首页 > 最新文献

2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)最新文献

英文 中文
Cyber Risk in Internet of Things World 物联网世界中的网络风险
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096720
Hajar Barrak Alharbi, Nuha Abdulrazak Baghanim, A. Munshi
Internet of Things (IoT) is an emerging technology which has revolutionized the network in the global world. It is estimated that about 38.5 billion IoT devices will be connected by 2020. These devices are used in every part of life. Large number of data are collected by these IoT devices and transmitted from one device to another and from devices to enterprise systems. As large numbers of devices are connected with each other and to the world network and the number is increasing every day, there is a major risk of security threat, vulnerabilities, data manipulation, stealing, identity, device manipulation, and hacking. Due to the ease of automation and digitization, these devices bring with them numerous security issues. Poor security of these devices can provide an entry point for cyberattacks which may compromise sensitive data, threaten users’ privacy and weaponize the device. The IoT ecosystem needs proper security at device level, application level, and network level. Different vendors with diverse goals but inadequate cybersecurity expertise manufacture these devices. The purpose of this paper is to identify the current security and privacy issues in IoT devices and propose recommendations for the solution of Cyber security issues in IoT devices
物联网(IoT)是一项新兴技术,它使全球网络发生了革命性的变化。据估计,到2020年将有约385亿个物联网设备连接。这些设备被用于生活的方方面面。这些物联网设备收集大量数据,并从一个设备传输到另一个设备,从设备传输到企业系统。随着大量设备相互连接和连接到世界网络,并且数量每天都在增加,存在安全威胁、漏洞、数据操纵、窃取、身份、设备操纵和黑客攻击等重大风险。由于自动化和数字化的便利性,这些设备带来了许多安全问题。这些设备的安全性差可能会为网络攻击提供切入点,从而泄露敏感数据,威胁用户隐私并使设备武器化。物联网生态系统需要在设备级、应用级和网络级提供适当的安全保障。不同的供应商有着不同的目标,但缺乏网络安全专业知识来制造这些设备。本文的目的是识别当前物联网设备中的安全和隐私问题,并为解决物联网设备中的网络安全问题提出建议
{"title":"Cyber Risk in Internet of Things World","authors":"Hajar Barrak Alharbi, Nuha Abdulrazak Baghanim, A. Munshi","doi":"10.1109/ICCAIS48893.2020.9096720","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096720","url":null,"abstract":"Internet of Things (IoT) is an emerging technology which has revolutionized the network in the global world. It is estimated that about 38.5 billion IoT devices will be connected by 2020. These devices are used in every part of life. Large number of data are collected by these IoT devices and transmitted from one device to another and from devices to enterprise systems. As large numbers of devices are connected with each other and to the world network and the number is increasing every day, there is a major risk of security threat, vulnerabilities, data manipulation, stealing, identity, device manipulation, and hacking. Due to the ease of automation and digitization, these devices bring with them numerous security issues. Poor security of these devices can provide an entry point for cyberattacks which may compromise sensitive data, threaten users’ privacy and weaponize the device. The IoT ecosystem needs proper security at device level, application level, and network level. Different vendors with diverse goals but inadequate cybersecurity expertise manufacture these devices. The purpose of this paper is to identify the current security and privacy issues in IoT devices and propose recommendations for the solution of Cyber security issues in IoT devices","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130588548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
ICCAIS 2020 TOC ICCAIS 2020 toc
Pub Date : 2020-03-01 DOI: 10.1109/iccais48893.2020.9096712
{"title":"ICCAIS 2020 TOC","authors":"","doi":"10.1109/iccais48893.2020.9096712","DOIUrl":"https://doi.org/10.1109/iccais48893.2020.9096712","url":null,"abstract":"","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134367488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ArrowSAM: In-Memory Genomics Data Processing Using Apache Arrow ArrowSAM:使用Apache Arrow进行内存基因组数据处理
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096725
Tanveer Ahmad, Nauman Ahmed, J. Peltenburg, Z. Al-Ars
The rapidly growing size of genomics data bases, driven by advances in sequencing technologies, demands fast and cost-effective processing. However, processing this data creates many challenges, particularly in selecting appropriate algorithms and computing platforms. Computing systems need data closer to the processor for fast processing. Traditionally, due to cost, volatility and other physical constraints of DRAM, it was not feasible to place large amounts of working data sets in memory. However, new emerging storage class memories allow storing and processing big data closer to the processor. In this work, we show how the commonly used genomics data format, Sequence Alignment/Map (SAM), can be presented in the Apache Arrow in-memory data representation to benefit of in-memory processing and to ensure better scalability through shared memory objects, by avoiding large (de)-serialization overheads in cross-language interoperability. To demonstrate the benefits of such a system, we propose ArrowSAM, an in-memory SAM format that uses the Apache Arrow framework, and integrate it into genome pre-processing pipelines including BWA-MEM, Picard and Sambamba. Results show 15x and 2.4x speedups as compared to Picard and Sambamba, respectively. The code and scripts for running all workflows are freely available at https://github.com/abs-tudelft/ArrowSAM.
