首页 > 最新文献

2013 9th International Conference on Information Assurance and Security (IAS)最新文献

英文 中文
An intelligent system for video events detection 一种智能视频事件检测系统
Pub Date : 2013-12-01 DOI: 10.1109/ISIAS.2013.6947742
Yassine Aribi, A. Wali, A. Alimi
The Event detection method from a video surveillance has received much attention in the image processing. In this paper, we present an overview of a new approach for event detection from video surveillance system based on incremental learning. In our approach, each event is modeled by a set of states, and each state is represented by a learning model containing a positive class (event) and a negative class (non-event). Experiments on real image sequences have shown encouraging results.
视频监控中的事件检测方法在图像处理中受到了广泛的关注。本文概述了一种基于增量学习的视频监控系统事件检测新方法。在我们的方法中,每个事件由一组状态建模,每个状态由一个学习模型表示,该模型包含一个正类(事件)和一个负类(非事件)。在真实图像序列上的实验结果令人鼓舞。
{"title":"An intelligent system for video events detection","authors":"Yassine Aribi, A. Wali, A. Alimi","doi":"10.1109/ISIAS.2013.6947742","DOIUrl":"https://doi.org/10.1109/ISIAS.2013.6947742","url":null,"abstract":"The Event detection method from a video surveillance has received much attention in the image processing. In this paper, we present an overview of a new approach for event detection from video surveillance system based on incremental learning. In our approach, each event is modeled by a set of states, and each state is represented by a learning model containing a positive class (event) and a negative class (non-event). Experiments on real image sequences have shown encouraging results.","PeriodicalId":370107,"journal":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115568620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ARMLCC: Adaptive and recovery-based Multi-Layer Connected Chain Mechanism for Multicast Source Authentication ARMLCC:基于自适应和恢复的多播源认证的多层连接链机制
Pub Date : 2013-12-01 DOI: 10.1109/ISIAS.2013.6947730
Hamdi Eltaief, A. Kamel, H. Youssef
Source authentication in multicast communication is essential and challenging requirement. In this paper we address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network model, robustness against packet loss, packet overhead and computing efficiency are important parameters to be taken into account when designing a multicast source authentication mechanism. The proposed scheme is based on adaptive and multi-layer connected chain structure in addition to an efficient recovery information model. It adapts the redundancy chaining degree depending on the actual packet loss rate in the network. Our mechanism provides non-repudiation of the origin and tolerates packet loss with low communication overhead, low delay and buffer capacity on the receiver side. NS-2 simulations show significant improvements over mechanisms in the same category.
在组播通信中,源认证是一个非常重要且具有挑战性的要求。本文研究了当通信信道处于对手控制下,对手可以丢弃、重新排序或注入数据时,组播流的身份验证问题。在这种网络模型中,对丢包的鲁棒性、包开销和计算效率是设计组播源认证机制时需要考虑的重要参数。该方案基于自适应多层连接链结构和高效的恢复信息模型。它根据网络中的实际丢包率来调整冗余链度。我们的机制提供了起源的不可否认性,并且在接收端具有低通信开销、低延迟和缓冲容量的情况下容忍数据包丢失。NS-2模拟显示,在同类机制上有显著改进。
{"title":"ARMLCC: Adaptive and recovery-based Multi-Layer Connected Chain Mechanism for Multicast Source Authentication","authors":"Hamdi Eltaief, A. Kamel, H. Youssef","doi":"10.1109/ISIAS.2013.6947730","DOIUrl":"https://doi.org/10.1109/ISIAS.2013.6947730","url":null,"abstract":"Source authentication in multicast communication is essential and challenging requirement. In this paper we address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network model, robustness against packet loss, packet overhead and computing efficiency are important parameters to be taken into account when designing a multicast source authentication mechanism. The proposed scheme is based on adaptive and multi-layer connected chain structure in addition to an efficient recovery information model. It adapts the redundancy chaining degree depending on the actual packet loss rate in the network. Our mechanism provides non-repudiation of the origin and tolerates packet loss with low communication overhead, low delay and buffer capacity on the receiver side. NS-2 simulations show significant improvements over mechanisms in the same category.","PeriodicalId":370107,"journal":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125998374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Profiling mobile malware behaviour through hybrid malware analysis approach 利用混合恶意软件分析方法分析移动恶意软件行为
Pub Date : 2013-12-01 DOI: 10.1109/ISIAS.2013.6947737
M. Z. Mas'ud, S. Shahrin, M. F. Abdollah, S. R. Selamat, R. Yusof, R. Ahmad
