/CITSM56380.2022.9935830
Sumanto, B. Wijonarko, Muhammad Qommarudin, Aji Sudibyo, Pudji Widodo, Afit Muhammad Lukman
Face detection has been one of the most explored problems in computer vision for several years. Using the WIDER FACES data set, this study investigates how the Viola-Jones method can be used to identify faces in 179 photos and how it performs compared to other face detection algorithms. In a previous study for face detection using Viola-jones, the highest accuracy results were obtained at 90.9% for facial images and 75.5% for non-face images. In this study, the Viola-Jones approach had a 100 percent success rate. This approach will be used in the MATLAB algorithm for face identification to get better results than currently available. Experiments using two classes had promising results.
多年来,人脸检测一直是计算机视觉领域研究最多的问题之一。使用WIDER FACES数据集,本研究探讨了如何使用Viola-Jones方法识别179张照片中的人脸,以及与其他人脸检测算法相比,该方法的表现如何。在之前的一项使用Viola-jones进行的人脸检测研究中,人脸图像的准确率最高,为90.9%,非人脸图像的准确率最高,为75.5%。在这项研究中,维奥拉-琼斯方法有100%的成功率。这种方法将在MATLAB算法中用于人脸识别,得到比目前更好的结果。使用两个类的实验取得了令人鼓舞的结果。
{"title":"Viola-Jones Algorithm for Face Detection using Wider Face Dataset","authors":"Sumanto, B. Wijonarko, Muhammad Qommarudin, Aji Sudibyo, Pudji Widodo, Afit Muhammad Lukman","doi":"10.1109/CITSM56380.2022.9935830","DOIUrl":"https://doi.org/10.1109/CITSM56380.2022.9935830","url":null,"abstract":"Face detection has been one of the most explored problems in computer vision for several years. Using the WIDER FACES data set, this study investigates how the Viola-Jones method can be used to identify faces in 179 photos and how it performs compared to other face detection algorithms. In a previous study for face detection using Viola-jones, the highest accuracy results were obtained at 90.9% for facial images and 75.5% for non-face images. In this study, the Viola-Jones approach had a 100 percent success rate. This approach will be used in the MATLAB algorithm for face identification to get better results than currently available. Experiments using two classes had promising results.","PeriodicalId":342813,"journal":{"name":"2022 10th International Conference on Cyber and IT Service Management (CITSM)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122677467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Financial Technology Risk Analysis for Peer to Peer Lending Process: A Case Study of Sharia Aggregator Financial Technology p2p借贷过程中的金融技术风险分析:以Sharia聚合金融技术为例
Pub Date : 2022-09-20 DOI: 10.1109/CITSM56380.2022.9935926
Taufiq Maulana Firdaus, Fahdi Saidi Lubis, M. Lubis
Financial technology (Fintech) is an amalgamation of financial management using a technology system. Fintech has become a public concern because this service provides many service features to make it easier from the financial side, such as being used in cooperative financial institutions, banking and insurance. This paper will analyze the opportunities and challenges of Fintech sharia in Indonesia. By exploring the existing literature, this article will try to answer that question. This research is carried out using a literature review approach and comparative qualitative method which will determined the results of the SWOT analysis of sharia financial technology in indonesia. It is needed to mitigate risk of funding in a peer to peer method in overcoming the security of funds and data from investors, firstly companies can perform transparency on the clarity of investor funds. This is done as one of the facilities provided to investors in the Fintech application. In the future, it is hoped that in facing competition, sharia-based fintech companies must be able to provide targeted services through the socialization of sharia fintech to the public, both online and offline. Investors are expected to be more careful before investing in choosing Fintech Peer to Peer (P2P) Lending services by checking the list of Fintech lending and lending companies registered and found by the Financial Services Authority (OJK).