在测序技术进步的推动下,基因组学数据库的规模迅速增长,需要快速和具有成本效益的处理。然而,处理这些数据带来了许多挑战,特别是在选择合适的算法和计算平台方面。计算系统需要离处理器更近的数据来进行快速处理。传统上,由于成本、波动性和DRAM的其他物理限制,将大量工作数据集放在内存中是不可行的。然而,新兴的存储类存储器允许在更靠近处理器的地方存储和处理大数据。在这项工作中,我们展示了常用的基因组数据格式,序列对齐/映射(SAM),如何在Apache Arrow内存数据表示中呈现,以受益于内存处理,并通过共享内存对象确保更好的可伸缩性,避免跨语言互操作性中的大量(反)序列化开销。为了证明这种系统的好处,我们提出了ArrowSAM,这是一种使用Apache Arrow框架的内存SAM格式,并将其集成到基因组预处理管道中,包括BWA-MEM, Picard和Sambamba。结果显示,与Picard和Sambamba相比,前者的速度分别提高了15倍和2.4倍。运行所有工作流的代码和脚本可以在https://github.com/abs-tudelft/ArrowSAM上免费获得。
{"title":"ArrowSAM: In-Memory Genomics Data Processing Using Apache Arrow","authors":"Tanveer Ahmad, Nauman Ahmed, J. Peltenburg, Z. Al-Ars","doi":"10.1109/ICCAIS48893.2020.9096725","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096725","url":null,"abstract":"The rapidly growing size of genomics data bases, driven by advances in sequencing technologies, demands fast and cost-effective processing. However, processing this data creates many challenges, particularly in selecting appropriate algorithms and computing platforms. Computing systems need data closer to the processor for fast processing. Traditionally, due to cost, volatility and other physical constraints of DRAM, it was not feasible to place large amounts of working data sets in memory. However, new emerging storage class memories allow storing and processing big data closer to the processor. In this work, we show how the commonly used genomics data format, Sequence Alignment/Map (SAM), can be presented in the Apache Arrow in-memory data representation to benefit of in-memory processing and to ensure better scalability through shared memory objects, by avoiding large (de)-serialization overheads in cross-language interoperability. To demonstrate the benefits of such a system, we propose ArrowSAM, an in-memory SAM format that uses the Apache Arrow framework, and integrate it into genome pre-processing pipelines including BWA-MEM, Picard and Sambamba. Results show 15x and 2.4x speedups as compared to Picard and Sambamba, respectively. The code and scripts for running all workflows are freely available at https://github.com/abs-tudelft/ArrowSAM.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133504299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Twitter Sentiment Analysis on Activities of Saudi General Entertainment Authority 沙特娱乐总局活动的Twitter情绪分析
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096738
Sarah. A Alkhaldi, Sultana Alzuabi, Ryoof Alqahtani, A. Alshammari, Fatimah J. Alyousif, D. Alboaneen, Modhe Almelihi
Sentiment analysis can be defined as a natural language process to determine the individual’s sentiment or opinion towards something. It helps institutions, companies and governments to gain a deeper understanding and supports decision-making. This paper aims to analyse individuals’ opinions in Twitter on the activities of the Saudi General Entertainment Authority (GEA) using machine and deep learning techniques. To achieve this aim, 3,817 tweets were collected using RapidMiner. To classify tweets into supporters and opposers, three machine learning algorithms were used namely, Multi-Layer Percptron (MLP), Support Vector Machine (SVM), Random Forest (RF), and one deep learning algorithm, which is Recurrent Neural Network (RNN). Two test options were applied to evaluate the classification model, percentage split and K-fold validation tests. The results show that the people are happy and agree with the GEAs’ activities. As for the gender, the support rate of females was higher than males. In addition, RF algorithm outperforms other algorithms in terms of the classification accuracy and the error rate.