Nowadays, the usage of mobile device among the community worldwide has been tremendously increased. With this proliferation of mobile devices, more users are able to access the internet for variety of online application and services. As the use of mobile devices and applications grows, the rate of vulnerabilities exploitation and sophistication of attack towards the mobile user are increasing as well. To date, Google's Android Operating System (OS) are among the widely used OS for the mobile devices, the openness design and ease of use have made them popular among developer and user. Despite the advantages the android-based mobile devices have, it also invited the malware author to exploit the mobile application on the market. Prior to this matter, this research focused on investigating the behaviour of mobile malware through hybrid approach. The hybrid approach correlates and reconstructs the result from the static and dynamic malware analysis in producing a trace of malicious event. Based on the finding, this research proposed a general mobile malware behaviour model that can contribute in identifying the key features in detecting mobile malware on an Android Platform device.
如今,移动设备在全球范围内的使用已经大大增加。随着移动设备的普及,越来越多的用户能够访问互联网,使用各种在线应用程序和服务。随着移动设备和应用程序使用的增长,针对移动用户的漏洞利用率和攻击的复杂性也在增加。迄今为止,b谷歌的Android操作系统(OS)是应用最广泛的移动设备操作系统之一,其开放性设计和易用性使其深受开发者和用户的欢迎。尽管基于android的移动设备具有优势,但它也邀请恶意软件作者利用市场上的移动应用程序。在此之前,本研究主要通过混合方法调查移动恶意软件的行为。该方法将静态和动态恶意软件分析的结果进行关联和重构,从而产生恶意事件的踪迹。基于这一发现,本研究提出了一种通用的移动恶意软件行为模型,该模型有助于识别Android平台设备上检测移动恶意软件的关键特征。
{"title":"Profiling mobile malware behaviour through hybrid malware analysis approach","authors":"M. Z. Mas'ud, S. Shahrin, M. F. Abdollah, S. R. Selamat, R. Yusof, R. Ahmad","doi":"10.1109/ISIAS.2013.6947737","DOIUrl":"https://doi.org/10.1109/ISIAS.2013.6947737","url":null,"abstract":"Nowadays, the usage of mobile device among the community worldwide has been tremendously increased. With this proliferation of mobile devices, more users are able to access the internet for variety of online application and services. As the use of mobile devices and applications grows, the rate of vulnerabilities exploitation and sophistication of attack towards the mobile user are increasing as well. To date, Google's Android Operating System (OS) are among the widely used OS for the mobile devices, the openness design and ease of use have made them popular among developer and user. Despite the advantages the android-based mobile devices have, it also invited the malware author to exploit the mobile application on the market. Prior to this matter, this research focused on investigating the behaviour of mobile malware through hybrid approach. The hybrid approach correlates and reconstructs the result from the static and dynamic malware analysis in producing a trace of malicious event. Based on the finding, this research proposed a general mobile malware behaviour model that can contribute in identifying the key features in detecting mobile malware on an Android Platform device.","PeriodicalId":370107,"journal":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133562467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Privacy preserving processing of data decision tree based on sample selection and Singular Value Decomposition 基于样本选择和奇异值分解的数据决策树隐私保护处理
Pub Date : 2013-12-01 DOI: 10.1109/ISIAS.2013.6947739
Priyank Jain, Neelam Pathak, Pratibhadevi Tapashetti, A. Umesh
Data mining is a set of automated techniques used to extract hidden or buried information from large databases. With the development of data mining technologies, privacy protection has become a challenge for data mining applications in many fields. To solve this problem, many privacy-preserving data mining methods have been proposed. One important type of such methods is based on Singular Value Decomposition (SVD). In the proposed algorithm, attributes are grouped according to their distance difference similarity by clustering the data set using decision tree classification. Secondly, the algorithm packetizes the attributes according to their SA value in each group. Thirdly, for each group it selects attributes from the smallest bucket and searches for a similar attributes in the attributes-1 largest buckets from the same group to create an equivalence class following the unique attribute-distinct diversity anonymization model. The proposed algorithm satisfies the “utility based anonymization principle that crucial information is protected from being suppressed. Also, weights given to attributes improve clustering and give the ability to control the generalization's depth. In prototype decision tree is combination of clustering and classification technique such methods are called ensemble classifier, this new proposed method is more efficient in balancing data privacy and data utility.