金融科技(Fintech)是利用技术系统对财务管理的融合。金融科技已经成为公众关注的焦点,因为这项服务提供了许多服务功能,使其从金融方面变得更容易,例如用于合作金融机构,银行和保险。本文将分析Fintech sharia在印尼的机遇和挑战。通过对现有文献的探索,本文将试图回答这个问题。本研究采用文献综述法和比较定性方法进行,将确定印尼伊斯兰金融技术的SWOT分析结果。在克服投资者资金和数据的安全性方面,需要降低点对点方式的融资风险,首先公司可以对投资者资金的清晰度进行透明度。这是为金融科技应用程序中的投资者提供的设施之一。未来,希望面对竞争,伊斯兰金融科技公司必须能够通过伊斯兰金融科技的社会化向公众提供有针对性的服务,无论是线上还是线下。投资者在选择金融科技点对点(P2P)贷款服务之前,应该更加谨慎,检查金融服务管理局(OJK)注册和查找的金融科技贷款和贷款公司名单。
{"title":"Financial Technology Risk Analysis for Peer to Peer Lending Process: A Case Study of Sharia Aggregator Financial Technology","authors":"Taufiq Maulana Firdaus, Fahdi Saidi Lubis, M. Lubis","doi":"10.1109/CITSM56380.2022.9935926","DOIUrl":"https://doi.org/10.1109/CITSM56380.2022.9935926","url":null,"abstract":"Financial technology (Fintech) is an amalgamation of financial management using a technology system. Fintech has become a public concern because this service provides many service features to make it easier from the financial side, such as being used in cooperative financial institutions, banking and insurance. This paper will analyze the opportunities and challenges of Fintech sharia in Indonesia. By exploring the existing literature, this article will try to answer that question. This research is carried out using a literature review approach and comparative qualitative method which will determined the results of the SWOT analysis of sharia financial technology in indonesia. It is needed to mitigate risk of funding in a peer to peer method in overcoming the security of funds and data from investors, firstly companies can perform transparency on the clarity of investor funds. This is done as one of the facilities provided to investors in the Fintech application. In the future, it is hoped that in facing competition, sharia-based fintech companies must be able to provide targeted services through the socialization of sharia fintech to the public, both online and offline. Investors are expected to be more careful before investing in choosing Fintech Peer to Peer (P2P) Lending services by checking the list of Fintech lending and lending companies registered and found by the Financial Services Authority (OJK).","PeriodicalId":342813,"journal":{"name":"2022 10th International Conference on Cyber and IT Service Management (CITSM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129576822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Spices Image Classification Using Support Vector Machine 基于支持向量机的香料图像分类
Pub Date : 2022-09-20 DOI: 10.1109/CITSM56380.2022.9935856
Muhammad Insan Al-amin, Fahmi Sidiq, D. R. Ramdania, N. Fajar, Y. A. Gerhana, M. Harika
Spices are ingredients that are commonly used as food flavoring in various types of food in the world. There are many types of spices that exist. Not everyone can distinguish the types of these spices. A Spice classifier is needed to address this problem. This study performs the classification of spice images using the Support Vector Machine (SVM) algorithm, which is a method of mapping data into certain categories. There are 5 spices identified, namely ginger, cinnamon, candlenut, turmeric and pepper. In this study, the SVM model for image identification produced an average accuracy of 38.7%. This model has the greatest accuracy in identifying cinnamon by 65.3% and the smallest accuracy in identifying ginger by 24.5%.
香料是世界上各种食品中常用的食品调味料。香料有很多种。不是每个人都能分辨出这些香料的种类。需要一个Spice分类器来解决这个问题。本研究使用支持向量机(SVM)算法对香料图像进行分类,这是一种将数据映射到特定类别的方法。有5种香料,分别是姜、肉桂、桂皮、姜黄和胡椒。在本研究中,SVM模型用于图像识别的平均准确率为38.7%。该模型对肉桂的识别准确率最高为65.3%,对姜的识别准确率最低为24.5%。
{"title":"Spices Image Classification Using Support Vector Machine","authors":"Muhammad Insan Al-amin, Fahmi Sidiq, D. R. Ramdania, N. Fajar, Y. A. Gerhana, M. Harika","doi":"10.1109/CITSM56380.2022.9935856","DOIUrl":"https://doi.org/10.1109/CITSM56380.2022.9935856","url":null,"abstract":"Spices are ingredients that are commonly used as food flavoring in various types of food in the world. There are many types of spices that exist. Not everyone can distinguish the types of these spices. A Spice classifier is needed to address this problem. This study performs the classification of spice images using the Support Vector Machine (SVM) algorithm, which is a method of mapping data into certain categories. There are 5 spices identified, namely ginger, cinnamon, candlenut, turmeric and pepper. In this study, the SVM model for image identification produced an average accuracy of 38.7%. This model has the greatest accuracy in identifying cinnamon by 65.3% and the smallest accuracy in identifying ginger by 24.5%.","PeriodicalId":342813,"journal":{"name":"2022 10th International Conference on Cyber and IT Service Management (CITSM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125362368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
End-To-End Encryption on the Instant Messaging Application Based Android using AES Cryptography Algorithm to a Text Message 基于Android的文本消息端到端AES加密应用
Pub Date : 2022-09-20 DOI: 10.1109/CITSM56380.2022.9935963
Nurhayati, Kastari, Feri Fahrianto
Instant Messaging applications have become a common thing used by people, with the increasing popularity of smartphones with the support of various application functions. One of the most popular applications is an instant messaging application with a text message feature. However, the communication media is not always safe from attack sniffers. Symantec Enterprise Security analysis, threats to eavesdropping or wiretapping ranks first in the assault case against instant messaging. For that, how to maintain the security of message data on the communication media of smartphone users from sniffer attacks? One of the solutions uses end-to-end encryption. The encryption algorithms used in E2EE implementations may vary. In this study, the Advanced Encryption Standard (AES) cryptographic algorithm is used in this study. The study results are in the form of designing and building an instant messaging application on the Android mobile platform that can encrypt and decrypt text messages to improve security services on instant messaging applications.
