首页 > 最新文献

2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)最新文献

英文 中文
Towards Better Attack Path Visualizations Based on Deep Normalization of Host/Network IDS Alerts 基于主机/网络IDS警报深度归一化的攻击路径可视化
Amir Azodi, Feng Cheng, C. Meinel
Mitigation techniques employed by attackers has meant that traditional Network Intrusion Detection Systems (NIDS) are no longer able to reliably protect a network in the face of ever more sophisticated attacks. Security Information and Event Management (SIEM) systems monitor network systems by analyzing the logs they produce. In this paper, we propose a method of visualizing attacks by aggregating, normalizing and analyzing alerts raised by SIEM-based IDS (SIDS) systems as well as NIDS systems in real-time. We present the results of our proposed visualization technique when applied to different attack scenarios. In many cases, our approach allows for the path an attacker takes during their attack to be visualized.
攻击者采用的缓解技术意味着传统的网络入侵检测系统(NIDS)在面对越来越复杂的攻击时不再能够可靠地保护网络。安全信息和事件管理(SIEM)系统通过分析网络系统产生的日志来监控网络系统。在本文中,我们提出了一种通过聚合、规范化和实时分析基于siem的IDS (SIDS)系统和NIDS系统发出的警报来可视化攻击的方法。我们展示了我们提出的可视化技术在不同攻击场景下的应用结果。在许多情况下,我们的方法允许攻击者在攻击过程中所采取的路径被可视化。
{"title":"Towards Better Attack Path Visualizations Based on Deep Normalization of Host/Network IDS Alerts","authors":"Amir Azodi, Feng Cheng, C. Meinel","doi":"10.1109/AINA.2016.129","DOIUrl":"https://doi.org/10.1109/AINA.2016.129","url":null,"abstract":"Mitigation techniques employed by attackers has meant that traditional Network Intrusion Detection Systems (NIDS) are no longer able to reliably protect a network in the face of ever more sophisticated attacks. Security Information and Event Management (SIEM) systems monitor network systems by analyzing the logs they produce. In this paper, we propose a method of visualizing attacks by aggregating, normalizing and analyzing alerts raised by SIEM-based IDS (SIDS) systems as well as NIDS systems in real-time. We present the results of our proposed visualization technique when applied to different attack scenarios. In many cases, our approach allows for the path an attacker takes during their attack to be visualized.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122227157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Cloud-Based Energy Efficient System for Enhancing the Detection and Prevention of Modern Malware 一种基于云的节能系统,用于增强现代恶意软件的检测和预防
Q. A. K. Mirza, Ghulam Mohi Ud Din, I. Awan
In today's modern world, a simple malware attack can result catastrophically and can cause havoc. In spite of numerous types of antiviruses available in the market, there is a dearth in detection techniques of these antiviruses. This paper proposes a complete system, which is a combination of conventional and new techniques for detecting malware. We first evaluate the antiviruses against 10,000+ malware samples to highlight their weaknesses and then propose, implement, and benchmark the cloud-based system against some defined parameters. We have tested the effectiveness and efficiency of the proposed system by monitoring the detection rate and processing power it consumes in order to operate in a host machine.
