Pub Date : 2014-12-18DOI: 10.1109/CCST.2014.6986976
A. D. Rosa, A. Piva, M. Fontani, Massimo Iuliani
With the increasing diffusion in our life of digital audio and visual contents, the investigation on multimedia objects is acquiring more and more interest within the framework of digital investigations, that consider all the aspects including digital data and digital devices. Starting from the international standards and recommendations on the correct procedures to deal with digital evidences and investigations appropriately, and exploiting the Multimedia Forensics technologies, we propose in this paper a possible methodology for correctly investigating audio-visual contents. Going through the steps of the proposed methodology in an illustrative case study, we show the capability of Multimedia Forensics as a tool for understanding the history of multimedia contents presented to the court as potential digital evidence.
{"title":"Investigating multimedia contents","authors":"A. D. Rosa, A. Piva, M. Fontani, Massimo Iuliani","doi":"10.1109/CCST.2014.6986976","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986976","url":null,"abstract":"With the increasing diffusion in our life of digital audio and visual contents, the investigation on multimedia objects is acquiring more and more interest within the framework of digital investigations, that consider all the aspects including digital data and digital devices. Starting from the international standards and recommendations on the correct procedures to deal with digital evidences and investigations appropriately, and exploiting the Multimedia Forensics technologies, we propose in this paper a possible methodology for correctly investigating audio-visual contents. Going through the steps of the proposed methodology in an illustrative case study, we show the capability of Multimedia Forensics as a tool for understanding the history of multimedia contents presented to the court as potential digital evidence.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129085194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/CCST.2014.6987049
O. Kainz, F. Jakab
In this paper the model for real-time monitoring of selected premises is presented and implemented as a Web based interactive interface while utilizing open-source hardware. The rudimentary idea is based on the capabilities offered by contemporary Web technology which enables the development of complex and interactive solutions - essential for our purpose is HTML5 and JavaScript technology. Approach we take incorporates three major parts - model design, interface design and monitoring tool development, when combined together they provide interface for monitoring within personal intranet or over the Internet. Primary outputs provide the ability to monitor the movement and count the number of individuals. Solution presented in this paper may be extended to entire monitoring system consisted of multiple nodes.
{"title":"Web-based interface for real-time movement monitoring","authors":"O. Kainz, F. Jakab","doi":"10.1109/CCST.2014.6987049","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987049","url":null,"abstract":"In this paper the model for real-time monitoring of selected premises is presented and implemented as a Web based interactive interface while utilizing open-source hardware. The rudimentary idea is based on the capabilities offered by contemporary Web technology which enables the development of complex and interactive solutions - essential for our purpose is HTML5 and JavaScript technology. Approach we take incorporates three major parts - model design, interface design and monitoring tool development, when combined together they provide interface for monitoring within personal intranet or over the Internet. Primary outputs provide the ability to monitor the movement and count the number of individuals. Solution presented in this paper may be extended to entire monitoring system consisted of multiple nodes.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131838562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/CCST.2014.6986988
Noura Ben Hadjy Youssef, W. H. Youssef, Mohsen Machhout, R. Tourki, K. Torki
Embedded processors are an integral part of many communications devices such as mobile phones, secure access to private networks, electronic commerce and smart cards. However, such devices often provide critical functions that could be sabotaged by malicious entities. The supply of security for data exchange on basis of embedded systems is a very important objection to accomplish. This paper focuses on instruction set extensions of symmetric key algorithm. The main contribution of this work is the extension of SPARC V8 LEON2 processor core with cryptographic Instruction Set Extensions. The proposed cryptographic algorithm is Advanced Encryption Standard (AES). Our customized instructions offer a cryptographic solution for embedded devices, in order to ensure communications security. Furthermore, as embedded systems are extremely resource constrained devices in terms of computing capabilities, power and memory area; these technological challenges are respected. Our extended LEON2 SPARC V8 core with cryptographic ISE is implemented using Xilinx XC5VFX70t FPGA device and an ASIC CMOS 40 nm technology. The total area of the resulting Chip is about 0.28 mm2 and can achieve an operating frequency of 3.33 GHz. The estimated power consumption of the chip was 13.3 mW at 10 MHz. Hardware cost and power consumption evaluation are provided for different clock frequencies, the achieved results show that our circuit is able to be arranged in many security domains such as embedded services routers, real-time multimedia applications and smartcard.