数据挖掘是一组用于从大型数据库中提取隐藏或隐藏信息的自动化技术。随着数据挖掘技术的发展,隐私保护已成为数据挖掘在许多领域应用所面临的挑战。为了解决这一问题,人们提出了许多保护隐私的数据挖掘方法。其中一种重要的方法是基于奇异值分解(SVD)。该算法采用决策树分类对数据集进行聚类,根据属性的距离差相似度对属性进行分组。其次,算法根据属性在每组中的SA值对属性进行分组;第三,对于每个组,它从最小的桶中选择属性,并在同一组的attributes-1最大的桶中搜索相似的属性,以创建一个遵循唯一属性-不同多样性匿名化模型的等价类。该算法满足“基于效用的匿名化”原则,即关键信息不会被抑制。此外,赋予属性的权重可以改善聚类,并提供控制泛化深度的能力。在原型决策树是聚类和分类技术的结合,这种方法被称为集成分类器,这种新方法在平衡数据隐私和数据效用方面更有效。
{"title":"Privacy preserving processing of data decision tree based on sample selection and Singular Value Decomposition","authors":"Priyank Jain, Neelam Pathak, Pratibhadevi Tapashetti, A. Umesh","doi":"10.1109/ISIAS.2013.6947739","DOIUrl":"https://doi.org/10.1109/ISIAS.2013.6947739","url":null,"abstract":"Data mining is a set of automated techniques used to extract hidden or buried information from large databases. With the development of data mining technologies, privacy protection has become a challenge for data mining applications in many fields. To solve this problem, many privacy-preserving data mining methods have been proposed. One important type of such methods is based on Singular Value Decomposition (SVD). In the proposed algorithm, attributes are grouped according to their distance difference similarity by clustering the data set using decision tree classification. Secondly, the algorithm packetizes the attributes according to their SA value in each group. Thirdly, for each group it selects attributes from the smallest bucket and searches for a similar attributes in the attributes-1 largest buckets from the same group to create an equivalence class following the unique attribute-distinct diversity anonymization model. The proposed algorithm satisfies the “utility based anonymization principle that crucial information is protected from being suppressed. Also, weights given to attributes improve clustering and give the ability to control the generalization's depth. In prototype decision tree is combination of clustering and classification technique such methods are called ensemble classifier, this new proposed method is more efficient in balancing data privacy and data utility.","PeriodicalId":370107,"journal":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134534333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Detecting stepping-stones under the influence of packet jittering 数据包抖动影响下的踏脚石检测
Pub Date : 2013-12-01 DOI: 10.1109/ISIAS.2013.6947729
Wei Ding, Khoa N. Le, S. S. Huang
Hackers often use a chain of intermediate stepping-stone hosts to hide their identity before launching an attack. This type of stepping-stone attack can be detected by applying timing-based correlation algorithms on the connections in and out of a host. However, hackers can add chaff packets or jitter the original packets to decrease the detection rate of these correlation algorithms. This paper proposes a novel method to detect intrusions under the influence of packet jittering. Our study shows how the distribution of the inter-arrival time gaps of a jittered connection differs from connections without jittering. We study the impact of the jittering probability model on the detection rate as well as parameters of the model upon the detection rate. Our study suggests a way to detect stepping-stones and complements the existing correlation-based stepping-stone detection algorithms to form a much more robust solution.
