首页 > 最新文献

2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)最新文献

英文 中文
Pretrained Convolutional Neural Networks for Cancer Genome Classification 用于癌症基因组分类的预训练卷积神经网络
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096808
Aisha A. Abdullahi, Khlood Bawazeer, Salwa Alotaibai, Elmaha Almoaither, Mashael M Al-Otaibi, H. Alaskar, Thavavel Vaiyapuri
Deep learning techniques, particularly convolutional neural networks (CNNs), have proved their success and popularity recently in many fields, especially distinguishing and analyzing medical diseases. Motivated by this direction, our work attempts for the first time to investigate the application of a state-of-the-art deep learning technique on genomic sequences to classify tumours of different classes. The novelty of our approach lies in the application of the popular pre-trained AlexNet on an image version of the RNA-Sequence data. Our methodology demonstrated an outstanding performance with good sensitivity results of 98.3%, 94.1%, 96.6%, 100%, and 100% for selected types of breast, colon, kidney, lung and prostate cancers respectively. The outcome of this work is expected to provide a new direction for genomics data classification and designing accurate automated diagnosis tools.
深度学习技术,特别是卷积神经网络(cnn),最近在许多领域证明了它们的成功和普及,特别是在识别和分析医学疾病方面。在这个方向的激励下,我们的工作首次尝试研究最先进的深度学习技术在基因组序列上的应用,以对不同类别的肿瘤进行分类。我们方法的新颖之处在于将流行的预训练AlexNet应用于rna序列数据的图像版本。该方法对选定类型的乳腺癌、结肠癌、肾癌、肺癌和前列腺癌的敏感性分别为98.3%、94.1%、96.6%、100%和100%。研究结果有望为基因组数据分类和设计准确的自动化诊断工具提供新的方向。
{"title":"Pretrained Convolutional Neural Networks for Cancer Genome Classification","authors":"Aisha A. Abdullahi, Khlood Bawazeer, Salwa Alotaibai, Elmaha Almoaither, Mashael M Al-Otaibi, H. Alaskar, Thavavel Vaiyapuri","doi":"10.1109/ICCAIS48893.2020.9096808","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096808","url":null,"abstract":"Deep learning techniques, particularly convolutional neural networks (CNNs), have proved their success and popularity recently in many fields, especially distinguishing and analyzing medical diseases. Motivated by this direction, our work attempts for the first time to investigate the application of a state-of-the-art deep learning technique on genomic sequences to classify tumours of different classes. The novelty of our approach lies in the application of the popular pre-trained AlexNet on an image version of the RNA-Sequence data. Our methodology demonstrated an outstanding performance with good sensitivity results of 98.3%, 94.1%, 96.6%, 100%, and 100% for selected types of breast, colon, kidney, lung and prostate cancers respectively. The outcome of this work is expected to provide a new direction for genomics data classification and designing accurate automated diagnosis tools.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124467638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Learning Based Algorithm For Automatic Scoliosis Angle Measurement 基于深度学习的脊柱侧凸角度自动测量算法
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096753
Roa Alharbi, Meshal Alshaye, Maryam M. Alkanhal, Najla M. Alharbi, Mosa A. Alzahrani, Osama A. Alrehaili
Scoliosis is a common back disease which identifies with an irregular spinal condition. In this case, the spine has a side curvature with an angle. Practically, the standard angle estimation method is done by measuring the Cobb angle for the curvature. Cobb angle is the angle between two drawn lines, upper-end line and lower-end line of the curve. However, manual measurement needs time and effort. In this paper, we proposed an automatic measurement algorithm with machine learning. Initially, X-Rays images are processed utilizing CLAHE method. Then, deep convolutional neural networks (CNN) are applied to detect vertebrae in each X-Ray image. At last, the Cobb angle is measured through a novel algorithm using trigonometry. The proposed method is evaluated on X-Rays dataset from King Saud University (KSU), and it detects each vertebra in those images. In addition, Cobb angle measurements are compared with experts’ manual measurements. Our method achieves the estimation of Cobb angles with high accuracy, showing its great potential in clinical use.
