首页 > 最新文献

2020 3rd International Conference on Information and Computer Technologies (ICICT)最新文献

英文 中文
Significance of Agile Software Development and SQA Powered by Automation 敏捷软件开发和自动化驱动的SQA的意义
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00009
Bilal Gonen, D. Sawant
Today's software industry is fast moving and has daily changing demands. Many organizations are struggling to cope up with these emerging demands and they are looking for change in software development. Agile is most popular software development strategy in today's software industry, Agile provides different methods, organizations can choose suitable method to implement agility. Among all agile methods, Scrum is the most popular as of today. Although, agile is well suitable for large organization with distributed systems. Agile method such as 'scrum' can be improved further and it can work with other process and automation tools coupled with agile artifacts to improve software development team's performance such a solution can be applied to large scale industries. As no one solution is best suitable for today's business, hence the concept of 'Agile Genome' is becoming more popular, which encourages organizations to use combination of other methods and automation tools that can be used based on the application. Hence there is a need of discussing areas where agile and automation can work together and finding different ways of utilizing full potential of agile methods along with automation tools to achieve maximum benefits for the software industries.
今天的软件行业发展迅速,需求每天都在变化。许多组织正在努力应对这些新出现的需求,他们正在寻找软件开发中的变化。敏捷是当今软件行业最流行的软件开发策略,敏捷提供了不同的方法,组织可以选择适合的方法来实现敏捷性。在所有敏捷方法中,Scrum是目前最流行的。尽管如此,敏捷非常适合具有分布式系统的大型组织。像“scrum”这样的敏捷方法可以进一步改进,它可以与其他过程和自动化工具以及敏捷工件一起工作,以提高软件开发团队的性能,这样的解决方案可以应用于大规模的行业。由于没有一种解决方案最适合当今的业务,因此“敏捷基因组”的概念变得越来越流行,它鼓励组织使用其他方法和自动化工具的组合,这些方法和工具可以基于应用程序使用。因此,有必要讨论敏捷和自动化可以一起工作的领域,并找到利用敏捷方法和自动化工具的全部潜力的不同方法,以实现软件行业的最大利益。
{"title":"Significance of Agile Software Development and SQA Powered by Automation","authors":"Bilal Gonen, D. Sawant","doi":"10.1109/ICICT50521.2020.00009","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00009","url":null,"abstract":"Today's software industry is fast moving and has daily changing demands. Many organizations are struggling to cope up with these emerging demands and they are looking for change in software development. Agile is most popular software development strategy in today's software industry, Agile provides different methods, organizations can choose suitable method to implement agility. Among all agile methods, Scrum is the most popular as of today. Although, agile is well suitable for large organization with distributed systems. Agile method such as 'scrum' can be improved further and it can work with other process and automation tools coupled with agile artifacts to improve software development team's performance such a solution can be applied to large scale industries. As no one solution is best suitable for today's business, hence the concept of 'Agile Genome' is becoming more popular, which encourages organizations to use combination of other methods and automation tools that can be used based on the application. Hence there is a need of discussing areas where agile and automation can work together and finding different ways of utilizing full potential of agile methods along with automation tools to achieve maximum benefits for the software industries.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114260087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research on Mixed Planning Method of 5G and LTE 5G与LTE混合规划方法研究
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00084
Quan Yuan, Quanzhi Qian, Yong Mo, Hao Chen
5G will enter the stage of large-scale commercial deployment. It can be said that "quick deployment of 5G network" is the choice that telecom operators must make now. Due to the need to seize the 5G competition and the smooth evolution of the architecture, most domestic and foreign operators currently adopt the NSA solution. However, how to implement 5G network deployment can achieve accurate delivery of network resources and avoid waste of network resources and investment costs in 5G network deployment. In view of this problem, at the same time, the current 5G is still in the early stage of development, and there is no experience of large-scale planning and deployment. This paper proposes a hybrid planning method of 5G and LTE under the NSA mode. Firstly, the analysis introduces 5G network performance, NSA networking mode, system network planning indicators, and summarizes 5G network planning indicators, business forecasting, frequency planning, capacity planning and so on. Then, through the uplink and downlink budget, the coverage of 5G and LTE is determined. Finally, the grid analysis method is used to deploy the 5G network, and the simulation results are analyzed. The simulation results show that the proposed method can maintain the existing network structure and reduce the cost of network construction, so that operators can quickly deploy 5G on existing LTE sites, which has important guiding significance for the construction and deployment of the previous 5G network.