在发动攻击之前,黑客通常会使用一系列中间跳板主机来隐藏自己的身份。通过对进出主机的连接应用基于时间的相关算法,可以检测到这种类型的踏脚石攻击。但是,黑客可以通过添加箔条数据包或对原始数据包进行抖动来降低这些相关算法的检测率。本文提出了一种检测数据包抖动影响下的入侵的新方法。我们的研究显示了有抖动的连接与无抖动的连接的到达间隔分布是如何不同的。研究了抖动概率模型对检测率的影响,以及模型参数对检测率的影响。我们的研究提出了一种检测踏脚石的方法,并补充了现有的基于相关性的踏脚石检测算法,形成了一个更鲁棒的解决方案。
{"title":"Detecting stepping-stones under the influence of packet jittering","authors":"Wei Ding, Khoa N. Le, S. S. Huang","doi":"10.1109/ISIAS.2013.6947729","DOIUrl":"https://doi.org/10.1109/ISIAS.2013.6947729","url":null,"abstract":"Hackers often use a chain of intermediate stepping-stone hosts to hide their identity before launching an attack. This type of stepping-stone attack can be detected by applying timing-based correlation algorithms on the connections in and out of a host. However, hackers can add chaff packets or jitter the original packets to decrease the detection rate of these correlation algorithms. This paper proposes a novel method to detect intrusions under the influence of packet jittering. Our study shows how the distribution of the inter-arrival time gaps of a jittered connection differs from connections without jittering. We study the impact of the jittering probability model on the detection rate as well as parameters of the model upon the detection rate. Our study suggests a way to detect stepping-stones and complements the existing correlation-based stepping-stone detection algorithms to form a much more robust solution.","PeriodicalId":370107,"journal":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132349252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A survey on digital tracing traitors schemes 数字追踪叛徒计划的调查
Pub Date : 2013-12-01 DOI: 10.1109/ISIAS.2013.6947738
Faten Chaabane, Maha Charfeddine, C. Amar
The encroachment of Internet and Peer to Peer networks has really facilitated our daily lives and works but it contributes to another dangerous phenomenon which is copying a digital content without having authorization, called piracy. To handle this phenomenon, several techniques of tracing traitors were proposed, by combining in the same time a fingerprinting technique to a watermarking one. In this paper, we first present basic notions for multimedia traceability framework: Anti Collusion code (ACC) and the watermarking technique. We show a study of available tracing traitors' schemes and we propose a comparison of accusation ability and computational costs of these techniques. Next we describe our future contribution in this target.