随着支持各种应用程序功能的智能手机的日益普及,即时通讯应用程序已经成为人们普遍使用的东西。最流行的应用程序之一是具有文本消息功能的即时消息应用程序。然而,通信媒体并不总是安全的攻击嗅探器。赛门铁克企业安全分析显示,对窃听或窃听的威胁在针对即时通讯的攻击案件中排名第一。为此,如何维护智能手机用户通信介质上的消息数据安全,不受嗅探器攻击?其中一个解决方案使用端到端加密。E2EE实现中使用的加密算法可能会有所不同。本研究采用高级加密标准AES (Advanced Encryption Standard)加密算法。研究成果的形式是在Android移动平台上设计并构建一个能够对短信进行加密和解密的即时通讯应用程序,以提高即时通讯应用程序的安全服务。
{"title":"End-To-End Encryption on the Instant Messaging Application Based Android using AES Cryptography Algorithm to a Text Message","authors":"Nurhayati, Kastari, Feri Fahrianto","doi":"10.1109/CITSM56380.2022.9935963","DOIUrl":"https://doi.org/10.1109/CITSM56380.2022.9935963","url":null,"abstract":"Instant Messaging applications have become a common thing used by people, with the increasing popularity of smartphones with the support of various application functions. One of the most popular applications is an instant messaging application with a text message feature. However, the communication media is not always safe from attack sniffers. Symantec Enterprise Security analysis, threats to eavesdropping or wiretapping ranks first in the assault case against instant messaging. For that, how to maintain the security of message data on the communication media of smartphone users from sniffer attacks? One of the solutions uses end-to-end encryption. The encryption algorithms used in E2EE implementations may vary. In this study, the Advanced Encryption Standard (AES) cryptographic algorithm is used in this study. The study results are in the form of designing and building an instant messaging application on the Android mobile platform that can encrypt and decrypt text messages to improve security services on instant messaging applications.","PeriodicalId":342813,"journal":{"name":"2022 10th International Conference on Cyber and IT Service Management (CITSM)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124474361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Vulnerability Analysis of the Sharia Crowdfunding Website Using OWASP-ZAP 基于OWASP-ZAP的伊斯兰教教众筹网站安全漏洞分析
Pub Date : 2022-09-20 DOI: 10.1109/CITSM56380.2022.9935837
Nurbojatmiko, Aris Lathifah, Faaza Bil Amri, A. Rosidah
Indonesia is a country with fairly high market development in Financial Technology (FinTech) Services in the Asia Pacific region. The innovative benefit of FinTech is sharia crowdfunding. Data and information security are important for a company or organization. The problem faced by the use of websites in various fields, especially on the sharia crowdfunding website, is the security of information concerning data from an organization. This study aims to analyze the security vulnerabilities of the sharia crowdfunding website with the Open Web Application Security Project (OWASP) approach using the Zed Attack Proxy (ZAP) tool. OWASP is an open-source framework for improving the security of application software on websites. The results of this study determine the level of vulnerability in the Sharia Crowdfunding Website. This test is carried out to find vulnerabilities and risks on a crowdfunding website and provide recommendations for improving security on the website. The top 10 Security Vulnerabilities based on OWASP consist of 4 high levels, 5 medium levels, 14 low levels, and 9 information levels including Broken Access Control, Injection, Insecure Design, Security Misconfiguration, Vulnerable and Outdated Components, and Software and Data Integrity Failures.