5G将进入大规模商用部署阶段。可以说,“快速部署5G网络”是电信运营商现在必须做出的选择。由于抢占5G竞争的需要和架构的平稳演进,目前国内外运营商大多采用NSA解决方案。然而,如何实施5G网络部署,可以实现网络资源的精准投放,避免5G网络部署中网络资源的浪费和投资成本。针对这一问题,同时,目前5G还处于发展初期,没有大规模规划部署的经验。本文提出了一种NSA模式下5G和LTE的混合规划方法。首先,分析介绍了5G网络性能、NSA组网方式、系统网络规划指标,总结了5G网络规划指标、业务预测、频率规划、容量规划等。然后,通过上下行预算,确定5G和LTE的覆盖范围。最后,采用网格分析方法对5G网络进行部署,并对仿真结果进行分析。仿真结果表明,提出的方法能够保持现有网络结构,降低网络建设成本,使运营商能够在现有LTE站点上快速部署5G,对以往5G网络的建设和部署具有重要的指导意义。
{"title":"Research on Mixed Planning Method of 5G and LTE","authors":"Quan Yuan, Quanzhi Qian, Yong Mo, Hao Chen","doi":"10.1109/ICICT50521.2020.00084","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00084","url":null,"abstract":"5G will enter the stage of large-scale commercial deployment. It can be said that \"quick deployment of 5G network\" is the choice that telecom operators must make now. Due to the need to seize the 5G competition and the smooth evolution of the architecture, most domestic and foreign operators currently adopt the NSA solution. However, how to implement 5G network deployment can achieve accurate delivery of network resources and avoid waste of network resources and investment costs in 5G network deployment. In view of this problem, at the same time, the current 5G is still in the early stage of development, and there is no experience of large-scale planning and deployment. This paper proposes a hybrid planning method of 5G and LTE under the NSA mode. Firstly, the analysis introduces 5G network performance, NSA networking mode, system network planning indicators, and summarizes 5G network planning indicators, business forecasting, frequency planning, capacity planning and so on. Then, through the uplink and downlink budget, the coverage of 5G and LTE is determined. Finally, the grid analysis method is used to deploy the 5G network, and the simulation results are analyzed. The simulation results show that the proposed method can maintain the existing network structure and reduce the cost of network construction, so that operators can quickly deploy 5G on existing LTE sites, which has important guiding significance for the construction and deployment of the previous 5G network.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131415438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
AzureML Based Analysis and Prediction Loan Borrowers Creditworthy 基于AzureML的借款人资信分析与预测
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00053
Khaldoon Alshouiliy, Ali AlGhamdi, D. Agrawal
In the era of big data, it would be beneficial for lenders to use modern technology such as machine learning algorithms to analyze and predict customers' creditworthy. In this research, our aim is to analyze LendingClub dataset to make it well understood dataset features. Then, we upload our clean dataset to Microsoft Azure machine learning (AzureML) platform to use for building our model. Which aims to predict whether the customers are going to pay back their loans or not. This model predicts the loan status going to be default or fully paid. Moreover, the LendingClub dataset we used in this work is gathered from 2007 to 2018 used accept loans. We used AzureML platform with Two Jungle algorithm and the Two Decision tree. Thereafter, we assess their performance (algorithms) in terms of Accuracy, Precision, Recall, F1 and AUC. Finally, we compare our work with other researchers and our work shows a good result compared to others.