互联网和点对点网络的入侵确实便利了我们的日常生活和工作,但它也导致了另一种危险的现象,即未经授权复制数字内容,称为盗版。为了解决这一问题,提出了几种跟踪叛徒的技术,将指纹技术与水印技术结合起来。本文首先提出了多媒体可追溯框架的基本概念:反串通码和水印技术。我们展示了一项可用的追踪叛徒方案的研究,并提出了这些技术的指控能力和计算成本的比较。接下来,我们将描述我们在这一目标中的未来贡献。
{"title":"A survey on digital tracing traitors schemes","authors":"Faten Chaabane, Maha Charfeddine, C. Amar","doi":"10.1109/ISIAS.2013.6947738","DOIUrl":"https://doi.org/10.1109/ISIAS.2013.6947738","url":null,"abstract":"The encroachment of Internet and Peer to Peer networks has really facilitated our daily lives and works but it contributes to another dangerous phenomenon which is copying a digital content without having authorization, called piracy. To handle this phenomenon, several techniques of tracing traitors were proposed, by combining in the same time a fingerprinting technique to a watermarking one. In this paper, we first present basic notions for multimedia traceability framework: Anti Collusion code (ACC) and the watermarking technique. We show a study of available tracing traitors' schemes and we propose a comparison of accusation ability and computational costs of these techniques. Next we describe our future contribution in this target.","PeriodicalId":370107,"journal":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117242019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Towards enforcing on-the-fly policies in BYOD environments 在BYOD环境中执行动态策略
Pub Date : 2013-12-01 DOI: 10.1109/ISIAS.2013.6947734
Gianpiero Costantino, F. Martinelli, A. Saracino, D. Sgandurra
The Bring Your Own Device (BYOD) paradigm is becoming extremely popular across all kind of organizations. In fact, employees are continually trying to incorporate their personal devices, e.g. smartphones and tablets, into the office to perform some of their work or simply to access the Internet with a device they trust or they are more familiar with. Unfortunately, several security issues may arise from all these external devices accessing the corporate network. To address these issues, in this paper we propose a framework that enforces on-the-fly instantiated policies inside organizations using trusted BYOD technologies. The proposed framework implements a role-based access control system based upon user identity and her current context. To this end, each user receives a specific policy from a server based upon the current role and context. The effective user identity is confirmed using OAuth 2.0, while the device integrity and policy enforcement is ensured by means of a on-device root-of-trust and an enforcer running on each device.
自带设备(BYOD)模式在所有类型的组织中都变得非常流行。事实上,员工不断尝试将他们的个人设备,例如智能手机和平板电脑,整合到办公室来完成他们的一些工作,或者只是用他们信任或更熟悉的设备访问互联网。不幸的是,所有这些访问公司网络的外部设备可能会产生几个安全问题。为了解决这些问题,在本文中,我们提出了一个框架,该框架使用可信BYOD技术在组织内部强制执行动态实例化策略。该框架实现了基于用户身份及其当前上下文的基于角色的访问控制系统。为此,每个用户根据当前角色和上下文从服务器接收特定策略。使用OAuth 2.0确认有效的用户身份,而通过设备上的信任根和运行在每个设备上的执行器来确保设备完整性和策略实施。
{"title":"Towards enforcing on-the-fly policies in BYOD environments","authors":"Gianpiero Costantino, F. Martinelli, A. Saracino, D. Sgandurra","doi":"10.1109/ISIAS.2013.6947734","DOIUrl":"https://doi.org/10.1109/ISIAS.2013.6947734","url":null,"abstract":"The Bring Your Own Device (BYOD) paradigm is becoming extremely popular across all kind of organizations. In fact, employees are continually trying to incorporate their personal devices, e.g. smartphones and tablets, into the office to perform some of their work or simply to access the Internet with a device they trust or they are more familiar with. Unfortunately, several security issues may arise from all these external devices accessing the corporate network. To address these issues, in this paper we propose a framework that enforces on-the-fly instantiated policies inside organizations using trusted BYOD technologies. The proposed framework implements a role-based access control system based upon user identity and her current context. To this end, each user receives a specific policy from a server based upon the current role and context. The effective user identity is confirmed using OAuth 2.0, while the device integrity and policy enforcement is ensured by means of a on-device root-of-trust and an enforcer running on each device.","PeriodicalId":370107,"journal":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134213694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A system of abnormal behaviour detection in aerial surveillance 空中监视中异常行为探测系统
Pub Date : 2013-12-01 DOI: 10.1109/ISIAS.2013.6947741
A. Walha, A. Wali, A. Alimi
Aerial Video-Surveillance systems are being more and more used in security applications. The analysis and detection of abnormal behaviours in a aerial sequence has progressively drawn the attention in the field of public area security, since it allows filtering out a large number of useless information, which guarantees the high efficiency in the security protection, and save a lot of human and material resources. We present in this paper an intelligent video-surveillance framework for abnormal behaviour detection in aerial video surveillance. This framework is attended to be able to achieve real-time alarming, in public areas. This architecture takes into consideration four main challenges: behaviour understanding in public area, aerial video challenges, unstable video and contextual-based adaptability to recognize the active context of the scene.