{"title":"Instruction set extensions of AES algorithms for 32-bit processors","authors":"Noura Ben Hadjy Youssef, W. H. Youssef, Mohsen Machhout, R. Tourki, K. Torki","doi":"10.1109/CCST.2014.6986988","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986988","url":null,"abstract":"Embedded processors are an integral part of many communications devices such as mobile phones, secure access to private networks, electronic commerce and smart cards. However, such devices often provide critical functions that could be sabotaged by malicious entities. The supply of security for data exchange on basis of embedded systems is a very important objection to accomplish. This paper focuses on instruction set extensions of symmetric key algorithm. The main contribution of this work is the extension of SPARC V8 LEON2 processor core with cryptographic Instruction Set Extensions. The proposed cryptographic algorithm is Advanced Encryption Standard (AES). Our customized instructions offer a cryptographic solution for embedded devices, in order to ensure communications security. Furthermore, as embedded systems are extremely resource constrained devices in terms of computing capabilities, power and memory area; these technological challenges are respected. Our extended LEON2 SPARC V8 core with cryptographic ISE is implemented using Xilinx XC5VFX70t FPGA device and an ASIC CMOS 40 nm technology. The total area of the resulting Chip is about 0.28 mm2 and can achieve an operating frequency of 3.33 GHz. The estimated power consumption of the chip was 13.3 mW at 10 MHz. Hardware cost and power consumption evaluation are provided for different clock frequencies, the achieved results show that our circuit is able to be arranged in many security domains such as embedded services routers, real-time multimedia applications and smartcard.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115372876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/CCST.2014.6986985
Javier Galbally, Iwen Coisel, Ignacio Sanchez
Passwords are still the most widely deployed form of authentication for both local applications and on-line services. For several decades, password policies have aimed at measuring password strength using simple sets of rules in an attempt to guide the users towards the selection of stronger passwords. In this paper, we provide an alternative vision to the existing password strength metrics by proposing a new statistical approach that is better aligned with the actual resistance of passwords to guessing attacks. The proposed probabilistic framework is able to objectively measure the strength of a given password taking advantage of the information available in the several public datasets of passwords.
{"title":"A probabilistic framework for improved password strength metrics","authors":"Javier Galbally, Iwen Coisel, Ignacio Sanchez","doi":"10.1109/CCST.2014.6986985","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986985","url":null,"abstract":"Passwords are still the most widely deployed form of authentication for both local applications and on-line services. For several decades, password policies have aimed at measuring password strength using simple sets of rules in an attempt to guide the users towards the selection of stronger passwords. In this paper, we provide an alternative vision to the existing password strength metrics by proposing a new statistical approach that is better aligned with the actual resistance of passwords to guessing attacks. The proposed probabilistic framework is able to objectively measure the strength of a given password taking advantage of the information available in the several public datasets of passwords.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127491073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/CCST.2014.6986987
A. Salazar, G. Safont, L. Vergara
Banks collect large amount of historical records corresponding to millions of credit cards operations, but, unfortunately, only a small portion, if any, is open access. This is because, e.g., the records include confidential customer data and banks are afraid of public quantitative evidence of existing fraud operations. This paper tackles this problem with the application of surrogate techniques to generate new synthetic credit card data. The quality of the surrogate multivariate data is guaranteed by constraining them to have the same covariance, marginal distributions, and joint distributions as the original multivariate data. The performance of fraud detection algorithms (in terms of receiver operating characteristic (ROC) curves) using a varying proportion of real and surrogate data is tested. We demonstrate the feasibility of surrogates in a real scenario considering very low false alarm and high disproportion between legitimate and fraud operations.