在大数据时代,利用机器学习算法等现代技术来分析和预测客户的信用,对贷款机构来说是有益的。在本研究中,我们的目标是分析LendingClub数据集,使其更好地理解数据集特征。然后,我们将干净的数据集上传到微软Azure机器学习(AzureML)平台,用于构建我们的模型。其目的是预测客户是否会偿还贷款。该模型预测贷款状态将是违约或全额支付。此外,我们在这项工作中使用的LendingClub数据集收集了2007年至2018年用于接受贷款的数据集。我们使用AzureML平台,采用双丛林算法和双决策树。之后,我们从准确性、精度、召回率、F1和AUC方面评估了它们的性能(算法)。最后,我们将我们的工作与其他研究人员进行了比较,我们的工作与其他研究人员相比显示出良好的结果。
{"title":"AzureML Based Analysis and Prediction Loan Borrowers Creditworthy","authors":"Khaldoon Alshouiliy, Ali AlGhamdi, D. Agrawal","doi":"10.1109/ICICT50521.2020.00053","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00053","url":null,"abstract":"In the era of big data, it would be beneficial for lenders to use modern technology such as machine learning algorithms to analyze and predict customers' creditworthy. In this research, our aim is to analyze LendingClub dataset to make it well understood dataset features. Then, we upload our clean dataset to Microsoft Azure machine learning (AzureML) platform to use for building our model. Which aims to predict whether the customers are going to pay back their loans or not. This model predicts the loan status going to be default or fully paid. Moreover, the LendingClub dataset we used in this work is gathered from 2007 to 2018 used accept loans. We used AzureML platform with Two Jungle algorithm and the Two Decision tree. Thereafter, we assess their performance (algorithms) in terms of Accuracy, Precision, Recall, F1 and AUC. Finally, we compare our work with other researchers and our work shows a good result compared to others.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129252251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Net Neutrality Around the Globe: A Survey 全球网络中立性:一项调查
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00083
Van Nguyen, Derek Mohammed, Marwan Omar, Passard Dean
Net neutrality has been the topic of numerous debates in many countries. People are fighting for what they believe to be a basic right to use the Internet, in which bandwidth throttling and preferable treatments should not be exercised. There are many new developments in the fight for fair Internet access services. In this paper, we conduct a survey on a global scale of laws and regulations regarding net neutrality. We study the prominent countries in four parts of the world: North America, Central and South America, Asia, and Europe to show what laws and regulations are put into action for each country. We also compare how each country implements the net neutrality principles.
网络中立性在许多国家一直是争论不休的话题。人们正在为他们认为是使用互联网的基本权利而战,在这种权利中,带宽限制和更好的待遇不应该被行使。在争取公平的互联网接入服务方面,有许多新的进展。在本文中,我们对全球范围内有关网络中立性的法律法规进行了调查。我们研究了世界上四个地区的主要国家:北美、中南美洲、亚洲和欧洲,以显示每个国家实施的法律法规。我们还比较了每个国家如何实施网络中立原则。
{"title":"Net Neutrality Around the Globe: A Survey","authors":"Van Nguyen, Derek Mohammed, Marwan Omar, Passard Dean","doi":"10.1109/ICICT50521.2020.00083","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00083","url":null,"abstract":"Net neutrality has been the topic of numerous debates in many countries. People are fighting for what they believe to be a basic right to use the Internet, in which bandwidth throttling and preferable treatments should not be exercised. There are many new developments in the fight for fair Internet access services. In this paper, we conduct a survey on a global scale of laws and regulations regarding net neutrality. We study the prominent countries in four parts of the world: North America, Central and South America, Asia, and Europe to show what laws and regulations are put into action for each country. We also compare how each country implements the net neutrality principles.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"65 Supplement 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125075600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Content-Based Search in Lecture Video: A Systematic Literature Review 基于内容的讲座视频搜索:系统的文献回顾
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00034
Dipesh Chand, H. Oğul
With the advancement of science and technology, everything is directly or indirectly related to it. In the same way, the learning method is also changing. Nowadays e-learning is one of the most popular methods of learning where lecture video plays a great role. Although lots of work have been done in the area of lecture video limited work have been done using content-based searching. This paper aims to obtain an overview of the topic of lecture video content-based search. To achieve that, a protocol for systemic literature review has been adapted and subsequently implemented from literature review protocol standards. The objective is to assess the existing inputs and outputs in the literature to create the best lecture video content-based search system. This paper reveals benefits, obstacles and challenges, and data source and contents which can be extracted and utilized for content-based search.