情感分析可以被定义为确定个人对某事的情绪或意见的自然语言过程。它帮助机构、公司和政府获得更深入的理解,并支持决策。本文旨在利用机器和深度学习技术分析Twitter上个人对沙特娱乐总局(GEA)活动的看法。为了实现这一目标,使用RapidMiner收集了3,817条推文。为了将推文分为支持者和反对者,使用了三种机器学习算法,即多层预测器(MLP)、支持向量机(SVM)、随机森林(RF)和一种深度学习算法,即递归神经网络(RNN)。采用两种检验方法对分类模型进行评价,分别为百分比分割检验和K-fold验证检验。结果表明,人们对GEAs的活动感到满意和赞同。在性别上,女性的支持率高于男性。此外,RF算法在分类准确率和错误率方面都优于其他算法。
{"title":"Twitter Sentiment Analysis on Activities of Saudi General Entertainment Authority","authors":"Sarah. A Alkhaldi, Sultana Alzuabi, Ryoof Alqahtani, A. Alshammari, Fatimah J. Alyousif, D. Alboaneen, Modhe Almelihi","doi":"10.1109/ICCAIS48893.2020.9096738","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096738","url":null,"abstract":"Sentiment analysis can be defined as a natural language process to determine the individual’s sentiment or opinion towards something. It helps institutions, companies and governments to gain a deeper understanding and supports decision-making. This paper aims to analyse individuals’ opinions in Twitter on the activities of the Saudi General Entertainment Authority (GEA) using machine and deep learning techniques. To achieve this aim, 3,817 tweets were collected using RapidMiner. To classify tweets into supporters and opposers, three machine learning algorithms were used namely, Multi-Layer Percptron (MLP), Support Vector Machine (SVM), Random Forest (RF), and one deep learning algorithm, which is Recurrent Neural Network (RNN). Two test options were applied to evaluate the classification model, percentage split and K-fold validation tests. The results show that the people are happy and agree with the GEAs’ activities. As for the gender, the support rate of females was higher than males. In addition, RF algorithm outperforms other algorithms in terms of the classification accuracy and the error rate.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"5 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132334598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Proactive Priority Based Response to Road Flooding using AHP: A Case Study in Dammam 基于AHP的道路洪水主动优先响应:以达曼为例
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096715
F. Shaikh, Rawan H. Alghamdi, R. S. A. Alkabour, Rehab M. Alonaizan, D. A. AlBuhairi, Dalal M. Alyami, Waad S. Attiyah
This paper proposes an AHP based real-time solution to facilitate response to road flooding which is a recurrent issue in almost all cities in Saudi Arabia. In the event of heavy rains, municipalities face a surge in the demand to attend to road flooding incidents and it can be difficult to decide which road sections to prioritize. The study first introduces the proposed web-based road flooding management system which utilizes a variety of different information including real-time and historical weather data, digital terrain data and descriptive road parameters to provide flood response teams with clear information on the real-time status of roads. It then proposes the AHP based multi-parameter decision analysis solution which analyses the significance of the road parameters with respect to each other and assigns a specific response priority to each road section. This final priority will allow flood response teams to expedite the response to road sections with a higher priority, thus improving the efficiency of flood responses.