脊柱侧凸是一种常见的背部疾病,它与不规则的脊柱状况有关。在这种情况下,脊柱有一个带角度的侧曲率。实际上,标准的角度估计方法是通过测量曲率的Cobb角来完成的。科布角是曲线的上端线和下端线两条绘制线之间的夹角。然而,手工测量需要时间和精力。本文提出了一种基于机器学习的自动测量算法。最初,使用CLAHE方法处理x射线图像。然后,应用深度卷积神经网络(CNN)对每张x射线图像中的椎骨进行检测。最后,采用一种新颖的三角法测量了Cobb角。该方法在沙特国王大学(KSU)的x射线数据集上进行了评估,并检测了这些图像中的每个椎骨。此外,还将Cobb角测量值与专家手工测量值进行了比较。该方法对Cobb角的估计精度较高,具有较大的临床应用潜力。
{"title":"Deep Learning Based Algorithm For Automatic Scoliosis Angle Measurement","authors":"Roa Alharbi, Meshal Alshaye, Maryam M. Alkanhal, Najla M. Alharbi, Mosa A. Alzahrani, Osama A. Alrehaili","doi":"10.1109/ICCAIS48893.2020.9096753","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096753","url":null,"abstract":"Scoliosis is a common back disease which identifies with an irregular spinal condition. In this case, the spine has a side curvature with an angle. Practically, the standard angle estimation method is done by measuring the Cobb angle for the curvature. Cobb angle is the angle between two drawn lines, upper-end line and lower-end line of the curve. However, manual measurement needs time and effort. In this paper, we proposed an automatic measurement algorithm with machine learning. Initially, X-Rays images are processed utilizing CLAHE method. Then, deep convolutional neural networks (CNN) are applied to detect vertebrae in each X-Ray image. At last, the Cobb angle is measured through a novel algorithm using trigonometry. The proposed method is evaluated on X-Rays dataset from King Saud University (KSU), and it detects each vertebra in those images. In addition, Cobb angle measurements are compared with experts’ manual measurements. Our method achieves the estimation of Cobb angles with high accuracy, showing its great potential in clinical use.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124489541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Internet of Things Based Smart Mirrors: A Literature Review 基于物联网的智能镜子:文献综述
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096719
D. Alboaneen, Dalia Alsaffar, Alyah Alateeq, A. Alqahtani, Amjad Alfahhad, Bashaier Alqahtani, Rahaf Alamri, Lama Alamri
Internet of Things (IoT) allows devices to communicate with each other in different and important places at the same time. Smart things are developed in ways that interact with each other, such as smart doors and smart homes. One of the most important IoT applications is the smart mirror. It is a mirror that acts as a reflective surface and as an interactive screen at the same time. Smart mirrors can be implemented for different purposes such as a simulator for medical students and an assistant in the fitting rooms. This paper presents a review upon applications of smart mirrors.
物联网(IoT)允许设备在不同的重要地点同时相互通信。智能事物是以相互作用的方式发展起来的,比如智能门和智能家居。最重要的物联网应用之一是智能镜子。它是一面镜子,既是一个反射面,同时也是一个互动屏幕。智能镜子可以用于不同的目的,比如医学院学生的模拟器和试衣间的助手。本文综述了智能反射镜的应用。
{"title":"Internet of Things Based Smart Mirrors: A Literature Review","authors":"D. Alboaneen, Dalia Alsaffar, Alyah Alateeq, A. Alqahtani, Amjad Alfahhad, Bashaier Alqahtani, Rahaf Alamri, Lama Alamri","doi":"10.1109/ICCAIS48893.2020.9096719","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096719","url":null,"abstract":"Internet of Things (IoT) allows devices to communicate with each other in different and important places at the same time. Smart things are developed in ways that interact with each other, such as smart doors and smart homes. One of the most important IoT applications is the smart mirror. It is a mirror that acts as a reflective surface and as an interactive screen at the same time. Smart mirrors can be implemented for different purposes such as a simulator for medical students and an assistant in the fitting rooms. This paper presents a review upon applications of smart mirrors.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121091063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Proposed Solutions to Detect and Prevent DoS Attacks on VANETs System 针对VANETs系统的DoS攻击检测与防范方案
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096873
N. Alsulaim, Raghad Abdullah Alolaqi, R. Alhumaidan
Vehicular Ad hoc NETworks (VANETs) is a network aims to improve road safety by sharing information between vehicles. Security is a major concern regarding critical information shared between vehicles, because information sent over the vehicle network is sensitive and can affect important security decisions. But due to VANET characteristics which is high mobility and its large size, it’s become susceptibility to attacks, especially Denial of Service (DoS) attacks that denial the availability of the network for the users and thus becoming a life crucial. In this paper, we focus on studying the Denial of Service attacks, types and cases on which the attacker may achieve DoS attacks on VANET networks as well as exploring potential solutions in detecting and preventing this attack.