随着科学技术的进步,一切都直接或间接地与之相关。同样,学习方法也在发生变化。如今,电子学习是最流行的学习方法之一,其中讲座视频扮演着重要的角色。尽管在讲座视频领域已经做了大量的工作,但基于内容的搜索所做的工作有限。本文旨在对讲座视频内容搜索的主题进行概述。为了实现这一目标,系统文献综述的协议已经被改编并随后从文献综述协议标准中实施。目标是评估文献中现有的输入和输出,以创建最佳的基于讲座视频内容的搜索系统。本文揭示了基于内容的搜索的优势、障碍和挑战,以及可以提取和利用的数据源和内容。
{"title":"Content-Based Search in Lecture Video: A Systematic Literature Review","authors":"Dipesh Chand, H. Oğul","doi":"10.1109/ICICT50521.2020.00034","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00034","url":null,"abstract":"With the advancement of science and technology, everything is directly or indirectly related to it. In the same way, the learning method is also changing. Nowadays e-learning is one of the most popular methods of learning where lecture video plays a great role. Although lots of work have been done in the area of lecture video limited work have been done using content-based searching. This paper aims to obtain an overview of the topic of lecture video content-based search. To achieve that, a protocol for systemic literature review has been adapted and subsequently implemented from literature review protocol standards. The objective is to assess the existing inputs and outputs in the literature to create the best lecture video content-based search system. This paper reveals benefits, obstacles and challenges, and data source and contents which can be extracted and utilized for content-based search.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125549687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
UAE Cybersecurity Perception and Risk Assessments Compared to Other Developed Nations 与其他发达国家相比,阿联酋的网络安全认知和风险评估
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00075
Sayyed Maisikeli
Understanding perception and risk behavior of citizens in a particular country can influence policies that leads to creation of appropriate cyber laws that guarantees citizens' security and privacy in cyber related transactions. UAE cyber activity and perception data is compared with data from nine developed nations. Results obtained have shown that with respect to monetary loss due to cybercrime versus relative risk, UAE is at par with Canada. Combination of results obtained suggests a need for aggressive promotion of cybersecurity awareness program in UAE. Although digital maturity, access to Internet and cybersecurity awareness in UAE may be low compared to other developed nations, cyber risk behavior is comparatively the same as in other nine developed nations. One major contribution of this research is that methodologies are presented that can be used in developing cybersecurity assessment of cybersecurity risk behaviors, and comparison of cyber related risk behavior among countries.