印度尼西亚是亚太地区金融科技(FinTech)服务市场发展程度较高的国家。FinTech的创新优势在于伊斯兰教法的众筹。数据和信息安全对公司或组织来说非常重要。在各个领域使用网站所面临的问题,特别是在伊斯兰教法众筹网站上,是一个组织的数据信息的安全问题。本研究旨在利用Zed攻击代理(ZAP)工具,利用开放Web应用程序安全项目(OWASP)方法分析伊斯兰教法众筹网站的安全漏洞。OWASP是一个用于提高网站应用软件安全性的开源框架。本研究的结果决定了伊斯兰教法众筹网站的脆弱性程度。这个测试是发现漏洞和风险进行集资”的网站,在网站上提供建议改善安全。基于OWASP的十大安全漏洞包括4个高级别、5个中级别、14个低级别和9个信息级别,包括访问控制被破坏、注入、不安全设计、安全配置错误、脆弱和过时的组件、软件和数据完整性故障。
{"title":"Security Vulnerability Analysis of the Sharia Crowdfunding Website Using OWASP-ZAP","authors":"Nurbojatmiko, Aris Lathifah, Faaza Bil Amri, A. Rosidah","doi":"10.1109/CITSM56380.2022.9935837","DOIUrl":"https://doi.org/10.1109/CITSM56380.2022.9935837","url":null,"abstract":"Indonesia is a country with fairly high market development in Financial Technology (FinTech) Services in the Asia Pacific region. The innovative benefit of FinTech is sharia crowdfunding. Data and information security are important for a company or organization. The problem faced by the use of websites in various fields, especially on the sharia crowdfunding website, is the security of information concerning data from an organization. This study aims to analyze the security vulnerabilities of the sharia crowdfunding website with the Open Web Application Security Project (OWASP) approach using the Zed Attack Proxy (ZAP) tool. OWASP is an open-source framework for improving the security of application software on websites. The results of this study determine the level of vulnerability in the Sharia Crowdfunding Website. This test is carried out to find vulnerabilities and risks on a crowdfunding website and provide recommendations for improving security on the website. The top 10 Security Vulnerabilities based on OWASP consist of 4 high levels, 5 medium levels, 14 low levels, and 9 information levels including Broken Access Control, Injection, Insecure Design, Security Misconfiguration, Vulnerable and Outdated Components, and Software and Data Integrity Failures.","PeriodicalId":342813,"journal":{"name":"2022 10th International Conference on Cyber and IT Service Management (CITSM)","volume":"60 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116358259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Factors Analysis of Interest in Using Pay Later in E-commerce Applications Using Principal Component Analysis and Maximum Likelihood Estimation Methods 基于主成分分析和极大似然估计方法的电子商务应用中延迟支付兴趣因素分析
Pub Date : 2022-09-20 DOI: 10.1109/CITSM56380.2022.9936014
Silvia Damayanti, Yusuf Durachman, Eva Khudzaeva
Pay later is one of the fastest growing payment methods in E-Commerce Applications. Although the use of pay later is increasing, pay later is not the main payment tool that people choose. The purpose of this study is to determine the factors that influence the interest in using Pay later, especially in the Shopee application, and the most dominant factors by comparing two-factor extraction methods, namely Principal Component Analysis and Maximum Likelihood Estimation. Respondents in this study were 125 Shopee application users who had used Shopee Pay later which was carried out by purposive sampling method. The method used in this research is the quantitative method. The results of this study indicate that the principal component analysis method is a feasible method to use because it has a low value on the RMSE and has a strong loading factor value (close to 1) so it can explain the formation of factors. The Principal Component Analysis method produces 3 factors that are formed from 11 variables. The most dominant factor in the influence of interest in using Shopee Pay later with the Principal Component Analysis method is the effect of benefits because the variable of benefit influence has the highest loading factor in decision making.