本文提出了一种基于AHP的实时解决方案,以促进对道路洪水的响应,这是沙特阿拉伯几乎所有城市都经常遇到的问题。在大雨的情况下,市政当局面临着处理道路洪水事件的需求激增,很难决定优先处理哪些路段。该研究首先介绍了拟议的基于网络的道路水浸管理系统,该系统利用各种不同的信息,包括实时和历史天气数据、数字地形数据和描述性道路参数,为洪水应对小组提供有关道路实时状况的清晰信息。在此基础上,提出了基于层次分析法的多参数决策分析方案,该方案分析了道路参数相对于其他路段的重要性,并为每个路段分配了特定的响应优先级。这一最后的优先级将使洪水响应小组能够加快对优先级较高的路段的响应,从而提高洪水响应的效率。
{"title":"Proactive Priority Based Response to Road Flooding using AHP: A Case Study in Dammam","authors":"F. Shaikh, Rawan H. Alghamdi, R. S. A. Alkabour, Rehab M. Alonaizan, D. A. AlBuhairi, Dalal M. Alyami, Waad S. Attiyah","doi":"10.1109/ICCAIS48893.2020.9096715","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096715","url":null,"abstract":"This paper proposes an AHP based real-time solution to facilitate response to road flooding which is a recurrent issue in almost all cities in Saudi Arabia. In the event of heavy rains, municipalities face a surge in the demand to attend to road flooding incidents and it can be difficult to decide which road sections to prioritize. The study first introduces the proposed web-based road flooding management system which utilizes a variety of different information including real-time and historical weather data, digital terrain data and descriptive road parameters to provide flood response teams with clear information on the real-time status of roads. It then proposes the AHP based multi-parameter decision analysis solution which analyses the significance of the road parameters with respect to each other and assigns a specific response priority to each road section. This final priority will allow flood response teams to expedite the response to road sections with a higher priority, thus improving the efficiency of flood responses.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114627598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Preservation Data Mining and Security 隐私保护、数据挖掘与安全
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096834
Dimah Almani
The paper is a research report on data mining – a subject which has been studied widely and whose application spans a wide range of field including the Internet of Things (IoT) and business developments. Data mining techniques come along with serious challenges due to the disclosure of private information and violation of privacy. Privacy preservation data mining and security (PPDMS) is a vital branch in the science of data mining and an essential topic in privacy preservation. The subject has gained significant attention in the recent past. PPDMS protects sensitive and private data from being disclosed without permission from the providers or data owners. The paper gives a research report on PPDMS techniques. It outlines security measures employed in preserving data and compares the techniques’ advantages and disadvantages. The paper also suggests better ways to improve the methods.
本文是一篇关于数据挖掘的研究报告,数据挖掘是一个被广泛研究的课题,其应用范围包括物联网(IoT)和商业发展等广泛领域。由于私人信息的泄露和隐私的侵犯,数据挖掘技术面临着严峻的挑战。隐私保护数据挖掘与安全(PPDMS)是数据挖掘科学的一个重要分支,也是隐私保护领域的一个重要课题。这个问题在最近得到了极大的关注。PPDMS保护敏感和私人数据在未经提供商或数据所有者许可的情况下不被泄露。本文对PPDMS技术进行了研究。它概述了用于保存数据的安全措施,并比较了这些技术的优点和缺点。本文还提出了改进方法的方法。
{"title":"Privacy Preservation Data Mining and Security","authors":"Dimah Almani","doi":"10.1109/ICCAIS48893.2020.9096834","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096834","url":null,"abstract":"The paper is a research report on data mining – a subject which has been studied widely and whose application spans a wide range of field including the Internet of Things (IoT) and business developments. Data mining techniques come along with serious challenges due to the disclosure of private information and violation of privacy. Privacy preservation data mining and security (PPDMS) is a vital branch in the science of data mining and an essential topic in privacy preservation. The subject has gained significant attention in the recent past. PPDMS protects sensitive and private data from being disclosed without permission from the providers or data owners. The paper gives a research report on PPDMS techniques. It outlines security measures employed in preserving data and compares the techniques’ advantages and disadvantages. The paper also suggests better ways to improve the methods.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133729687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Approach for Sentiment Analysis of Arabic Tweets in Twitter Social Media 一种改进的Twitter社交媒体中阿拉伯语Tweets情感分析方法
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096850
Hussain Alsalman
Recently, sentiment analysis of social media contents is very important for opinion mining in several applications and different fields. Arabic sentiment analysis is one of the more complicated sentiment analysis tools of social media due to the informal noisy contents and the rich morphology of Arabic language. There is a number of works has been proposed for Arabic sentiment analysis. However, these works need an improvement in terms of effectiveness and accuracy. Consequently, in this paper, a corpus-based approach is proposed for Arabic sentiment analysis of tweets annotated as either negative or positive in twitter social media. The approach is based on a Discriminative multinomial naïve Bayes (DMNB) method with N-grams tokenizer, stemming, and term frequency-inverse document frequency (TF-IDF) techniques. The experiments are conducted using a set of performance evaluation metrics on a public twitter dataset to test the proposed sentiment analysis approach. Experimental results demonstrated the usefulness of the proposed approach. Furthermore, the comparison results showed that the approach outperformed the related work and improved the accuracy with 0.3%.