了解特定国家公民的认知和风险行为可以影响相关政策,从而制定适当的网络法律,保障公民在网络相关交易中的安全和隐私。阿联酋的网络活动和感知数据与9个发达国家的数据进行了比较。所获得的结果表明,就网络犯罪造成的经济损失与相对风险而言,阿联酋与加拿大不相上下。综合所获得的结果表明,需要在阿联酋积极推广网络安全意识计划。尽管与其他发达国家相比,阿联酋的数字成熟度、互联网接入和网络安全意识可能较低,但网络风险行为与其他九个发达国家相对相同。本研究的一个主要贡献是提出了可用于开发网络安全风险行为的网络安全评估以及国家间网络相关风险行为比较的方法。
{"title":"UAE Cybersecurity Perception and Risk Assessments Compared to Other Developed Nations","authors":"Sayyed Maisikeli","doi":"10.1109/ICICT50521.2020.00075","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00075","url":null,"abstract":"Understanding perception and risk behavior of citizens in a particular country can influence policies that leads to creation of appropriate cyber laws that guarantees citizens' security and privacy in cyber related transactions. UAE cyber activity and perception data is compared with data from nine developed nations. Results obtained have shown that with respect to monetary loss due to cybercrime versus relative risk, UAE is at par with Canada. Combination of results obtained suggests a need for aggressive promotion of cybersecurity awareness program in UAE. Although digital maturity, access to Internet and cybersecurity awareness in UAE may be low compared to other developed nations, cyber risk behavior is comparatively the same as in other nine developed nations. One major contribution of this research is that methodologies are presented that can be used in developing cybersecurity assessment of cybersecurity risk behaviors, and comparison of cyber related risk behavior among countries.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116420117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Securing the Rights of Data Subjects with Blockchain Technology 用区块链技术保护数据主体的权利
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00050
Dominik Schmelz, K. Pinter, Johannes Brottrager, Phillip Niemeier, René Lamber, T. Grechenig
The European Union's General Data Protection Regulation (GDPR) has been effective for more than a year. Even though several million euros have been spent on GDPR projects, companies are insecure about being fully compliant. The status quo is that companies lack processes and infrastructure for several legal responsibilities regarding rights of data subjects. This leads to manual effort and long waiting times for users. Data protection authorities receive complaints about these waiting times, but affected people cannot legally submit a proof for request initiation since these requests are usually done via the companies' platforms or email. This paper presents a technical solution to this problem by installing a blockchain-based application to submit and track requests for data access securely whilst preserving data protection for the subjects to be able to file complaints and ultimately ensure the given data protection rights.
欧盟的通用数据保护条例(GDPR)已经生效一年多了。尽管在GDPR项目上花费了数百万欧元,但公司对完全遵守GDPR没有信心。目前的现状是,企业缺乏与数据主体权利相关的若干法律责任的流程和基础设施。这将导致手工工作和用户的长等待时间。数据保护机构收到了关于这些等待时间的投诉,但受影响的人无法合法地提交发起请求的证据,因为这些请求通常是通过公司的平台或电子邮件完成的。本文提出了一种技术解决方案,通过安装基于区块链的应用程序来安全地提交和跟踪数据访问请求,同时为主体保留数据保护,以便能够提交投诉并最终确保给定的数据保护权利。
{"title":"Securing the Rights of Data Subjects with Blockchain Technology","authors":"Dominik Schmelz, K. Pinter, Johannes Brottrager, Phillip Niemeier, René Lamber, T. Grechenig","doi":"10.1109/ICICT50521.2020.00050","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00050","url":null,"abstract":"The European Union's General Data Protection Regulation (GDPR) has been effective for more than a year. Even though several million euros have been spent on GDPR projects, companies are insecure about being fully compliant. The status quo is that companies lack processes and infrastructure for several legal responsibilities regarding rights of data subjects. This leads to manual effort and long waiting times for users. Data protection authorities receive complaints about these waiting times, but affected people cannot legally submit a proof for request initiation since these requests are usually done via the companies' platforms or email. This paper presents a technical solution to this problem by installing a blockchain-based application to submit and track requests for data access securely whilst preserving data protection for the subjects to be able to file complaints and ultimately ensure the given data protection rights.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132216385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Open Source PowerShell-Written Post Exploitation Frameworks Used by Cyber Espionage Groups 网络间谍组织使用的开源powershell编写的Post exploit框架
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00078
Tjada Nelson, H. Kettani
Cyber espionage groups are sophisticated adversary groups that conduct complex attack campaigns against their targets. As cyber espionage activities increase, there will be an increased pressure on these groups to quickly and effectively conduct their cyber operations against their targets. Using open source hacking tools can allow these groups to meet this demand by lowering resources which would otherwise be used to develop customized tooling. Using a language such as PowerShell which is widely available on target systems, cyber espionage groups can use tools that require less setup and manipulation to operate. Open source PowerShell-written post exploitation frameworks allow cyber espionage groups to leverage open source tooling on the PowerShell platform. This makes an ideal attack platform to conduct cyber operations from. This paper details cyber espionage groups that use open source PowerShell-written post exploitation frameworks and describe how they are used. The goal of this research is to understand how this tooling is used and identify trends that can lead to insights on future usage.
