Pub Date : 2013-12-01DOI: 10.1109/ISIAS.2013.6947742
Yassine Aribi, A. Wali, A. Alimi
The Event detection method from a video surveillance has received much attention in the image processing. In this paper, we present an overview of a new approach for event detection from video surveillance system based on incremental learning. In our approach, each event is modeled by a set of states, and each state is represented by a learning model containing a positive class (event) and a negative class (non-event). Experiments on real image sequences have shown encouraging results.
{"title":"An intelligent system for video events detection","authors":"Yassine Aribi, A. Wali, A. Alimi","doi":"10.1109/ISIAS.2013.6947742","DOIUrl":"https://doi.org/10.1109/ISIAS.2013.6947742","url":null,"abstract":"The Event detection method from a video surveillance has received much attention in the image processing. In this paper, we present an overview of a new approach for event detection from video surveillance system based on incremental learning. In our approach, each event is modeled by a set of states, and each state is represented by a learning model containing a positive class (event) and a negative class (non-event). Experiments on real image sequences have shown encouraging results.","PeriodicalId":370107,"journal":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115568620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ISIAS.2013.6947730
Hamdi Eltaief, A. Kamel, H. Youssef
Source authentication in multicast communication is essential and challenging requirement. In this paper we address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network model, robustness against packet loss, packet overhead and computing efficiency are important parameters to be taken into account when designing a multicast source authentication mechanism. The proposed scheme is based on adaptive and multi-layer connected chain structure in addition to an efficient recovery information model. It adapts the redundancy chaining degree depending on the actual packet loss rate in the network. Our mechanism provides non-repudiation of the origin and tolerates packet loss with low communication overhead, low delay and buffer capacity on the receiver side. NS-2 simulations show significant improvements over mechanisms in the same category.
{"title":"ARMLCC: Adaptive and recovery-based Multi-Layer Connected Chain Mechanism for Multicast Source Authentication","authors":"Hamdi Eltaief, A. Kamel, H. Youssef","doi":"10.1109/ISIAS.2013.6947730","DOIUrl":"https://doi.org/10.1109/ISIAS.2013.6947730","url":null,"abstract":"Source authentication in multicast communication is essential and challenging requirement. In this paper we address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network model, robustness against packet loss, packet overhead and computing efficiency are important parameters to be taken into account when designing a multicast source authentication mechanism. The proposed scheme is based on adaptive and multi-layer connected chain structure in addition to an efficient recovery information model. It adapts the redundancy chaining degree depending on the actual packet loss rate in the network. Our mechanism provides non-repudiation of the origin and tolerates packet loss with low communication overhead, low delay and buffer capacity on the receiver side. NS-2 simulations show significant improvements over mechanisms in the same category.","PeriodicalId":370107,"journal":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125998374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ISIAS.2013.6947737
M. Z. Mas'ud, S. Shahrin, M. F. Abdollah, S. R. Selamat, R. Yusof, R. Ahmad
Nowadays, the usage of mobile device among the community worldwide has been tremendously increased. With this proliferation of mobile devices, more users are able to access the internet for variety of online application and services. As the use of mobile devices and applications grows, the rate of vulnerabilities exploitation and sophistication of attack towards the mobile user are increasing as well. To date, Google's Android Operating System (OS) are among the widely used OS for the mobile devices, the openness design and ease of use have made them popular among developer and user. Despite the advantages the android-based mobile devices have, it also invited the malware author to exploit the mobile application on the market. Prior to this matter, this research focused on investigating the behaviour of mobile malware through hybrid approach. The hybrid approach correlates and reconstructs the result from the static and dynamic malware analysis in producing a trace of malicious event. Based on the finding, this research proposed a general mobile malware behaviour model that can contribute in identifying the key features in detecting mobile malware on an Android Platform device.