车辆自组织网络(VANETs)是一个旨在通过车辆之间共享信息来提高道路安全的网络。安全性是车辆之间共享的关键信息的主要关注点,因为通过车辆网络发送的信息是敏感的,可能会影响重要的安全决策。但由于VANET具有高移动性和庞大规模的特点,使其极易受到攻击,尤其是拒绝服务(DoS)攻击,使其无法为用户提供可用的网络,从而成为一个至关重要的问题。在本文中,我们重点研究了拒绝服务攻击,攻击者可能在VANET网络上实现DoS攻击的类型和案例,并探索了检测和预防这种攻击的潜在解决方案。
{"title":"Proposed Solutions to Detect and Prevent DoS Attacks on VANETs System","authors":"N. Alsulaim, Raghad Abdullah Alolaqi, R. Alhumaidan","doi":"10.1109/ICCAIS48893.2020.9096873","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096873","url":null,"abstract":"Vehicular Ad hoc NETworks (VANETs) is a network aims to improve road safety by sharing information between vehicles. Security is a major concern regarding critical information shared between vehicles, because information sent over the vehicle network is sensitive and can affect important security decisions. But due to VANET characteristics which is high mobility and its large size, it’s become susceptibility to attacks, especially Denial of Service (DoS) attacks that denial the availability of the network for the users and thus becoming a life crucial. In this paper, we focus on studying the Denial of Service attacks, types and cases on which the attacker may achieve DoS attacks on VANET networks as well as exploring potential solutions in detecting and preventing this attack.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1995 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130345755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Modified Mathematical Model of the Pathogenesis of Urolithiasis: Add Calculi Dissolution Effect 尿石症发病机理的修正数学模型:加结石溶解效应
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096728
H. Kagami
The first mathematical model of the process leading to the onset of urolithiasis so as to clarify how a variety of factors affecting urolithiasis influence the pathogenesis quantitatively was derived. Then conditions for not causing the onset of urolithiasis based on the mathematical model were quantitatively discussed. The background from which this mathematical model was derived was as follows. So far various studies for the cause of the onset of urolithiasis has been made and the factors influencing the pathogenesis has been almost clear. On the other hand, though the understanding of individual factor influencing the pathogenesis has progressed biologically and clinically, theoretical study of the integrated dynamics leading to the calculus of urolithiasis through the crystal growth and aggregation from the crystal nucleation using a mathematical model has not been made yet. In the mathematical model, the process leading to the onset of urolithiasis is divided into the following three processes. (1) formation of crystal nuclei. (2) formation of calculi by growth of crystal nuclei. (3) bonding of calculi to urinary tract cells and growth of calculi. In the first mathematical model, the process of dissolving calculi was not taken into account in the process (3) above. However, in clinical, treatment for dissolving calculi using a stone-dissolving drug is also performed. Therefore, in the mathematical model of the pathogenesis of urolithiasis the calculi dissolution effect must be also taken into account. In this study, the modified mathematical model of the pathogenesis of urolithiasis taking the calculi dissolution effect into account is derived and the nature is examined. Through the analysis of the modified mathematical model and the results of numerical simulation, the conditions for suppressing the calculus growth was modified analytically and numerically. And the dependence of the growth of the calculus on the reaction rate constant concerning dissolution of the calculus, the volume of the urinary tract or the flow rate of urine was also clarified analytically and numerically. In particular, it was shown that if the calculi adhered to the urinary tract, increasing the flow rate or reducing the urinary tract volume would not contribute to the suppression of the calculi growth very much.