延迟支付是电子商务应用中发展最快的支付方式之一。虽然延迟支付的使用越来越多,但延迟支付并不是人们选择的主要支付工具。本研究的目的是通过比较主成分分析和最大似然估计两种双因素提取方法,确定影响用户后期特别是在Shopee应用中使用Pay的兴趣的因素,以及最主要的因素。本研究的调查对象为125名曾经使用过Shopee Pay的Shopee应用用户,采用有目的的抽样方法。本研究采用的方法是定量方法。本研究的结果表明,主成分分析法是一种可行的方法,因为它的RMSE值较低,并且具有较强的加载因子值(接近1),可以解释因子的形成。主成分分析法由11个变量组成3个因子。在主成分分析法中,兴趣对后期使用Shopee Pay的影响最主要的因素是利益的影响,因为利益影响变量在决策中的负荷因子最高。
{"title":"Factors Analysis of Interest in Using Pay Later in E-commerce Applications Using Principal Component Analysis and Maximum Likelihood Estimation Methods","authors":"Silvia Damayanti, Yusuf Durachman, Eva Khudzaeva","doi":"10.1109/CITSM56380.2022.9936014","DOIUrl":"https://doi.org/10.1109/CITSM56380.2022.9936014","url":null,"abstract":"Pay later is one of the fastest growing payment methods in E-Commerce Applications. Although the use of pay later is increasing, pay later is not the main payment tool that people choose. The purpose of this study is to determine the factors that influence the interest in using Pay later, especially in the Shopee application, and the most dominant factors by comparing two-factor extraction methods, namely Principal Component Analysis and Maximum Likelihood Estimation. Respondents in this study were 125 Shopee application users who had used Shopee Pay later which was carried out by purposive sampling method. The method used in this research is the quantitative method. The results of this study indicate that the principal component analysis method is a feasible method to use because it has a low value on the RMSE and has a strong loading factor value (close to 1) so it can explain the formation of factors. The Principal Component Analysis method produces 3 factors that are formed from 11 variables. The most dominant factor in the influence of interest in using Shopee Pay later with the Principal Component Analysis method is the effect of benefits because the variable of benefit influence has the highest loading factor in decision making.","PeriodicalId":342813,"journal":{"name":"2022 10th International Conference on Cyber and IT Service Management (CITSM)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126264413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fingerprint-based Security System in Smart Portable Display at Brawijaya Museum 基于指纹的智能便携式显示器安全系统在Brawijaya博物馆
Pub Date : 2022-09-20 DOI: 10.1109/CITSM56380.2022.9935878
A. Pramono, Tiara Ika Widia Primadani, Ida Bagus Ananta Wijaya, M. Huda, Muchammad Farchan, S. Budiman
The placement of artefacts on display at the museum can be placed on the floor, walls, showcases, or in portable displays. Problems that arise in museums related to artefacts are damage due to lighting factors, Indoor Air Quality (IAQ) factors, and acts of looting that irresponsible people often carry out. This research aims to create a portable museum display by implementing a fingerprint-based security system to protect the artefacts. This research used a single case study in manufacturing furniture as a portable display and implemented NodeMCU ESP8266 as a security system. In this research, the author uses a fingerprint reader as a trigger in the system. This study uses the right thumbnail to open the door of the portable display. On the other hand, when the operator is forced to open the door, the operator uses the left thumbnail. The display door will open, and no alarm will sound, but it will send an SOS SMS to the registered number informing that the door is forced to open. The microprocessor will also buzz the alarm and send an SMS if objects fall or are picked up by irresponsible people by breaking glass.
在博物馆展出的文物可以放置在地板上、墙壁上、陈列柜上或便携式陈列柜上。在博物馆中出现的与文物有关的问题是由于照明因素造成的损坏,室内空气质量(IAQ)因素,以及不负责任的人经常进行的抢劫行为。本研究旨在通过实施指纹安全系统来保护文物,创造便携式博物馆展示。本研究以生产家具作为便携式显示器的单一案例研究,并实现了NodeMCU ESP8266作为安全系统。在本研究中,作者在系统中使用指纹识别器作为触发器。本研究使用右缩略图打开便携式显示器的门。另一方面,当操作员被迫开门时,操作员使用左侧缩略图。显示门会打开,不会发出警报声,但它会向注册号码发送SOS短信,通知门被强行打开。如果物体掉落或被不负责任的人打碎玻璃捡起,微处理器还会发出警报并发送短信。
{"title":"Fingerprint-based Security System in Smart Portable Display at Brawijaya Museum","authors":"A. Pramono, Tiara Ika Widia Primadani, Ida Bagus Ananta Wijaya, M. Huda, Muchammad Farchan, S. Budiman","doi":"10.1109/CITSM56380.2022.9935878","DOIUrl":"https://doi.org/10.1109/CITSM56380.2022.9935878","url":null,"abstract":"The placement of artefacts on display at the museum can be placed on the floor, walls, showcases, or in portable displays. Problems that arise in museums related to artefacts are damage due to lighting factors, Indoor Air Quality (IAQ) factors, and acts of looting that irresponsible people often carry out. This research aims to create a portable museum display by implementing a fingerprint-based security system to protect the artefacts. This research used a single case study in manufacturing furniture as a portable display and implemented NodeMCU ESP8266 as a security system. In this research, the author uses a fingerprint reader as a trigger in the system. This study uses the right thumbnail to open the door of the portable display. On the other hand, when the operator is forced to open the door, the operator uses the left thumbnail. The display door will open, and no alarm will sound, but it will send an SOS SMS to the registered number informing that the door is forced to open. The microprocessor will also buzz the alarm and send an SMS if objects fall or are picked up by irresponsible people by breaking glass.","PeriodicalId":342813,"journal":{"name":"2022 10th International Conference on Cyber and IT Service Management (CITSM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126396713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 10th International Conference on Cyber and IT Service Management (CITSM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1