航空视频监控系统在安防领域的应用越来越广泛。航空序列异常行为的分析与检测逐渐受到公共区域安全领域的重视,因为它可以过滤掉大量无用的信息,保证了安全防护的高效率,节省了大量的人力和物力。本文提出了一种用于航空视频监控中异常行为检测的智能视频监控框架。该框架旨在实现公共区域的实时报警。该架构考虑了四个主要挑战:公共区域的行为理解、空中视频挑战、不稳定视频和基于上下文的适应性,以识别场景的活动背景。
{"title":"A system of abnormal behaviour detection in aerial surveillance","authors":"A. Walha, A. Wali, A. Alimi","doi":"10.1109/ISIAS.2013.6947741","DOIUrl":"https://doi.org/10.1109/ISIAS.2013.6947741","url":null,"abstract":"Aerial Video-Surveillance systems are being more and more used in security applications. The analysis and detection of abnormal behaviours in a aerial sequence has progressively drawn the attention in the field of public area security, since it allows filtering out a large number of useless information, which guarantees the high efficiency in the security protection, and save a lot of human and material resources. We present in this paper an intelligent video-surveillance framework for abnormal behaviour detection in aerial video surveillance. This framework is attended to be able to achieve real-time alarming, in public areas. This architecture takes into consideration four main challenges: behaviour understanding in public area, aerial video challenges, unstable video and contextual-based adaptability to recognize the active context of the scene.","PeriodicalId":370107,"journal":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134495496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A professional view on ebanking authentication: Challenges and recommendations 电子银行认证的专业观点:挑战与建议
Pub Date : 2013-12-01 DOI: 10.1109/ISIAS.2013.6947731
J. A. Vila, J. Serna-Olvera, Luis Fernandez, Manuel Medina, Andreas Sfakianakis
In current e-banking systems, millions of consumers are now able to conduct financial transactions using a wide range of mobile devices; this growth exposes the system not only to the set of known threats that are now migrating from traditional PC-based e-banking to the mobile-based scenario, but, to emerging threats specifically targeting mobile devices. Considering the sensitive nature of the financial information managed, security in mobile devices has become a major issue. Thus, to be able to provide transaction security, and minimize the potential threats, e-banking systems must implement robust identification and authentication systems (eIDAS). Therefore, this paper analyzes current threats in e-banking. It presents a brief review on the current state of the art analyzing the most popular eIDAS implemented in Europe, through a survey launched by ENISA addressed to security professionals of the financial sector. The most common eIDAS approaches for e-banking, and their suitability against the known threats in terms of related incidents and financial loss, are therefore assessed. Finally, a set of challenges and recommendations to be considered in any eIDAS implementation is introduced.