首次建立了导致尿石症发病过程的数学模型,从而定量地阐明了影响尿石症的各种因素如何影响其发病机制。然后根据数学模型定量讨论了不引起尿石症发病的条件。推导这个数学模型的背景如下。迄今为止,对尿石症的发病原因进行了各种各样的研究,其发病机制的影响因素已基本清楚。另一方面,虽然对影响其发病机制的个体因素的认识在生物学和临床上都取得了进展,但从晶体成核到晶体生长和聚集导致尿石结石的综合动力学的理论研究尚未采用数学模型。在数学模型中,导致尿石症发病的过程分为以下三个过程。(1)晶核的形成。(2)晶核生长形成结石。(3)结石与尿路细胞结合及结石生长。在第一个数学模型中,在上面的(3)过程中没有考虑结石的溶解过程。然而,在临床中,溶解结石的治疗也使用溶石药物。因此,在尿石症发病机理的数学模型中,还必须考虑结石溶解效应。本文推导了考虑结石溶解效应的尿石症发病机制的修正数学模型,并对其性质进行了检验。通过对修正后的数学模型和数值模拟结果的分析,对抑制微积分生长的条件进行了解析和数值修正。并对结石的生长与结石溶解、尿路容积、尿流量等反应速率常数的关系进行了解析和数值分析。特别是,研究表明,如果结石粘附在尿路上,增加流速或减少尿路容积对抑制结石生长的作用并不大。
{"title":"The Modified Mathematical Model of the Pathogenesis of Urolithiasis: Add Calculi Dissolution Effect","authors":"H. Kagami","doi":"10.1109/ICCAIS48893.2020.9096728","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096728","url":null,"abstract":"The first mathematical model of the process leading to the onset of urolithiasis so as to clarify how a variety of factors affecting urolithiasis influence the pathogenesis quantitatively was derived. Then conditions for not causing the onset of urolithiasis based on the mathematical model were quantitatively discussed. The background from which this mathematical model was derived was as follows. So far various studies for the cause of the onset of urolithiasis has been made and the factors influencing the pathogenesis has been almost clear. On the other hand, though the understanding of individual factor influencing the pathogenesis has progressed biologically and clinically, theoretical study of the integrated dynamics leading to the calculus of urolithiasis through the crystal growth and aggregation from the crystal nucleation using a mathematical model has not been made yet. In the mathematical model, the process leading to the onset of urolithiasis is divided into the following three processes. (1) formation of crystal nuclei. (2) formation of calculi by growth of crystal nuclei. (3) bonding of calculi to urinary tract cells and growth of calculi. In the first mathematical model, the process of dissolving calculi was not taken into account in the process (3) above. However, in clinical, treatment for dissolving calculi using a stone-dissolving drug is also performed. Therefore, in the mathematical model of the pathogenesis of urolithiasis the calculi dissolution effect must be also taken into account. In this study, the modified mathematical model of the pathogenesis of urolithiasis taking the calculi dissolution effect into account is derived and the nature is examined. Through the analysis of the modified mathematical model and the results of numerical simulation, the conditions for suppressing the calculus growth was modified analytically and numerically. And the dependence of the growth of the calculus on the reaction rate constant concerning dissolution of the calculus, the volume of the urinary tract or the flow rate of urine was also clarified analytically and numerically. In particular, it was shown that if the calculi adhered to the urinary tract, increasing the flow rate or reducing the urinary tract volume would not contribute to the suppression of the calculi growth very much.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130347623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating Email Phishing Attacks using Convolutional Neural Networks 使用卷积神经网络减轻电子邮件网络钓鱼攻击
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096821
Reem M. Alotaibi, Isra M. Al-Turaiki, Fatimah Alakeel
Phishing detection has gained huge attention from both academia and industry. Damages and data breaches affecting private and governmental entities caused by email phishing attacks needed an immediate solution. The diversity of attack patterns and mediums associated with phishing attacks made the development of an optimal solution challenging. Also, attackers usually make legitimate looking content using legitimate wording or legitimate looking URLs and websites. Many of the existing phishing solutions requires manual feature extraction that requires expert domain knowledge and thoughtful selection of valuable features to be efficient. Additionally, most effective phishing solutions suffered from large computational costs. In this paper, we propose CNNPD, an email phishing detection framework based on Convolutional Neural Network (CNN). CNNPD marks incoming emails into phishing or benign. Testing the framework on an email dataset shows promising performance in terms of accuracy, precision, and recall when compared to similar approaches.