{"title":"Profiling mobile malware behaviour through hybrid malware analysis approach","authors":"M. Z. Mas'ud, S. Shahrin, M. F. Abdollah, S. R. Selamat, R. Yusof, R. Ahmad","doi":"10.1109/ISIAS.2013.6947737","DOIUrl":"https://doi.org/10.1109/ISIAS.2013.6947737","url":null,"abstract":"Nowadays, the usage of mobile device among the community worldwide has been tremendously increased. With this proliferation of mobile devices, more users are able to access the internet for variety of online application and services. As the use of mobile devices and applications grows, the rate of vulnerabilities exploitation and sophistication of attack towards the mobile user are increasing as well. To date, Google's Android Operating System (OS) are among the widely used OS for the mobile devices, the openness design and ease of use have made them popular among developer and user. Despite the advantages the android-based mobile devices have, it also invited the malware author to exploit the mobile application on the market. Prior to this matter, this research focused on investigating the behaviour of mobile malware through hybrid approach. The hybrid approach correlates and reconstructs the result from the static and dynamic malware analysis in producing a trace of malicious event. Based on the finding, this research proposed a general mobile malware behaviour model that can contribute in identifying the key features in detecting mobile malware on an Android Platform device.","PeriodicalId":370107,"journal":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133562467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ISIAS.2013.6947739
Priyank Jain, Neelam Pathak, Pratibhadevi Tapashetti, A. Umesh
Data mining is a set of automated techniques used to extract hidden or buried information from large databases. With the development of data mining technologies, privacy protection has become a challenge for data mining applications in many fields. To solve this problem, many privacy-preserving data mining methods have been proposed. One important type of such methods is based on Singular Value Decomposition (SVD). In the proposed algorithm, attributes are grouped according to their distance difference similarity by clustering the data set using decision tree classification. Secondly, the algorithm packetizes the attributes according to their SA value in each group. Thirdly, for each group it selects attributes from the smallest bucket and searches for a similar attributes in the attributes-1 largest buckets from the same group to create an equivalence class following the unique attribute-distinct diversity anonymization model. The proposed algorithm satisfies the “utility based anonymization principle that crucial information is protected from being suppressed. Also, weights given to attributes improve clustering and give the ability to control the generalization's depth. In prototype decision tree is combination of clustering and classification technique such methods are called ensemble classifier, this new proposed method is more efficient in balancing data privacy and data utility.
{"title":"Privacy preserving processing of data decision tree based on sample selection and Singular Value Decomposition","authors":"Priyank Jain, Neelam Pathak, Pratibhadevi Tapashetti, A. Umesh","doi":"10.1109/ISIAS.2013.6947739","DOIUrl":"https://doi.org/10.1109/ISIAS.2013.6947739","url":null,"abstract":"Data mining is a set of automated techniques used to extract hidden or buried information from large databases. With the development of data mining technologies, privacy protection has become a challenge for data mining applications in many fields. To solve this problem, many privacy-preserving data mining methods have been proposed. One important type of such methods is based on Singular Value Decomposition (SVD). In the proposed algorithm, attributes are grouped according to their distance difference similarity by clustering the data set using decision tree classification. Secondly, the algorithm packetizes the attributes according to their SA value in each group. Thirdly, for each group it selects attributes from the smallest bucket and searches for a similar attributes in the attributes-1 largest buckets from the same group to create an equivalence class following the unique attribute-distinct diversity anonymization model. The proposed algorithm satisfies the “utility based anonymization principle that crucial information is protected from being suppressed. Also, weights given to attributes improve clustering and give the ability to control the generalization's depth. In prototype decision tree is combination of clustering and classification technique such methods are called ensemble classifier, this new proposed method is more efficient in balancing data privacy and data utility.","PeriodicalId":370107,"journal":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134534333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ISIAS.2013.6947729
Wei Ding, Khoa N. Le, S. S. Huang
Hackers often use a chain of intermediate stepping-stone hosts to hide their identity before launching an attack. This type of stepping-stone attack can be detected by applying timing-based correlation algorithms on the connections in and out of a host. However, hackers can add chaff packets or jitter the original packets to decrease the detection rate of these correlation algorithms. This paper proposes a novel method to detect intrusions under the influence of packet jittering. Our study shows how the distribution of the inter-arrival time gaps of a jittered connection differs from connections without jittering. We study the impact of the jittering probability model on the detection rate as well as parameters of the model upon the detection rate. Our study suggests a way to detect stepping-stones and complements the existing correlation-based stepping-stone detection algorithms to form a much more robust solution.
{"title":"Detecting stepping-stones under the influence of packet jittering","authors":"Wei Ding, Khoa N. Le, S. S. Huang","doi":"10.1109/ISIAS.2013.6947729","DOIUrl":"https://doi.org/10.1109/ISIAS.2013.6947729","url":null,"abstract":"Hackers often use a chain of intermediate stepping-stone hosts to hide their identity before launching an attack. This type of stepping-stone attack can be detected by applying timing-based correlation algorithms on the connections in and out of a host. However, hackers can add chaff packets or jitter the original packets to decrease the detection rate of these correlation algorithms. This paper proposes a novel method to detect intrusions under the influence of packet jittering. Our study shows how the distribution of the inter-arrival time gaps of a jittered connection differs from connections without jittering. We study the impact of the jittering probability model on the detection rate as well as parameters of the model upon the detection rate. Our study suggests a way to detect stepping-stones and complements the existing correlation-based stepping-stone detection algorithms to form a much more robust solution.","PeriodicalId":370107,"journal":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132349252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ISIAS.2013.6947738
Faten Chaabane, Maha Charfeddine, C. Amar
The encroachment of Internet and Peer to Peer networks has really facilitated our daily lives and works but it contributes to another dangerous phenomenon which is copying a digital content without having authorization, called piracy. To handle this phenomenon, several techniques of tracing traitors were proposed, by combining in the same time a fingerprinting technique to a watermarking one. In this paper, we first present basic notions for multimedia traceability framework: Anti Collusion code (ACC) and the watermarking technique. We show a study of available tracing traitors' schemes and we propose a comparison of accusation ability and computational costs of these techniques. Next we describe our future contribution in this target.