{"title":"Surrogate techniques for testing fraud detection algorithms in credit card operations","authors":"A. Salazar, G. Safont, L. Vergara","doi":"10.1109/CCST.2014.6986987","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986987","url":null,"abstract":"Banks collect large amount of historical records corresponding to millions of credit cards operations, but, unfortunately, only a small portion, if any, is open access. This is because, e.g., the records include confidential customer data and banks are afraid of public quantitative evidence of existing fraud operations. This paper tackles this problem with the application of surrogate techniques to generate new synthetic credit card data. The quality of the surrogate multivariate data is guaranteed by constraining them to have the same covariance, marginal distributions, and joint distributions as the original multivariate data. The performance of fraud detection algorithms (in terms of receiver operating characteristic (ROC) curves) using a varying proportion of real and surrogate data is tested. We demonstrate the feasibility of surrogates in a real scenario considering very low false alarm and high disproportion between legitimate and fraud operations.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121549711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/CCST.2014.6986969
Pierluigi Pelargonio, M. Pugliese
Nowadays local public transportation services (TPL) in large cities have to be considered critical infrastructures as, for instance, power plants or dams. Especially in Rome, where quite a million citizens per day uses TPL, any interruption in the public services can cause severe deterioration in urban life quality, congestion, compromised mobility and accessibility and enhanced pollution. Moreover TPL, and particularly subways, has been (remember the tragic facts in London subway on July 7th 2005) and still can be a target for terrorist threats and attacks. Therefore security must be considered as a crucial component in TPL services offer. Nevertheless lessons learnt from our experience, have suggested to apply some enhancements to the “classical” security model to switch the security operator from a mostly passive to a quite pro-active role and from a reaction to occurred events to preemptive actions. In other words, the role of security operators has to move from simple passive control (e.g. “see” events) in real-time, transferring data to stakeholders and ensuring timely decision-making without unnecessary steps in the communication chain. This paper will show how the advanced security services provided by our “PANDORA” system can enable this paradigm evolution. The “PANDORA” system is funded by the Italian Infrastructure and Transportation Ministry within the program framework of TPL security enhancement in the largest Italian cities.
{"title":"Enhancing security in public transportation services of Roma: The PANDORA system","authors":"Pierluigi Pelargonio, M. Pugliese","doi":"10.1109/CCST.2014.6986969","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986969","url":null,"abstract":"Nowadays local public transportation services (TPL) in large cities have to be considered critical infrastructures as, for instance, power plants or dams. Especially in Rome, where quite a million citizens per day uses TPL, any interruption in the public services can cause severe deterioration in urban life quality, congestion, compromised mobility and accessibility and enhanced pollution. Moreover TPL, and particularly subways, has been (remember the tragic facts in London subway on July 7th 2005) and still can be a target for terrorist threats and attacks. Therefore security must be considered as a crucial component in TPL services offer. Nevertheless lessons learnt from our experience, have suggested to apply some enhancements to the “classical” security model to switch the security operator from a mostly passive to a quite pro-active role and from a reaction to occurred events to preemptive actions. In other words, the role of security operators has to move from simple passive control (e.g. “see” events) in real-time, transferring data to stakeholders and ensuring timely decision-making without unnecessary steps in the communication chain. This paper will show how the advanced security services provided by our “PANDORA” system can enable this paradigm evolution. The “PANDORA” system is funded by the Italian Infrastructure and Transportation Ministry within the program framework of TPL security enhancement in the largest Italian cities.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129486113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/CCST.2014.6986975
M. Mauro, M. Longo
The classification of data sessions on the Internet is a crucial issue for Authorities involved in lawful interception. Some Internet Service Providers (ISP) can provide a panel of IP nodes that, tuned to detect specific data patterns, are able to send an alert when a data session in a targeted class is found. Unluckily, several applications generate a bulk of IP traffic not characterized by a recognizable sequence of information segments, except, may be, for some short phases such as setup and release. Whenever such phases are not intercepted, no specific pattern in the IP traffic can help toward semantic recognition and hence statistical pattern recognition is in force. This is actually the case of Skype, the popular application for VoIP communications. In this paper we propose and evaluate a decision theory based system allowing to recognize Skype traffic with the help of an open-source machine learning tool: Weka.
{"title":"Skype traffic detection: A decision theory based tool","authors":"M. Mauro, M. Longo","doi":"10.1109/CCST.2014.6986975","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986975","url":null,"abstract":"The classification of data sessions on the Internet is a crucial issue for Authorities involved in lawful interception. Some Internet Service Providers (ISP) can provide a panel of IP nodes that, tuned to detect specific data patterns, are able to send an alert when a data session in a targeted class is found. Unluckily, several applications generate a bulk of IP traffic not characterized by a recognizable sequence of information segments, except, may be, for some short phases such as setup and release. Whenever such phases are not intercepted, no specific pattern in the IP traffic can help toward semantic recognition and hence statistical pattern recognition is in force. This is actually the case of Skype, the popular application for VoIP communications. In this paper we propose and evaluate a decision theory based system allowing to recognize Skype traffic with the help of an open-source machine learning tool: Weka.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134062720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/CCST.2014.6987034
B. Fernandez-Saavedra, R. Sánchez-Reillo, J. Liu-Jimenez, J. G. Ruiz
This paper describes best practices for the security evaluation of biometric systems. This type of evaluation has been addressed in several documents. However, not all of these documents describe the complete evaluation methodology, or are focused on biometrics or do propose clear testing procedures. Therefore, this work defines the most proper way to carry out this evaluation methodology considering biometrics and the special characteristics of these kind of systems (i.e. biometrics is non-deterministic technology highly influenced by user behavior and the operational environment). In particular, this paper specifies how to select which attacks shall be studied, how to conduct such attacks and which is the most suitable method to report the evaluation results.