网络钓鱼检测已经引起了学术界和工业界的广泛关注。电子邮件网络钓鱼攻击对私人和政府实体造成的损害和数据泄露需要立即解决。与网络钓鱼攻击相关的攻击模式和媒介的多样性使得开发最佳解决方案具有挑战性。此外,攻击者通常使用合法的措辞或合法的url和网站制作看起来合法的内容。许多现有的网络钓鱼解决方案需要手动提取特征,这需要专业的领域知识和深思熟虑的有价值的特征选择才能有效。此外,大多数有效的网络钓鱼解决方案都存在巨大的计算成本。本文提出了一种基于卷积神经网络(CNN)的邮件网络钓鱼检测框架CNNPD。CNNPD将收到的电子邮件标记为网络钓鱼或良性。在电子邮件数据集上测试该框架显示,与类似方法相比,该框架在准确性、精密度和召回率方面表现良好。
{"title":"Mitigating Email Phishing Attacks using Convolutional Neural Networks","authors":"Reem M. Alotaibi, Isra M. Al-Turaiki, Fatimah Alakeel","doi":"10.1109/ICCAIS48893.2020.9096821","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096821","url":null,"abstract":"Phishing detection has gained huge attention from both academia and industry. Damages and data breaches affecting private and governmental entities caused by email phishing attacks needed an immediate solution. The diversity of attack patterns and mediums associated with phishing attacks made the development of an optimal solution challenging. Also, attackers usually make legitimate looking content using legitimate wording or legitimate looking URLs and websites. Many of the existing phishing solutions requires manual feature extraction that requires expert domain knowledge and thoughtful selection of valuable features to be efficient. Additionally, most effective phishing solutions suffered from large computational costs. In this paper, we propose CNNPD, an email phishing detection framework based on Convolutional Neural Network (CNN). CNNPD marks incoming emails into phishing or benign. Testing the framework on an email dataset shows promising performance in terms of accuracy, precision, and recall when compared to similar approaches.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131424647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
DUST-MASK: A Framework for Preventing Bitcoin’s Dust Attacks Dust - mask:一个防止比特币粉尘攻击的框架
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096763
Fadyah A. AlShlawi, Nourah K. AlSa’awi, Waad Y. Bin Saleem, Anees Ara
Bitcoin Cryptocurrency is an advanced decentralized electronic payment system which stores all the transaction records in a public ledger connected to the blockchain. Many cyber-attacks including Double-Spending, Distributed denial-of-service (DDOS), Sybil attack and Dust attack, have been targeting Blockchain-based application Cryptocurrency, mainly Bitcoin cryptocurrency. In this paper, the proposed DUST-MASK, a secure Bitcoin system against dust attack, protects Bitcoin’s availability and pseudo-anonymity from attackers sending dust transactions in order to analyze the data and link the transactions to a specific user. The proposed system will inform the user of those kinds of malicious transactions and guarantee the user a choice whether to accept or reject them.
比特币加密货币是一种先进的分散电子支付系统,它将所有交易记录存储在与区块链连接的公共分类账中。许多网络攻击,包括双重支出,分布式拒绝服务(DDOS), Sybil攻击和Dust攻击,都是针对基于区块链的应用加密货币,主要是比特币加密货币。本文提出的dust - mask是一种安全的比特币防灰尘攻击系统,可以保护比特币的可用性和伪匿名性,防止攻击者发送灰尘交易,以分析数据并将交易链接到特定用户。该系统将告知用户这些类型的恶意交易,并保证用户选择接受或拒绝它们。
{"title":"DUST-MASK: A Framework for Preventing Bitcoin’s Dust Attacks","authors":"Fadyah A. AlShlawi, Nourah K. AlSa’awi, Waad Y. Bin Saleem, Anees Ara","doi":"10.1109/ICCAIS48893.2020.9096763","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096763","url":null,"abstract":"Bitcoin Cryptocurrency is an advanced decentralized electronic payment system which stores all the transaction records in a public ledger connected to the blockchain. Many cyber-attacks including Double-Spending, Distributed denial-of-service (DDOS), Sybil attack and Dust attack, have been targeting Blockchain-based application Cryptocurrency, mainly Bitcoin cryptocurrency. In this paper, the proposed DUST-MASK, a secure Bitcoin system against dust attack, protects Bitcoin’s availability and pseudo-anonymity from attackers sending dust transactions in order to analyze the data and link the transactions to a specific user. The proposed system will inform the user of those kinds of malicious transactions and guarantee the user a choice whether to accept or reject them.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131556543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DDOS Attack on IOT Devices IOT设备的DDOS攻击
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096818
A. Munshi, Nouf Ayadh Alqarni, Nadia Abdullah Almalki
Internet of Things (IoT) is an application of the internet correlation with devices that makes human life easy. The need to use (IoT) in our lives makes this field expands every day without stopping. Which would let everything connected to the internet exposure to penetration. As the need for (IoT) devices grows, the horizon of malicious abuse expands [1]. In this paper, we will study one of the most common violations in IoT devices, which is Distributed Denial of Service (DDoS) attack and study its impact on (IoT) devices in order to be aware to control our utilizations and the need to secure the Internet of Things devices in our lives.