{"title":"A survey on digital tracing traitors schemes","authors":"Faten Chaabane, Maha Charfeddine, C. Amar","doi":"10.1109/ISIAS.2013.6947738","DOIUrl":"https://doi.org/10.1109/ISIAS.2013.6947738","url":null,"abstract":"The encroachment of Internet and Peer to Peer networks has really facilitated our daily lives and works but it contributes to another dangerous phenomenon which is copying a digital content without having authorization, called piracy. To handle this phenomenon, several techniques of tracing traitors were proposed, by combining in the same time a fingerprinting technique to a watermarking one. In this paper, we first present basic notions for multimedia traceability framework: Anti Collusion code (ACC) and the watermarking technique. We show a study of available tracing traitors' schemes and we propose a comparison of accusation ability and computational costs of these techniques. Next we describe our future contribution in this target.","PeriodicalId":370107,"journal":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117242019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ISIAS.2013.6947734
Gianpiero Costantino, F. Martinelli, A. Saracino, D. Sgandurra
The Bring Your Own Device (BYOD) paradigm is becoming extremely popular across all kind of organizations. In fact, employees are continually trying to incorporate their personal devices, e.g. smartphones and tablets, into the office to perform some of their work or simply to access the Internet with a device they trust or they are more familiar with. Unfortunately, several security issues may arise from all these external devices accessing the corporate network. To address these issues, in this paper we propose a framework that enforces on-the-fly instantiated policies inside organizations using trusted BYOD technologies. The proposed framework implements a role-based access control system based upon user identity and her current context. To this end, each user receives a specific policy from a server based upon the current role and context. The effective user identity is confirmed using OAuth 2.0, while the device integrity and policy enforcement is ensured by means of a on-device root-of-trust and an enforcer running on each device.
{"title":"Towards enforcing on-the-fly policies in BYOD environments","authors":"Gianpiero Costantino, F. Martinelli, A. Saracino, D. Sgandurra","doi":"10.1109/ISIAS.2013.6947734","DOIUrl":"https://doi.org/10.1109/ISIAS.2013.6947734","url":null,"abstract":"The Bring Your Own Device (BYOD) paradigm is becoming extremely popular across all kind of organizations. In fact, employees are continually trying to incorporate their personal devices, e.g. smartphones and tablets, into the office to perform some of their work or simply to access the Internet with a device they trust or they are more familiar with. Unfortunately, several security issues may arise from all these external devices accessing the corporate network. To address these issues, in this paper we propose a framework that enforces on-the-fly instantiated policies inside organizations using trusted BYOD technologies. The proposed framework implements a role-based access control system based upon user identity and her current context. To this end, each user receives a specific policy from a server based upon the current role and context. The effective user identity is confirmed using OAuth 2.0, while the device integrity and policy enforcement is ensured by means of a on-device root-of-trust and an enforcer running on each device.","PeriodicalId":370107,"journal":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134213694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ISIAS.2013.6947741
A. Walha, A. Wali, A. Alimi
Aerial Video-Surveillance systems are being more and more used in security applications. The analysis and detection of abnormal behaviours in a aerial sequence has progressively drawn the attention in the field of public area security, since it allows filtering out a large number of useless information, which guarantees the high efficiency in the security protection, and save a lot of human and material resources. We present in this paper an intelligent video-surveillance framework for abnormal behaviour detection in aerial video surveillance. This framework is attended to be able to achieve real-time alarming, in public areas. This architecture takes into consideration four main challenges: behaviour understanding in public area, aerial video challenges, unstable video and contextual-based adaptability to recognize the active context of the scene.