最近,社交媒体内容的情感分析在许多应用和不同领域的意见挖掘中发挥着重要作用。阿拉伯语情感分析是社交媒体中较为复杂的情感分析工具之一,因为阿拉伯语的内容是非正式的嘈杂,而且阿拉伯语的形态丰富。关于阿拉伯语情感分析,已经提出了许多工作。然而,这些工作在有效性和准确性方面还有待提高。因此,本文提出了一种基于语料库的方法,用于对twitter社交媒体中标注为消极或积极的推文进行阿拉伯语情感分析。该方法基于判别多项式naïve贝叶斯(DMNB)方法,该方法具有N-grams标记器、词干提取和词频率逆文档频率(TF-IDF)技术。实验使用公共twitter数据集上的一组性能评估指标来测试所提出的情感分析方法。实验结果证明了该方法的有效性。此外,对比结果表明,该方法优于相关工作,准确率提高了0.3%。
{"title":"An Improved Approach for Sentiment Analysis of Arabic Tweets in Twitter Social Media","authors":"Hussain Alsalman","doi":"10.1109/ICCAIS48893.2020.9096850","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096850","url":null,"abstract":"Recently, sentiment analysis of social media contents is very important for opinion mining in several applications and different fields. Arabic sentiment analysis is one of the more complicated sentiment analysis tools of social media due to the informal noisy contents and the rich morphology of Arabic language. There is a number of works has been proposed for Arabic sentiment analysis. However, these works need an improvement in terms of effectiveness and accuracy. Consequently, in this paper, a corpus-based approach is proposed for Arabic sentiment analysis of tweets annotated as either negative or positive in twitter social media. The approach is based on a Discriminative multinomial naïve Bayes (DMNB) method with N-grams tokenizer, stemming, and term frequency-inverse document frequency (TF-IDF) techniques. The experiments are conducted using a set of performance evaluation metrics on a public twitter dataset to test the proposed sentiment analysis approach. Experimental results demonstrated the usefulness of the proposed approach. Furthermore, the comparison results showed that the approach outperformed the related work and improved the accuracy with 0.3%.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130545662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Real Time IoT Based Camel-Vehicle Collision Avoidance System for KSA 基于物联网的KSA骆驼车实时防撞系统
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096714
W. Saad, Abdulaziz S. Alsayyari
Animals (especially camels) vehicle collisions are a growing problem in the Kingdom of Saudi Arabia (KSA), resulting in loss of money, animals' lives and considerable human injury and death every year. Therefore, it has become an urgent need to implement a reliable system for camel detection and drivers warning for KSA. Although many existing systems were installed in other countries, they are not suitable for camels or the KSA environment. In this paper, a reliable, low cost, real time Internet of Things (IoT) based Camel-Vehicle Collision Avoidance (CVCA) system is proposed. The system consists of two main parts which are; the camel detection and the driver warning systems. It requires low data traffic to be uploaded to the cloud. Therefore, the probability of network congestion is very low. Moreover, it can be operated at night when most camel vehicles accidents occur.