物联网(IoT)是互联网与设备的应用,使人类的生活变得轻松。在我们的生活中使用(物联网)的需求使得这个领域每天都在不断扩大。这将使所有与互联网相连的东西都暴露在渗透之中。随着对物联网设备需求的增长,恶意滥用的范围也在扩大[1]。在本文中,我们将研究物联网设备中最常见的违规行为之一,即分布式拒绝服务(DDoS)攻击,并研究其对(物联网)设备的影响,以便意识到控制我们的利用率和保护我们生活中物联网设备的需求。
{"title":"DDOS Attack on IOT Devices","authors":"A. Munshi, Nouf Ayadh Alqarni, Nadia Abdullah Almalki","doi":"10.1109/ICCAIS48893.2020.9096818","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096818","url":null,"abstract":"Internet of Things (IoT) is an application of the internet correlation with devices that makes human life easy. The need to use (IoT) in our lives makes this field expands every day without stopping. Which would let everything connected to the internet exposure to penetration. As the need for (IoT) devices grows, the horizon of malicious abuse expands [1]. In this paper, we will study one of the most common violations in IoT devices, which is Distributed Denial of Service (DDoS) attack and study its impact on (IoT) devices in order to be aware to control our utilizations and the need to secure the Internet of Things devices in our lives.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132258599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Framework for Socializing Learning Content 社会化学习内容的框架
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096832
Y. AlRoshdi, Mohammed AlBadawi, Mohammed Sarrab
Learning systems contain an enormous amount of knowledge that is of high importance for students. This knowledge exists in different learning materials, such as documents, figures, and diagrams, videos, etc. The students can use this information to increase and build their knowledge. However, the searching mechanisms through these materials are difficult and time-consuming. Besides, the student consuming time in from of the social networks. Therefore, there is a need to utilize and enhance the way of learning and summarizing knowledge from the tremendous amount of learning materials that exist in the e-learning systems. Also, we want to benefit from the students’ desire in the social networks environment to disseminate the extracted knowledge among them through those platforms. Thus, this research aims to propose a framework to disseminate the learning content to the target students through the social network environment. This framework seeks to improve the learning experience and increase the learning outcomes of the students.
学习系统包含了对学生来说非常重要的大量知识。这些知识存在于不同的学习材料中,如文档、数字、图表、视频等。学生可以使用这些信息来增加和建立他们的知识。然而,通过这些材料的搜索机制是困难和耗时的。此外,学生在社交网络上花费时间。因此,有必要利用和改进电子学习系统中存在的大量学习材料中的学习和总结知识的方式。同时,我们希望利用学生在社交网络环境下的愿望,通过这些平台在他们之间传播提取的知识。因此,本研究旨在提出一个通过社交网络环境将学习内容传播给目标学生的框架。该框架旨在改善学生的学习体验,提高学生的学习成果。
{"title":"Framework for Socializing Learning Content","authors":"Y. AlRoshdi, Mohammed AlBadawi, Mohammed Sarrab","doi":"10.1109/ICCAIS48893.2020.9096832","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096832","url":null,"abstract":"Learning systems contain an enormous amount of knowledge that is of high importance for students. This knowledge exists in different learning materials, such as documents, figures, and diagrams, videos, etc. The students can use this information to increase and build their knowledge. However, the searching mechanisms through these materials are difficult and time-consuming. Besides, the student consuming time in from of the social networks. Therefore, there is a need to utilize and enhance the way of learning and summarizing knowledge from the tremendous amount of learning materials that exist in the e-learning systems. Also, we want to benefit from the students’ desire in the social networks environment to disseminate the extracted knowledge among them through those platforms. Thus, this research aims to propose a framework to disseminate the learning content to the target students through the social network environment. This framework seeks to improve the learning experience and increase the learning outcomes of the students.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115290023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Metrics that impact on Congestion Control at Internet Of Things Environment 影响物联网环境中拥塞控制的指标