在目前的电子银行系统中,数百万消费者现在能够使用各种移动设备进行金融交易;这种增长不仅使系统暴露于从传统的基于pc的电子银行向基于移动的场景迁移的已知威胁,而且暴露于专门针对移动设备的新兴威胁。考虑到所管理的金融信息的敏感性,移动设备的安全性已成为一个主要问题。因此,为了能够提供交易安全性并最小化潜在威胁,电子银行系统必须实现健壮的标识和身份验证系统(eIDAS)。因此,本文分析了当前电子银行面临的威胁。它通过ENISA针对金融部门安全专业人员发起的一项调查,简要回顾了欧洲实施的最受欢迎的eIDAS的现状。因此,评估了电子银行最常见的eIDAS方法,以及它们在相关事件和财务损失方面应对已知威胁的适用性。最后,介绍了在任何eIDAS实现中需要考虑的一系列挑战和建议。
{"title":"A professional view on ebanking authentication: Challenges and recommendations","authors":"J. A. Vila, J. Serna-Olvera, Luis Fernandez, Manuel Medina, Andreas Sfakianakis","doi":"10.1109/ISIAS.2013.6947731","DOIUrl":"https://doi.org/10.1109/ISIAS.2013.6947731","url":null,"abstract":"In current e-banking systems, millions of consumers are now able to conduct financial transactions using a wide range of mobile devices; this growth exposes the system not only to the set of known threats that are now migrating from traditional PC-based e-banking to the mobile-based scenario, but, to emerging threats specifically targeting mobile devices. Considering the sensitive nature of the financial information managed, security in mobile devices has become a major issue. Thus, to be able to provide transaction security, and minimize the potential threats, e-banking systems must implement robust identification and authentication systems (eIDAS). Therefore, this paper analyzes current threats in e-banking. It presents a brief review on the current state of the art analyzing the most popular eIDAS implemented in Europe, through a survey launched by ENISA addressed to security professionals of the financial sector. The most common eIDAS approaches for e-banking, and their suitability against the known threats in terms of related incidents and financial loss, are therefore assessed. Finally, a set of challenges and recommendations to be considered in any eIDAS implementation is introduced.","PeriodicalId":370107,"journal":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","volume":"16 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133405025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A secured model for Indian e-health system 印度电子医疗系统的安全模型
Pub Date : 2013-12-01 DOI: 10.1109/ISIAS.2013.6947740
Shilpa Srivastava, Namrata Agarwal, M. Pant, A. Abraham
The inclusion of information technology in health sector has initiated a promising revolution in the area of health care. However, like in all other IT sectors, security issues are of primary concern in e-health care systems. In the present study, considering the Indian e-health scenario we have proposed a model, which integrates the authorization (role based and attribute based) and authentication techniques simultaneously. The suggested model utilizes “Aadhaar” an upcoming identification proof provided by UIDAI (Unique Identification Authority of India) an agency of Government Of India along with spatial &Temporal constraints for the purpose of authentication. Further we have also designed an algorithm for the implementation of same.
将信息技术纳入卫生部门,在卫生保健领域掀起了一场充满希望的革命。然而,与所有其他IT部门一样,安全问题是电子医疗保健系统的主要关注点。在本研究中,考虑到印度电子医疗场景,我们提出了一个模型,该模型同时集成了授权(基于角色和基于属性)和身份验证技术。建议的模型利用印度政府机构UIDAI(印度唯一身份认证机构)提供的即将到来的身份证明“Aadhaar”以及空间和时间限制来进行身份验证。此外,我们还设计了一种实现该算法的算法。
{"title":"A secured model for Indian e-health system","authors":"Shilpa Srivastava, Namrata Agarwal, M. Pant, A. Abraham","doi":"10.1109/ISIAS.2013.6947740","DOIUrl":"https://doi.org/10.1109/ISIAS.2013.6947740","url":null,"abstract":"The inclusion of information technology in health sector has initiated a promising revolution in the area of health care. However, like in all other IT sectors, security issues are of primary concern in e-health care systems. In the present study, considering the Indian e-health scenario we have proposed a model, which integrates the authorization (role based and attribute based) and authentication techniques simultaneously. The suggested model utilizes “Aadhaar” an upcoming identification proof provided by UIDAI (Unique Identification Authority of India) an agency of Government Of India along with spatial &Temporal constraints for the purpose of authentication. Further we have also designed an algorithm for the implementation of same.","PeriodicalId":370107,"journal":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126277504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2013 9th International Conference on Information Assurance and Security (IAS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1