在当今的现代世界中,一个简单的恶意软件攻击可能导致灾难性的后果,并可能造成严重破坏。尽管市场上有许多类型的反病毒软件,但这些反病毒软件的检测技术却很缺乏。本文提出了一个将传统技术与新技术相结合的完整的恶意软件检测系统。我们首先针对10,000多个恶意软件样本评估反病毒软件,以突出其弱点,然后根据一些定义的参数提出,实施和基准测试基于云的系统。我们通过监测检测率和在主机上运行所消耗的处理能力来测试所提出系统的有效性和效率。
{"title":"A Cloud-Based Energy Efficient System for Enhancing the Detection and Prevention of Modern Malware","authors":"Q. A. K. Mirza, Ghulam Mohi Ud Din, I. Awan","doi":"10.1109/AINA.2016.133","DOIUrl":"https://doi.org/10.1109/AINA.2016.133","url":null,"abstract":"In today's modern world, a simple malware attack can result catastrophically and can cause havoc. In spite of numerous types of antiviruses available in the market, there is a dearth in detection techniques of these antiviruses. This paper proposes a complete system, which is a combination of conventional and new techniques for detecting malware. We first evaluate the antiviruses against 10,000+ malware samples to highlight their weaknesses and then propose, implement, and benchmark the cloud-based system against some defined parameters. We have tested the effectiveness and efficiency of the proposed system by monitoring the detection rate and processing power it consumes in order to operate in a host machine.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114064103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Trust Management Framework for Internet of Things 物联网信任管理框架
Yefeng Ruan, A. Durresi, L. Alfantoukh
Internet of Things (IoT) can connect a large numberof things (or agents) through communication networks for varioustypes of applications. Like in many other applications, it isvery important for all the agents in IoT systems to collaboratewith each other following predefined protocols. In this paper, we proposed a general trust management framework aiming tohelp agents to evaluate their partners' trustworthiness. We run asimulation for a food nutrition analysis example. It shows that byusing trust, the analysis error can be reduced. Also, we illustratetwo possible types of attacks, and show how to use different trustfactors or environments together to alleviate the damage.
物联网(IoT)可以通过通信网络连接大量的事物(或代理),用于各种类型的应用。与许多其他应用程序一样,物联网系统中的所有代理按照预定义的协议相互协作非常重要。在本文中,我们提出了一个通用的信任管理框架,旨在帮助代理评估其合作伙伴的可信度。我们对一个食品营养分析的例子进行了模拟。结果表明,利用信任可以减小分析误差。此外,我们还说明了两种可能的攻击类型,并展示了如何一起使用不同的信任因素或环境来减轻损害。
{"title":"Trust Management Framework for Internet of Things","authors":"Yefeng Ruan, A. Durresi, L. Alfantoukh","doi":"10.1109/AINA.2016.136","DOIUrl":"https://doi.org/10.1109/AINA.2016.136","url":null,"abstract":"Internet of Things (IoT) can connect a large numberof things (or agents) through communication networks for varioustypes of applications. Like in many other applications, it isvery important for all the agents in IoT systems to collaboratewith each other following predefined protocols. In this paper, we proposed a general trust management framework aiming tohelp agents to evaluate their partners' trustworthiness. We run asimulation for a food nutrition analysis example. It shows that byusing trust, the analysis error can be reduced. Also, we illustratetwo possible types of attacks, and show how to use different trustfactors or environments together to alleviate the damage.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114210619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
An Energy Efficient and Balanced Energy Consumption Cluster Based Routing Protocol for Underwater Wireless Sensor Networks 水下无线传感器网络中一种高效且均衡能耗的集群路由协议
Abdul Majid, Irfan Azam, Abdul Waheed, Muhammad Zain-ul-Abidin, Taimur Hafeez, Z. Khan, U. Qasim, N. Javaid
In Underwater Wireless Sensor Networks (UWSNs) nodes are equipped with limited battery power and battery replacement is expensive due to underwater harsh environment. Therefore, we propose EBECRP an energy Efficient and Balanced Energy consumption Cluster based Routing Protocol for UWSNs. In depth base routing protocols nodes near the sink (low depth nodes) die in no time because of high load. We avoid depth base routing in our proposed scheme and use mobile sinks to balance load on all nodes. We also use the concept of clustering to reduce multi hoping which results in more energy consumption. The selected Cluster Heads (CHs) collect data from one hope neighbor nodes to reduce global communication into locally compressed communication. Simulation results show that EBECRP achieves maximum stability period and network life time.