Pub Date : 2020-03-01 DOI: 10.1109/ICCAIS48893.2020.9096865
Fatimah Alghamdi
Congestion is very common in wireless networks as multiple sensors try to transmit data simultaneously. The Internet Of Things (IOT) is a dynamic system. Using a specific congestion control algorithm with one IOT system provides different results from other IOT systems. This means that an IOT developer cannot use the same congestion control algorithm with different IOT systems, because the efficiency of congestion control algorithms varies from one IOT system to another according to the infrastructure of the smart system and the amount of transmitted data. The primary purpose of this work is to support analysts and designers of congestion control algorithms at IOT companies by understanding the metrics influencing congestion control. This will enable them to select the appropriate metrics depending on the nature of the IOT infrastructure and the amount of transmitted data. This study also conducts a literature review of papers that discuss transport protocols providing congestion control. The data extraction process gathered from 30 transport protocols concerning congestion control. From the reviewed papers, we extract the metrics that influence congestion control detection, notification, and mitigation. After that, we applied some statistical solutions on extracted metrics. We find queue length is the metrics used most often for congestion detection. While additive increase multiplicative decrease (AIMD) for single-bit transmitting is the most used metrics for congestion notication. Whereas rate control is the most used metrics for congestion mitigation
拥塞在无线网络中很常见,因为多个传感器试图同时传输数据。物联网(IOT)是一个动态系统。在一个物联网系统中使用特定的拥塞控制算法可以提供与其他物联网系统不同的结果。这意味着物联网开发人员不能对不同的物联网系统使用相同的拥塞控制算法,因为根据智能系统的基础设施和传输的数据量,拥塞控制算法的效率因物联网系统而异。这项工作的主要目的是通过了解影响拥塞控制的指标来支持物联网公司拥塞控制算法的分析师和设计师。这将使他们能够根据物联网基础设施的性质和传输的数据量选择适当的指标。本研究还对讨论提供拥塞控制的传输协议的论文进行了文献综述。从有关拥塞控制的30个传输协议中收集的数据提取过程。从审查的论文中,我们提取了影响拥塞控制检测、通知和缓解的指标。之后,我们对提取的指标应用了一些统计解决方案。我们发现队列长度是最常用于拥塞检测的指标。而单比特传输的加性增加乘性减少(AIMD)是最常用的拥塞通知度量。而速率控制是缓解拥塞最常用的指标
{"title":"Metrics that impact on Congestion Control at Internet Of Things Environment","authors":"Fatimah Alghamdi","doi":"10.1109/ICCAIS48893.2020.9096865","DOIUrl":"https://doi.org/10.1109/ICCAIS48893.2020.9096865","url":null,"abstract":"Congestion is very common in wireless networks as multiple sensors try to transmit data simultaneously. The Internet Of Things (IOT) is a dynamic system. Using a specific congestion control algorithm with one IOT system provides different results from other IOT systems. This means that an IOT developer cannot use the same congestion control algorithm with different IOT systems, because the efficiency of congestion control algorithms varies from one IOT system to another according to the infrastructure of the smart system and the amount of transmitted data. The primary purpose of this work is to support analysts and designers of congestion control algorithms at IOT companies by understanding the metrics influencing congestion control. This will enable them to select the appropriate metrics depending on the nature of the IOT infrastructure and the amount of transmitted data. This study also conducts a literature review of papers that discuss transport protocols providing congestion control. The data extraction process gathered from 30 transport protocols concerning congestion control. From the reviewed papers, we extract the metrics that influence congestion control detection, notification, and mitigation. After that, we applied some statistical solutions on extracted metrics. We find queue length is the metrics used most often for congestion detection. While additive increase multiplicative decrease (AIMD) for single-bit transmitting is the most used metrics for congestion notication. Whereas rate control is the most used metrics for congestion mitigation","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122897767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1