{"title":"A system of abnormal behaviour detection in aerial surveillance","authors":"A. Walha, A. Wali, A. Alimi","doi":"10.1109/ISIAS.2013.6947741","DOIUrl":"https://doi.org/10.1109/ISIAS.2013.6947741","url":null,"abstract":"Aerial Video-Surveillance systems are being more and more used in security applications. The analysis and detection of abnormal behaviours in a aerial sequence has progressively drawn the attention in the field of public area security, since it allows filtering out a large number of useless information, which guarantees the high efficiency in the security protection, and save a lot of human and material resources. We present in this paper an intelligent video-surveillance framework for abnormal behaviour detection in aerial video surveillance. This framework is attended to be able to achieve real-time alarming, in public areas. This architecture takes into consideration four main challenges: behaviour understanding in public area, aerial video challenges, unstable video and contextual-based adaptability to recognize the active context of the scene.","PeriodicalId":370107,"journal":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134495496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ISIAS.2013.6947731
J. A. Vila, J. Serna-Olvera, Luis Fernandez, Manuel Medina, Andreas Sfakianakis
In current e-banking systems, millions of consumers are now able to conduct financial transactions using a wide range of mobile devices; this growth exposes the system not only to the set of known threats that are now migrating from traditional PC-based e-banking to the mobile-based scenario, but, to emerging threats specifically targeting mobile devices. Considering the sensitive nature of the financial information managed, security in mobile devices has become a major issue. Thus, to be able to provide transaction security, and minimize the potential threats, e-banking systems must implement robust identification and authentication systems (eIDAS). Therefore, this paper analyzes current threats in e-banking. It presents a brief review on the current state of the art analyzing the most popular eIDAS implemented in Europe, through a survey launched by ENISA addressed to security professionals of the financial sector. The most common eIDAS approaches for e-banking, and their suitability against the known threats in terms of related incidents and financial loss, are therefore assessed. Finally, a set of challenges and recommendations to be considered in any eIDAS implementation is introduced.
{"title":"A professional view on ebanking authentication: Challenges and recommendations","authors":"J. A. Vila, J. Serna-Olvera, Luis Fernandez, Manuel Medina, Andreas Sfakianakis","doi":"10.1109/ISIAS.2013.6947731","DOIUrl":"https://doi.org/10.1109/ISIAS.2013.6947731","url":null,"abstract":"In current e-banking systems, millions of consumers are now able to conduct financial transactions using a wide range of mobile devices; this growth exposes the system not only to the set of known threats that are now migrating from traditional PC-based e-banking to the mobile-based scenario, but, to emerging threats specifically targeting mobile devices. Considering the sensitive nature of the financial information managed, security in mobile devices has become a major issue. Thus, to be able to provide transaction security, and minimize the potential threats, e-banking systems must implement robust identification and authentication systems (eIDAS). Therefore, this paper analyzes current threats in e-banking. It presents a brief review on the current state of the art analyzing the most popular eIDAS implemented in Europe, through a survey launched by ENISA addressed to security professionals of the financial sector. The most common eIDAS approaches for e-banking, and their suitability against the known threats in terms of related incidents and financial loss, are therefore assessed. Finally, a set of challenges and recommendations to be considered in any eIDAS implementation is introduced.","PeriodicalId":370107,"journal":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","volume":"16 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133405025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ISIAS.2013.6947740
Shilpa Srivastava, Namrata Agarwal, M. Pant, A. Abraham
The inclusion of information technology in health sector has initiated a promising revolution in the area of health care. However, like in all other IT sectors, security issues are of primary concern in e-health care systems. In the present study, considering the Indian e-health scenario we have proposed a model, which integrates the authorization (role based and attribute based) and authentication techniques simultaneously. The suggested model utilizes “Aadhaar” an upcoming identification proof provided by UIDAI (Unique Identification Authority of India) an agency of Government Of India along with spatial &Temporal constraints for the purpose of authentication. Further we have also designed an algorithm for the implementation of same.
{"title":"A secured model for Indian e-health system","authors":"Shilpa Srivastava, Namrata Agarwal, M. Pant, A. Abraham","doi":"10.1109/ISIAS.2013.6947740","DOIUrl":"https://doi.org/10.1109/ISIAS.2013.6947740","url":null,"abstract":"The inclusion of information technology in health sector has initiated a promising revolution in the area of health care. However, like in all other IT sectors, security issues are of primary concern in e-health care systems. In the present study, considering the Indian e-health scenario we have proposed a model, which integrates the authorization (role based and attribute based) and authentication techniques simultaneously. The suggested model utilizes “Aadhaar” an upcoming identification proof provided by UIDAI (Unique Identification Authority of India) an agency of Government Of India along with spatial &Temporal constraints for the purpose of authentication. Further we have also designed an algorithm for the implementation of same.","PeriodicalId":370107,"journal":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126277504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}