在水下无线传感器网络(UWSNs)中,由于水下环境恶劣,节点的电池电量有限,电池更换成本高。因此,我们提出了EBECRP——一种高效且均衡能耗的基于集群的uwsn路由协议。在深度基础路由协议中,靠近汇聚节点(低深度节点)的节点由于高负载而很快死亡。在我们提出的方案中,我们避免了深度基础路由,并使用移动sink来平衡所有节点上的负载。我们还使用聚类的概念来减少导致更多能量消耗的多重希望。所选簇头(CHs)从一个希望邻居节点收集数据,将全局通信压缩为局部通信。仿真结果表明,EBECRP实现了最大的稳定周期和网络寿命。
{"title":"An Energy Efficient and Balanced Energy Consumption Cluster Based Routing Protocol for Underwater Wireless Sensor Networks","authors":"Abdul Majid, Irfan Azam, Abdul Waheed, Muhammad Zain-ul-Abidin, Taimur Hafeez, Z. Khan, U. Qasim, N. Javaid","doi":"10.1109/AINA.2016.165","DOIUrl":"https://doi.org/10.1109/AINA.2016.165","url":null,"abstract":"In Underwater Wireless Sensor Networks (UWSNs) nodes are equipped with limited battery power and battery replacement is expensive due to underwater harsh environment. Therefore, we propose EBECRP an energy Efficient and Balanced Energy consumption Cluster based Routing Protocol for UWSNs. In depth base routing protocols nodes near the sink (low depth nodes) die in no time because of high load. We avoid depth base routing in our proposed scheme and use mobile sinks to balance load on all nodes. We also use the concept of clustering to reduce multi hoping which results in more energy consumption. The selected Cluster Heads (CHs) collect data from one hope neighbor nodes to reduce global communication into locally compressed communication. Simulation results show that EBECRP achieves maximum stability period and network life time.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121713935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Bio-Inspired Cryptographic Techniques in Information Management Applications 信息管理应用中的仿生密码技术
L. Ogiela, M. Ogiela
This paper will present new possibilities of information sharing with the use of biometric techniques. Various biometric techniques used in personal identification processes will constitute the basis for new data classification solutions. The process of data classification will be possible owing to the use of cryptographic techniques of sharing information, enriched by elements of biometric processes of personal identification. This type of solutions will serve to support the processes of managing strategic information.
本文将介绍利用生物识别技术进行信息共享的新可能性。在个人识别过程中使用的各种生物识别技术将构成新的数据分类解决方案的基础。由于使用了共享信息的密码技术,加上个人身份识别的生物识别过程的元素,数据分类的过程将成为可能。这种类型的解决方案将用于支持管理战略信息的过程。
{"title":"Bio-Inspired Cryptographic Techniques in Information Management Applications","authors":"L. Ogiela, M. Ogiela","doi":"10.1109/AINA.2016.161","DOIUrl":"https://doi.org/10.1109/AINA.2016.161","url":null,"abstract":"This paper will present new possibilities of information sharing with the use of biometric techniques. Various biometric techniques used in personal identification processes will constitute the basis for new data classification solutions. The process of data classification will be possible owing to the use of cryptographic techniques of sharing information, enriched by elements of biometric processes of personal identification. This type of solutions will serve to support the processes of managing strategic information.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"23 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131156855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Energy-Aware Clusters of Servers for Storage and Computation Applications 用于存储和计算应用的能量感知服务器集群
A. Sawada, Hiroki Kataoka, Dilawaer Duolikun, T. Enokido, M. Takizawa
It is now critical to reduce electric energy consumed in a cluster of servers, especially scalable systems like cloud computing systems. In clusters, most application processes like web applications use not only CPU resources but also files and databases. In this paper, we consider storage processes which read and write data in files in addition to computation processes. We propose a PCS model (power consumption model for a storage server) which shows how much electric power a server consumes to perform storage and computation processes. We also propose a CS model (a computation model for storage server) which shows how long it is expected to take to perform storage processes and computation processes. By using the PCS and CS models, we propose a local energy-aware (LEA) algorithm to select a server for a request process in a cluster so that the total electric energy consumption of the servers can be reduced. We evaluate the LEA algorithm in terms of total electric energy consumption of the servers. We show the electric energy consumed by servers to perform computation and storage processes can be reduced in the LEA algorithm.