{"title":"Best practices for the security evaluation of biometric systems","authors":"B. Fernandez-Saavedra, R. Sánchez-Reillo, J. Liu-Jimenez, J. G. Ruiz","doi":"10.1109/CCST.2014.6987034","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987034","url":null,"abstract":"This paper describes best practices for the security evaluation of biometric systems. This type of evaluation has been addressed in several documents. However, not all of these documents describe the complete evaluation methodology, or are focused on biometrics or do propose clear testing procedures. Therefore, this work defines the most proper way to carry out this evaluation methodology considering biometrics and the special characteristics of these kind of systems (i.e. biometrics is non-deterministic technology highly influenced by user behavior and the operational environment). In particular, this paper specifies how to select which attacks shall be studied, how to conduct such attacks and which is the most suitable method to report the evaluation results.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134210785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/CCST.2014.6987044
M. Mauro, Cesario Di Sarno
Nowadays, the Internet Service Providers have to keep track of and in some cases to analyze for legal issues, a great amount of Internet data. Real-time big data processing and analysis introduce new challenges that must be addressed by system engineers. This is because: 1) traditional technologies exploiting databases are not designed to process a huge amount of data in real-time 2) classic machine learning algorithms implemented by widely adopted tools as Weka or R are not designed to perform “on the fly” analysis on streamed data. In this paper the authors propose an architecture that makes the real-time big data processing and analysis possible. The proposed architecture is based on two main components: a stream processing engine called Apache Storm and a framework called Yahoo SAMOA allowing to perform data analysis through distributed streaming machine learning algorithms. Our architecture is tested for Skype traffic recognition within network traffic generated by several Personal Computers in a streamed way. Experimental results have shown the effectiveness of proposed solution.
{"title":"A framework for Internet data real-time processing: A machine-learning approach","authors":"M. Mauro, Cesario Di Sarno","doi":"10.1109/CCST.2014.6987044","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987044","url":null,"abstract":"Nowadays, the Internet Service Providers have to keep track of and in some cases to analyze for legal issues, a great amount of Internet data. Real-time big data processing and analysis introduce new challenges that must be addressed by system engineers. This is because: 1) traditional technologies exploiting databases are not designed to process a huge amount of data in real-time 2) classic machine learning algorithms implemented by widely adopted tools as Weka or R are not designed to perform “on the fly” analysis on streamed data. In this paper the authors propose an architecture that makes the real-time big data processing and analysis possible. The proposed architecture is based on two main components: a stream processing engine called Apache Storm and a framework called Yahoo SAMOA allowing to perform data analysis through distributed streaming machine learning algorithms. Our architecture is tested for Skype traffic recognition within network traffic generated by several Personal Computers in a streamed way. Experimental results have shown the effectiveness of proposed solution.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128897446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/CCST.2014.6986984
Mohamad El-Abed, Mostafa Dafer, Ramzi El Khayat
The performance evaluation of biometric systems is being highly considered in order to increase the widespread use of this technology in our daily life. Nowadays, there are few public benchmarks available to researchers towards this goal. In order to contribute in solving this problem, we present in this paper a keystroke dynamics benchmark collected using a touch screen phone. An analysis of the collected features is also covered in this paper.
{"title":"RHU Keystroke: A mobile-based benchmark for keystroke dynamics systems","authors":"Mohamad El-Abed, Mostafa Dafer, Ramzi El Khayat","doi":"10.1109/CCST.2014.6986984","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986984","url":null,"abstract":"The performance evaluation of biometric systems is being highly considered in order to increase the widespread use of this technology in our daily life. Nowadays, there are few public benchmarks available to researchers towards this goal. In order to contribute in solving this problem, we present in this paper a keystroke dynamics benchmark collected using a touch screen phone. An analysis of the collected features is also covered in this paper.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121298803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}