在沙特阿拉伯王国(KSA),动物(特别是骆驼)车辆碰撞是一个日益严重的问题,每年造成金钱损失、动物生命和大量人员伤亡。因此,实现可靠的骆驼检测和驾驶员预警系统已成为KSA的迫切需要。虽然许多现有的系统已在其他国家安装,但它们不适合骆驼或KSA环境。本文提出了一种可靠、低成本、实时的基于物联网(IoT)的骆驼-车辆碰撞避免(CVCA)系统。该系统主要由两个部分组成:骆驼探测和司机警告系统。它只需要很低的数据流量就可以上传到云端。因此,网络拥塞的概率非常低。此外,它可以在夜间运行,这是大多数骆驼车事故发生的时间。
{"title":"Real Time IoT Based Camel-Vehicle Collision Avoidance System for KSA","authors":"W. Saad, Abdulaziz S. Alsayyari","doi":"10.1109/ICCAIS48893.2020.9096714","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096714","url":null,"abstract":"Animals (especially camels) vehicle collisions are a growing problem in the Kingdom of Saudi Arabia (KSA), resulting in loss of money, animals' lives and considerable human injury and death every year. Therefore, it has become an urgent need to implement a reliable system for camel detection and drivers warning for KSA. Although many existing systems were installed in other countries, they are not suitable for camels or the KSA environment. In this paper, a reliable, low cost, real time Internet of Things (IoT) based Camel-Vehicle Collision Avoidance (CVCA) system is proposed. The system consists of two main parts which are; the camel detection and the driver warning systems. It requires low data traffic to be uploaded to the cloud. Therefore, the probability of network congestion is very low. Moreover, it can be operated at night when most camel vehicles accidents occur.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"810 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126956967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Smartphone Application to Provide the Health Care Services at Home 一款提供居家医疗服务的智能手机应用
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096758
Eshraq Ali Alweshail, Hajar Brahim
Good health is a way of good life, however, vision 2030 in Saudi Arabia aims to expand the ways of providing home health care, this application is designed to provide home health care to people in remote areas or to people who can’t go to the hospital because of their working conditions or their health doesn’t allow them to travel or go to the hospital. There are many benefits of using this application. It helps the patients to open a new file without visiting the hospital, they also can communicate with their doctors or health care providers, request home services, evaluate the services that provided by healthcare providers, pay the fees of any services received, they can also verify laboratory results.By this way, the hospitals benefit from creating a new way to increase the number of patients (online or inside the hospital).
健康是美好生活的一种方式,然而,沙特阿拉伯的愿景2030旨在扩大提供家庭医疗保健的方式,该应用程序旨在为偏远地区的人们或由于工作条件或健康状况不允许他们旅行或去医院而无法去医院的人提供家庭医疗保健。使用这个应用程序有很多好处。它帮助患者在不去医院的情况下打开一个新的文件,他们还可以与他们的医生或卫生保健提供者沟通,要求家庭服务,评估卫生保健提供者提供的服务,支付所接受的任何服务的费用,他们还可以验证实验室结果。通过这种方式,医院可以通过创造一种新的方式来增加患者数量(在线或在医院内)。
{"title":"A Smartphone Application to Provide the Health Care Services at Home","authors":"Eshraq Ali Alweshail, Hajar Brahim","doi":"10.1109/ICCAIS48893.2020.9096758","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096758","url":null,"abstract":"Good health is a way of good life, however, vision 2030 in Saudi Arabia aims to expand the ways of providing home health care, this application is designed to provide home health care to people in remote areas or to people who can’t go to the hospital because of their working conditions or their health doesn’t allow them to travel or go to the hospital. There are many benefits of using this application. It helps the patients to open a new file without visiting the hospital, they also can communicate with their doctors or health care providers, request home services, evaluate the services that provided by healthcare providers, pay the fees of any services received, they can also verify laboratory results.By this way, the hospitals benefit from creating a new way to increase the number of patients (online or inside the hospital).","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125746927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Detection Model Against Precision Time Protocol Attacks 针对精确时间协议攻击的检测模型
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096742
Waleed Alghamd, M. Schukat
The IEEE 1588 Precision Time Protocol (PTP) is a widely used mechanism to provide time synchronization of computer clocks down to microsecond accuracy as required by many financial and industrial applications ("IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems," 2008). However, PTP is vulnerable to infrastructure cyber-attacks that reduce the desired accuracy. IEEE 1588 defined an experimental security extension (Annex K) in order to protect a PTP network, but various drawbacks have been discovered, resulting in further improvements including the use of public-key encryption ( Itkin & Wool, 2020 ) and reduce the three-way handshake mechanism to one way authentication ( Önal & Kirrmann, 2012 ). Today Annex K is deprecated in favor of L2 / L3 security mechanisms. Further on, in 2020 a backwards compatible IEEE 1588 version (v2.1) will be introduced, that contains a new security extension called Annex S. Annex S consists of four prongs as follows ("IEEE Draft Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems," 2019): • Prong (A) PTP Integrated Security Mechanism describes an authentication type-length-value (TLV) that is aligned with and integrated into the PTP message. • Prong (B) PTP External Transport Security Mechanisms describes the current external security mechanisms that can be used to provide protection to PTP message i.e., IPsec and MACsec. • Prong (C) Architecture Guidance describes a redundant time system, redundant grandmaster, and redundant paths. • Prong D (Monitoring and Management Guidance) suggests monitoring the slaves’ synchronization process.