现在,减少服务器集群中的电能消耗是至关重要的,尤其是像云计算系统这样的可扩展系统。在集群中,大多数应用程序进程(如web应用程序)不仅使用CPU资源,还使用文件和数据库。在本文中,除了计算过程外,我们还考虑了读取和写入文件数据的存储过程。我们提出了一个PCS模型(存储服务器的功耗模型),它显示了服务器执行存储和计算过程所消耗的电力。我们还提出了一个CS模型(存储服务器的计算模型),它显示了执行存储过程和计算过程所需的时间。利用PCS和CS模型,提出了一种局部能量感知(LEA)算法来为集群中的请求进程选择服务器,从而降低服务器的总能耗。我们根据服务器的总电能消耗来评估LEA算法。我们证明了LEA算法可以减少服务器执行计算和存储过程所消耗的电能。
{"title":"Energy-Aware Clusters of Servers for Storage and Computation Applications","authors":"A. Sawada, Hiroki Kataoka, Dilawaer Duolikun, T. Enokido, M. Takizawa","doi":"10.1109/AINA.2016.157","DOIUrl":"https://doi.org/10.1109/AINA.2016.157","url":null,"abstract":"It is now critical to reduce electric energy consumed in a cluster of servers, especially scalable systems like cloud computing systems. In clusters, most application processes like web applications use not only CPU resources but also files and databases. In this paper, we consider storage processes which read and write data in files in addition to computation processes. We propose a PCS model (power consumption model for a storage server) which shows how much electric power a server consumes to perform storage and computation processes. We also propose a CS model (a computation model for storage server) which shows how long it is expected to take to perform storage processes and computation processes. By using the PCS and CS models, we propose a local energy-aware (LEA) algorithm to select a server for a request process in a cluster so that the total electric energy consumption of the servers can be reduced. We evaluate the LEA algorithm in terms of total electric energy consumption of the servers. We show the electric energy consumed by servers to perform computation and storage processes can be reduced in the LEA algorithm.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133086244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
NEXT-FIT: Available Bandwidth Measurement over 4G/LTE Networks -- A Curve-Fitting Approach NEXT-FIT: 4G/LTE网络可用带宽测量——曲线拟合方法
A. Paul, Atsuo Tachibana, T. Hasegawa
Available bandwidth (ABW) estimation in wireless networks is a critical issue for quality-of-service (QoS) provisioning. Nowadays, a network path often contains at least one wireless link e.g., mobile users having wireless connection to the Internet through laptop PCs or smartphones. Most of the existing tools for measuring ABW have been developed and evaluated in wired networks. Since the characteristics of wired links and wireless links differ in many respects, such as fluctuations incapacity and stability due to the shared and unreliable nature of the wireless links, ABW estimation tools also need to be evaluated for network paths containing at least one wireless link. In this paper, we have extended our previous work, New Enhanced Available Bandwidth Estimation Technique (NEXT) by introducing a parameter-independent curve-fitting technique to detect the ABW from a one-way queuing delay signature and conducted a real test over a radio interface in a 4G/LTE mobile communication network. For the experiments, a commercial 4G/LTE mobile network of a Japanese mobile operator was used. Extensive simulations over an IEEE 802.11 network were also performed. Simulation results as well as real-world experimental results demonstrate that it is feasible to achieve reliable estimates under certain circumstances. Our extended approach, which we call NEXT -- FIT, has very good ABW estimation results under conditions of different packet sizes, dynamic wireless link rates, and channel noises.