网络间谍组织是老练的敌对组织,他们对目标进行复杂的攻击活动。随着网络间谍活动的增加,这些组织将面临越来越大的压力,需要迅速有效地对目标实施网络行动。使用开源黑客工具可以让这些组织通过减少原本用于开发定制工具的资源来满足这种需求。使用PowerShell等在目标系统上广泛使用的语言,网络间谍组织可以使用需要较少设置和操作的工具来操作。开源PowerShell编写的帖子利用框架允许网络间谍组织利用PowerShell平台上的开源工具。这使其成为进行网络作战的理想攻击平台。本文详细介绍了使用开源powershell编写的post exploit框架的网络间谍组织,并描述了它们是如何使用的。本研究的目标是了解如何使用此工具,并确定可以导致对未来使用的见解的趋势。
{"title":"Open Source PowerShell-Written Post Exploitation Frameworks Used by Cyber Espionage Groups","authors":"Tjada Nelson, H. Kettani","doi":"10.1109/ICICT50521.2020.00078","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00078","url":null,"abstract":"Cyber espionage groups are sophisticated adversary groups that conduct complex attack campaigns against their targets. As cyber espionage activities increase, there will be an increased pressure on these groups to quickly and effectively conduct their cyber operations against their targets. Using open source hacking tools can allow these groups to meet this demand by lowering resources which would otherwise be used to develop customized tooling. Using a language such as PowerShell which is widely available on target systems, cyber espionage groups can use tools that require less setup and manipulation to operate. Open source PowerShell-written post exploitation frameworks allow cyber espionage groups to leverage open source tooling on the PowerShell platform. This makes an ideal attack platform to conduct cyber operations from. This paper details cyber espionage groups that use open source PowerShell-written post exploitation frameworks and describe how they are used. The goal of this research is to understand how this tooling is used and identify trends that can lead to insights on future usage.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132256886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Partial Scoring of Reordering Tasks Revisited: Linearity Matrix by Excel 重新排序任务的部分评分:线性矩阵的Excel
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00008
Amma Kazuo
Estimating a partial score of item reordering tasks has long been neglected in language testing and education sciences. A psychologically valid means of scoring, MRS (Maximal Relative Sequence) was proposed by the author and transplanted to Excel. As the protocol simply picks up elements in relative ascending order, it made easier the non-specialists’ access to and analysis of the calculation process resulting in educational as well as practical significance. However, since the Excel enumeration replicated each step of MRS precisely, the number of columns consumed explodes as the number of elements increases. Moreover, MRS merely counts the number of elements to be relocated; it fails to consider the distance of relocation for recovery. This paper proposes an alternative solution LM (Linearity Matrix), also executable with Excel’s basic functions, with far fewer columns to consume. Further, LM is advantageous over MRS in that it is a general protocol of estimating relative similarity of two sequences of which Kendall’s tau is a special case; LM is adjustable as to the degree of adjacency constraint by changing the distance weight for all combinations of elements.