IEEE 1588精确时间协议(PTP)是一种广泛使用的机制,可以提供精确到微秒的计算机时钟时间同步,这是许多金融和工业应用所要求的(“IEEE标准用于网络测量和控制系统的精确时钟同步协议”,2008年)。然而,PTP容易受到基础设施网络攻击,从而降低了期望的准确性。IEEE 1588定义了一个实验性的安全扩展(附件K),以保护PTP网络,但已经发现了各种缺点,导致进一步的改进,包括使用公钥加密(Itkin & Wool, 2020),并将三向握手机制减少到单向身份验证(Önal & Kirrmann, 2012)。如今,附件K已被弃用,取而代之的是L2 / L3安全机制。此外,2020年将推出向后兼容的IEEE 1588版本(v2.1),其中包含一个名为附件S的新安全扩展。附件S由以下四个部分组成(“IEEE网络测量和控制系统精密时钟同步协议草案标准”,2019):•PTP集成安全机制(a)描述了与PTP消息一致并集成到PTP消息中的认证类型-长度-值(TLV)。•叉(B) PTP外部传输安全机制描述了当前可用于为PTP消息提供保护的外部安全机制,即IPsec和MACsec。•Prong (C) Architecture Guidance描述了一个冗余的时间系统、冗余的grandmaster和冗余的路径。•指标D(监控和管理指南)建议监控从机的同步进程。
{"title":"A Detection Model Against Precision Time Protocol Attacks","authors":"Waleed Alghamd, M. Schukat","doi":"10.1109/ICCAIS48893.2020.9096742","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096742","url":null,"abstract":"The IEEE 1588 Precision Time Protocol (PTP) is a widely used mechanism to provide time synchronization of computer clocks down to microsecond accuracy as required by many financial and industrial applications (\"IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems,\" 2008). However, PTP is vulnerable to infrastructure cyber-attacks that reduce the desired accuracy. IEEE 1588 defined an experimental security extension (Annex K) in order to protect a PTP network, but various drawbacks have been discovered, resulting in further improvements including the use of public-key encryption ( Itkin & Wool, 2020 ) and reduce the three-way handshake mechanism to one way authentication ( Önal & Kirrmann, 2012 ). Today Annex K is deprecated in favor of L2 / L3 security mechanisms. Further on, in 2020 a backwards compatible IEEE 1588 version (v2.1) will be introduced, that contains a new security extension called Annex S. Annex S consists of four prongs as follows (\"IEEE Draft Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems,\" 2019): • Prong (A) PTP Integrated Security Mechanism describes an authentication type-length-value (TLV) that is aligned with and integrated into the PTP message. • Prong (B) PTP External Transport Security Mechanisms describes the current external security mechanisms that can be used to provide protection to PTP message i.e., IPsec and MACsec. • Prong (C) Architecture Guidance describes a redundant time system, redundant grandmaster, and redundant paths. • Prong D (Monitoring and Management Guidance) suggests monitoring the slaves’ synchronization process.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127058220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1