无线网络中可用带宽(ABW)的估计是服务质量(QoS)提供的关键问题。如今,网络路径通常包含至少一个无线链路,例如,移动用户通过笔记本电脑或智能手机无线连接到互联网。大多数现有的测量ABW的工具都是在有线网络中开发和评估的。由于有线链路和无线链路的特性在许多方面有所不同,例如由于无线链路的共享和不可靠性质而导致波动、丧失能力和稳定性,因此还需要对包含至少一个无线链路的网络路径评估ABW估计工具。在本文中,我们通过引入一种参数无关的曲线拟合技术来从单向排队延迟签名中检测ABW,扩展了我们之前的工作,新增强可用带宽估计技术(NEXT),并在4G/LTE移动通信网络的无线电接口上进行了实际测试。实验使用了日本移动运营商的商用4G/LTE移动网络。还在IEEE 802.11网络上进行了广泛的模拟。仿真结果和实际实验结果表明,在一定情况下实现可靠估计是可行的。我们的扩展方法,我们称之为NEXT - FIT,在不同分组大小,动态无线链路速率和信道噪声的条件下具有非常好的ABW估计结果。
{"title":"NEXT-FIT: Available Bandwidth Measurement over 4G/LTE Networks -- A Curve-Fitting Approach","authors":"A. Paul, Atsuo Tachibana, T. Hasegawa","doi":"10.1109/AINA.2016.24","DOIUrl":"https://doi.org/10.1109/AINA.2016.24","url":null,"abstract":"Available bandwidth (ABW) estimation in wireless networks is a critical issue for quality-of-service (QoS) provisioning. Nowadays, a network path often contains at least one wireless link e.g., mobile users having wireless connection to the Internet through laptop PCs or smartphones. Most of the existing tools for measuring ABW have been developed and evaluated in wired networks. Since the characteristics of wired links and wireless links differ in many respects, such as fluctuations incapacity and stability due to the shared and unreliable nature of the wireless links, ABW estimation tools also need to be evaluated for network paths containing at least one wireless link. In this paper, we have extended our previous work, New Enhanced Available Bandwidth Estimation Technique (NEXT) by introducing a parameter-independent curve-fitting technique to detect the ABW from a one-way queuing delay signature and conducted a real test over a radio interface in a 4G/LTE mobile communication network. For the experiments, a commercial 4G/LTE mobile network of a Japanese mobile operator was used. Extensive simulations over an IEEE 802.11 network were also performed. Simulation results as well as real-world experimental results demonstrate that it is feasible to achieve reliable estimates under certain circumstances. Our extended approach, which we call NEXT -- FIT, has very good ABW estimation results under conditions of different packet sizes, dynamic wireless link rates, and channel noises.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122913837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Ant Colony Optimization Based Energy Management Controller for Smart Grid 基于蚁群优化的智能电网能量管理控制器
Sahar Rahim, Z. Iqbal, Nusrat Shaheen, Z. Khan, U. Qasim, S. A. Khan, N. Javaid
In this paper, we introduce a generic architecture for demand side management (DSM) and use combined model of time of use tariff and inclined block rates. The problem formulation is carried via multiple knapsack and its solution is obtained via ant colony optimization (ACO). Simulation results show that the designed model for energy management achieves our objectives, it is proven as a cost-effective solution to increase sustainability of smart grid. The ACO based energy management controller performs more efficiently than energy management controller without ACO based scheduling in terms of electricity bill reduction, peak to average ratio minimization and user comfort level maximization.
