首页 > 最新文献

Proceedings of the 4th International Conference on Future Networks and Distributed Systems最新文献

英文 中文
Approach to combining different methods for detecting insiders 结合不同方法检测内部人员的方法
M. Buinevich, K. Izrailov, Igor Kotenko, I. Ushakov, D. Vlasov
The paper deals with the problem of internal intruders (insiders) in the organization. It presents Top-7 methods of insider detection and substantiates the necessity of their joint usage. A technique to combine different methods of insider detection is proposed. A combination of methods means using the results of only one of them, union or/and intersecting it with the results of others. The technique formalization and graphic interpretation are given, as well as expressions for completeness, precision, accuracy, error and F-measure. Visualization of the third method combination is provided as an example. The results of experiments on insider detection at the real corporate network using human and machine-based methods are presented.
本文研究了组织内部入侵者(insiders)的问题。提出了7大内幕检测方法,并论证了它们联合使用的必要性。提出了一种结合不同内部检测方法的技术。方法的组合意味着只使用其中一种方法的结果,并将其与其他方法的结果结合或交叉。给出了技术形式化和图形解释,并给出了完备性、精密度、准确度、误差和f -测度的表达式。提供第三种方法组合的可视化作为示例。本文介绍了在真实企业网络中使用基于人和基于机器的方法进行内部检测的实验结果。
{"title":"Approach to combining different methods for detecting insiders","authors":"M. Buinevich, K. Izrailov, Igor Kotenko, I. Ushakov, D. Vlasov","doi":"10.1145/3440749.3442619","DOIUrl":"https://doi.org/10.1145/3440749.3442619","url":null,"abstract":"The paper deals with the problem of internal intruders (insiders) in the organization. It presents Top-7 methods of insider detection and substantiates the necessity of their joint usage. A technique to combine different methods of insider detection is proposed. A combination of methods means using the results of only one of them, union or/and intersecting it with the results of others. The technique formalization and graphic interpretation are given, as well as expressions for completeness, precision, accuracy, error and F-measure. Visualization of the third method combination is provided as an example. The results of experiments on insider detection at the real corporate network using human and machine-based methods are presented.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124419466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of operating system security mechanisms for vulnerabilities 调查操作系统安全机制的漏洞
A. Katasonov, Aleksandr Tcvetkov, Anna Polyanicheva, A. Krasov
Nowadays, the ways of obtaining unauthorized access to devices and are growing due to the increase in the volume of transmitted information. The topic of the article "Investigation of operating system security mechanisms for vulnerabilities" is to study the operating system vulnerability to attacks of unauthorized access. This article discusses the various possibilities for implementing internal attacks to gain unauthorized access. A criterion was selected, and a comparative analysis of operating system vulnerabilities to these attacks was carried out, as well as recommendations for improving resistance to these attacks are proposed.
如今,由于传输信息量的增加,未经授权访问设备和设备的方法也在不断增加。本文“针对漏洞的操作系统安全机制调查”的主题是研究操作系统面对未经授权访问攻击的脆弱性。本文讨论了实现内部攻击以获得未经授权访问的各种可能性。选择了一个标准,对这些攻击的操作系统漏洞进行了比较分析,并提出了提高对这些攻击的抵抗力的建议。
{"title":"Investigation of operating system security mechanisms for vulnerabilities","authors":"A. Katasonov, Aleksandr Tcvetkov, Anna Polyanicheva, A. Krasov","doi":"10.1145/3440749.3442611","DOIUrl":"https://doi.org/10.1145/3440749.3442611","url":null,"abstract":"Nowadays, the ways of obtaining unauthorized access to devices and are growing due to the increase in the volume of transmitted information. The topic of the article \"Investigation of operating system security mechanisms for vulnerabilities\" is to study the operating system vulnerability to attacks of unauthorized access. This article discusses the various possibilities for implementing internal attacks to gain unauthorized access. A criterion was selected, and a comparative analysis of operating system vulnerabilities to these attacks was carried out, as well as recommendations for improving resistance to these attacks are proposed.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128836291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multitask Aspect_Based Sentiment Analysis with Integrated Bidirectional LSTM & CNN Model. 基于双向LSTM和CNN模型的多任务情感分析。
T. Tran, Ha Hoang Thi Thanh, Phuong Hoai Dang, M. Riveill
Sentiment analysis involves building the opinion collection and classification system. Aspect-based sentiment analysis focuses on the ability to extract and summarize opinions on specific aspects of entities within sentiment document. In this paper, we propose a novel supervised learning approach using deep learning techniques for multitask aspect-based opinion mining system that support four main subtasks: extract opinion target, classify aspect-entity (category), and estimate opinion polarity (positive, neutral, negative) on each extracted aspect of entity. Using extra POS layer to identify morphological features of words combines with stacking architecture of BiLSTM and CNN with word embeddings achieved by training GloVe on Restaurant domain reviews of the SemEval 2016 benchmark dataset in our proposed method is aimed at increasing the accuracy of the model. Experimental results showed that our multitask aspect-based sentiment analysis model has extracted and classified main above subtasks concurrently and achieved significantly better accuracy than the state-of-the-art methods.
情感分析涉及建立意见收集和分类系统。基于方面的情感分析侧重于提取和总结情感文档中实体特定方面的意见的能力。在本文中,我们提出了一种新的监督学习方法,该方法使用深度学习技术用于多任务基于方面的意见挖掘系统,该系统支持四个主要子任务:提取意见目标,对方面-实体(类别)进行分类,并在每个提取的实体方面估计意见极性(积极,中立,消极)。利用额外的POS层来识别词的形态特征,结合BiLSTM和CNN的堆叠架构,并通过在SemEval 2016基准数据集的Restaurant域评论上训练GloVe实现词嵌入,我们提出的方法旨在提高模型的准确性。实验结果表明,我们的多任务面向情感分析模型能够同时提取和分类上述主要子任务,并取得了显著优于现有方法的准确率。
{"title":"Multitask Aspect_Based Sentiment Analysis with Integrated Bidirectional LSTM & CNN Model.","authors":"T. Tran, Ha Hoang Thi Thanh, Phuong Hoai Dang, M. Riveill","doi":"10.1145/3440749.3442656","DOIUrl":"https://doi.org/10.1145/3440749.3442656","url":null,"abstract":"Sentiment analysis involves building the opinion collection and classification system. Aspect-based sentiment analysis focuses on the ability to extract and summarize opinions on specific aspects of entities within sentiment document. In this paper, we propose a novel supervised learning approach using deep learning techniques for multitask aspect-based opinion mining system that support four main subtasks: extract opinion target, classify aspect-entity (category), and estimate opinion polarity (positive, neutral, negative) on each extracted aspect of entity. Using extra POS layer to identify morphological features of words combines with stacking architecture of BiLSTM and CNN with word embeddings achieved by training GloVe on Restaurant domain reviews of the SemEval 2016 benchmark dataset in our proposed method is aimed at increasing the accuracy of the model. Experimental results showed that our multitask aspect-based sentiment analysis model has extracted and classified main above subtasks concurrently and achieved significantly better accuracy than the state-of-the-art methods.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128624546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Proceedings of the 4th International Conference on Future Networks and Distributed Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1