在语言测试和教育科学中,对项目重新排序任务的部分分数估计一直被忽视。笔者提出了一种心理上有效的评分方法——MRS (maximum Relative Sequence),并将其移植到Excel中。由于该协议简单地以相对升序拾取元素,它使非专业人员更容易访问和分析计算过程,从而具有教育和实际意义。但是,由于Excel枚举精确地复制了MRS的每一步,因此所消耗的列数随着元素数量的增加而激增。此外,MRS仅仅计算要重新定位的元素的数量;它没有考虑到回收的搬迁距离。本文提出了另一种解决方案LM(线性矩阵),也可以用Excel的基本函数执行,需要消耗的列要少得多。此外,LM优于MRS,因为它是估计两个序列相对相似性的一般协议,其中Kendall 's tau是一个特殊情况;LM可以通过改变所有元素组合的距离权重来调节邻接约束的程度。
{"title":"Partial Scoring of Reordering Tasks Revisited: Linearity Matrix by Excel","authors":"Amma Kazuo","doi":"10.1109/ICICT50521.2020.00008","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00008","url":null,"abstract":"Estimating a partial score of item reordering tasks has long been neglected in language testing and education sciences. A psychologically valid means of scoring, MRS (Maximal Relative Sequence) was proposed by the author and transplanted to Excel. As the protocol simply picks up elements in relative ascending order, it made easier the non-specialists’ access to and analysis of the calculation process resulting in educational as well as practical significance. However, since the Excel enumeration replicated each step of MRS precisely, the number of columns consumed explodes as the number of elements increases. Moreover, MRS merely counts the number of elements to be relocated; it fails to consider the distance of relocation for recovery. This paper proposes an alternative solution LM (Linearity Matrix), also executable with Excel’s basic functions, with far fewer columns to consume. Further, LM is advantageous over MRS in that it is a general protocol of estimating relative similarity of two sequences of which Kendall’s tau is a special case; LM is adjustable as to the degree of adjacency constraint by changing the distance weight for all combinations of elements.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134238387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Second-Order Detection of Webcam Spyware 网络摄像头间谍软件的二阶检测
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00074
Haissam Badih, Benjamin Bond, J. Rrushi
Second-order detection of malware is frequently more effective than traditional malware detection in that it operates on the basis of a heavily influenced malware behavior. In this paper, we advance second-order detection of webcam spyware through an approach that aims at reaching their behavior at a greater than before depth. We propose decoy user space activity, along with a case study of it, namely a decoy security protocol, to involve malware in a series of interactions that lead them towards accessing a decoy I/O device, i.e. a decoy webcam in this case. In practical terms, decoy user space activity is delivered by a coherent ensemble of decoy I/O devices and decoy processes. This work makes decoy user space activity and decoy I/O indistinguishable from their real counterparts, and therefore increases uncertainty in malware operations on a compromised machine to benefit their detection.
恶意软件的二阶检测通常比传统的恶意软件检测更有效,因为它是在严重影响恶意软件行为的基础上运行的。在本文中,我们通过一种旨在以比以前更大的深度达到其行为的方法来推进网络摄像头间谍软件的二阶检测。我们提出诱饵用户空间活动,以及它的案例研究,即诱饵安全协议,涉及恶意软件在一系列交互,导致他们访问诱饵I/O设备,即诱饵网络摄像头在这种情况下。实际上,诱饵用户空间活动是由诱饵I/O设备和诱饵进程的一个连贯的集合提供的。这项工作使得诱饵用户空间活动和诱饵I/O与真正的对手无法区分,因此增加了受感染机器上恶意软件操作的不确定性,从而有利于它们的检测。
{"title":"On Second-Order Detection of Webcam Spyware","authors":"Haissam Badih, Benjamin Bond, J. Rrushi","doi":"10.1109/ICICT50521.2020.00074","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00074","url":null,"abstract":"Second-order detection of malware is frequently more effective than traditional malware detection in that it operates on the basis of a heavily influenced malware behavior. In this paper, we advance second-order detection of webcam spyware through an approach that aims at reaching their behavior at a greater than before depth. We propose decoy user space activity, along with a case study of it, namely a decoy security protocol, to involve malware in a series of interactions that lead them towards accessing a decoy I/O device, i.e. a decoy webcam in this case. In practical terms, decoy user space activity is delivered by a coherent ensemble of decoy I/O devices and decoy processes. This work makes decoy user space activity and decoy I/O indistinguishable from their real counterparts, and therefore increases uncertainty in malware operations on a compromised machine to benefit their detection.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133924173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 3rd International Conference on Information and Computer Technologies (ICICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1