本文介绍了一种通用的需求侧管理体系结构,并采用了分时电价和倾斜分段电价的组合模型。该问题通过多个背包进行表述,并通过蚁群算法求解。仿真结果表明,所设计的能量管理模型达到了预期目标,是提高智能电网可持续性的一种经济有效的解决方案。基于蚁群算法的能源管理控制器在电费减少、峰均比最小化和用户舒适度最大化方面比不基于蚁群算法的能源管理控制器更有效。
{"title":"Ant Colony Optimization Based Energy Management Controller for Smart Grid","authors":"Sahar Rahim, Z. Iqbal, Nusrat Shaheen, Z. Khan, U. Qasim, S. A. Khan, N. Javaid","doi":"10.1109/AINA.2016.163","DOIUrl":"https://doi.org/10.1109/AINA.2016.163","url":null,"abstract":"In this paper, we introduce a generic architecture for demand side management (DSM) and use combined model of time of use tariff and inclined block rates. The problem formulation is carried via multiple knapsack and its solution is obtained via ant colony optimization (ACO). Simulation results show that the designed model for energy management achieves our objectives, it is proven as a cost-effective solution to increase sustainability of smart grid. The ACO based energy management controller performs more efficiently than energy management controller without ACO based scheduling in terms of electricity bill reduction, peak to average ratio minimization and user comfort level maximization.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"29 6 Suppl 19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131871819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
OS and Application Identification by Installed Fonts 操作系统和应用程序识别安装字体
Takamichi Saito, Kazushi Takahashi, K. Yasuda, Takayuki Ishikawa, Ko Takasu, Tomotaka Yamada, Naoki Takei, Rio Hosoi
Recently, some commercial websites collect browsing history and device information for use in services they provide. In this paper, we focused on font information that can be obtained via a web browser to determine what kind of software can be identified about a given device. According to existing research, it is possible to identify installed applications such as the Adobe Flash Player and Microsoft Office using such font information. Thus, we have examined the fonts installed by operating systems (OS) and applications. Our results show that font information on a device can be used to identify installed applications and OS type and version.
最近,一些商业网站收集浏览历史和设备信息用于他们提供的服务。在本文中,我们关注的是可以通过网络浏览器获得的字体信息,以确定在给定设备上可以识别出什么样的软件。根据现有的研究,可以使用这些字体信息来识别已安装的应用程序,如Adobe Flash Player和Microsoft Office。因此,我们已经检查了操作系统(OS)和应用程序安装的字体。我们的研究结果表明,设备上的字体信息可以用来识别安装的应用程序和操作系统的类型和版本。
{"title":"OS and Application Identification by Installed Fonts","authors":"Takamichi Saito, Kazushi Takahashi, K. Yasuda, Takayuki Ishikawa, Ko Takasu, Tomotaka Yamada, Naoki Takei, Rio Hosoi","doi":"10.1109/AINA.2016.55","DOIUrl":"https://doi.org/10.1109/AINA.2016.55","url":null,"abstract":"Recently, some commercial websites collect browsing history and device information for use in services they provide. In this paper, we focused on font information that can be obtained via a web browser to determine what kind of software can be identified about a given device. According to existing research, it is possible to identify installed applications such as the Adobe Flash Player and Microsoft Office using such font information. Thus, we have examined the fonts installed by operating systems (OS) and applications. Our results show that font information on a device can be used to identify installed applications and OS type and version.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133400174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Ontology Based Approach for Satisfying User Requests in Context Aware Settings 基于本体的上下文感知环境下满足用户请求的方法
Sujata Swain, R. Niyogi
In context aware settings, if one or more services are unavailable, it may be useful to look for a set of services whose combined effect would be functionally equivalent to a given request. We show that the notion of functional equivalence is quite useful in some real world scenarios. In this paper, we suggest a method to obtain a composed service whose effect is functionally equivalent to the given request. The algorithm has been implemented on some domains and the results are promising.
在上下文感知设置中,如果一个或多个服务不可用,那么寻找一组服务可能会很有用,这些服务的组合效果在功能上相当于给定的请求。我们展示了功能等价的概念在一些实际场景中是非常有用的。在本文中,我们提出了一种方法来获得组合服务,其效果在功能上等同于给定的请求。该算法已经在一些领域得到了应用,取得了良好的效果。
{"title":"An Ontology Based Approach for Satisfying User Requests in Context Aware Settings","authors":"Sujata Swain, R. Niyogi","doi":"10.1109/AINA.2016.121","DOIUrl":"https://doi.org/10.1109/AINA.2016.121","url":null,"abstract":"In context aware settings, if one or more services are unavailable, it may be useful to look for a set of services whose combined effect would be functionally equivalent to a given request. We show that the notion of functional equivalence is quite useful in some real world scenarios. In this paper, we suggest a method to obtain a composed service whose effect is functionally equivalent to the given request. The algorithm has been implemented on some domains and the results are promising.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"382 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133168522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1