首页 > 最新文献

Computer Standards & Interfaces最新文献

英文 中文
Grammar-obeying program synthesis: A novel approach using large language models and many-objective genetic programming 服从语法的程序合成:使用大型语言模型和多目标遗传编程的新方法
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-11-14 DOI: 10.1016/j.csi.2024.103938
Ning Tao , Anthony Ventresque , Vivek Nallur , Takfarinas Saber
Program synthesis is an important challenge that has attracted significant research interest, especially in recent years with advancements in Large Language Models (LLMs). Although LLMs have demonstrated success in program synthesis, there remains a lack of trust in the generated code due to documented risks (e.g., code with known and risky vulnerabilities). Therefore, it is important to restrict the search space and avoid bad programs. In this work, pre-defined restricted Backus–Naur Form (BNF) grammars are utilised, which are considered ‘safe’, and the focus is on identifying the most effective technique for grammar-obeying program synthesis, where the generated code must be correct and conform to the predefined grammar. It is shown that while LLMs perform well in generating correct programs, they often fail to produce code that adheres to the grammar. To address this, a novel Similarity-Based Many-Objective Grammar Guided Genetic Programming (SBMaOG3P) approach is proposed, leveraging the programs generated by LLMs in two ways: (i) as seeds following a grammar mapping process and (ii) as targets for similarity measure objectives. Experiments on a well-known and widely used program synthesis dataset indicate that the proposed approach successfully improves the rate of grammar-obeying program synthesis compared to various LLMs and the state-of-the-art Grammar-Guided Genetic Programming. Additionally, the proposed approach significantly improved the solution in terms of the best fitness value of each run for 21 out of 28 problems compared to G3P.
程序合成是一项重要的挑战,尤其是近年来随着大型语言模型(LLMs)的发展,它吸引了大量研究人员的关注。虽然 LLM 在程序合成方面取得了成功,但由于存在记录在案的风险(例如,代码存在已知的风险漏洞),人们对生成的代码仍然缺乏信任。因此,限制搜索空间和避免不良程序非常重要。在这项工作中,使用了被认为是 "安全 "的预定义限制性 Backus-Naur Form (BNF) 语法,重点是确定服从语法的程序合成的最有效技术,其中生成的代码必须正确并符合预定义语法。研究表明,虽然 LLM 在生成正确程序方面表现出色,但它们往往无法生成符合语法的代码。为了解决这个问题,我们提出了一种新颖的基于相似性的多目标语法引导遗传编程(SBMaOG3P)方法,以两种方式利用 LLM 生成的程序:(i) 作为语法映射过程后的种子;(ii) 作为相似性度量目标的目标。在一个著名的、广泛使用的程序合成数据集上进行的实验表明,与各种 LLM 和最先进的语法引导遗传编程相比,所提出的方法成功地提高了服从语法的程序合成率。此外,与 G3P 相比,在 28 个问题中的 21 个问题上,所提出的方法在每次运行的最佳适应度值方面显著改善了解决方案。
{"title":"Grammar-obeying program synthesis: A novel approach using large language models and many-objective genetic programming","authors":"Ning Tao ,&nbsp;Anthony Ventresque ,&nbsp;Vivek Nallur ,&nbsp;Takfarinas Saber","doi":"10.1016/j.csi.2024.103938","DOIUrl":"10.1016/j.csi.2024.103938","url":null,"abstract":"<div><div>Program synthesis is an important challenge that has attracted significant research interest, especially in recent years with advancements in Large Language Models (LLMs). Although LLMs have demonstrated success in program synthesis, there remains a lack of trust in the generated code due to documented risks (e.g., code with known and risky vulnerabilities). Therefore, it is important to restrict the search space and avoid bad programs. In this work, pre-defined restricted Backus–Naur Form (BNF) grammars are utilised, which are considered ‘safe’, and the focus is on identifying the most effective technique for <em>grammar-obeying program synthesis</em>, where the generated code must be correct and conform to the predefined grammar. It is shown that while LLMs perform well in generating correct programs, they often fail to produce code that adheres to the grammar. To address this, a novel Similarity-Based Many-Objective Grammar Guided Genetic Programming (SBMaOG3P) approach is proposed, leveraging the programs generated by LLMs in two ways: (i) as seeds following a grammar mapping process and (ii) as targets for similarity measure objectives. Experiments on a well-known and widely used program synthesis dataset indicate that the proposed approach successfully improves the rate of grammar-obeying program synthesis compared to various LLMs and the state-of-the-art Grammar-Guided Genetic Programming. Additionally, the proposed approach significantly improved the solution in terms of the best fitness value of each run for 21 out of 28 problems compared to G3P.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103938"},"PeriodicalIF":4.1,"publicationDate":"2024-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142663154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LAMB: An open-source software framework to create artificial intelligence assistants deployed and integrated into learning management systems 林:创建人工智能助手的开源软件框架,部署并集成到学习管理系统中
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-30 DOI: 10.1016/j.csi.2024.103940
Marc Alier , Juanan Pereira , Francisco José García-Peñalvo , Maria Jose Casañ , Jose Cabré
This paper presents LAMB (Learning Assistant Manager and Builder), an innovative open-source software framework designed to create AI-powered Learning Assistants tailored for integration into learning management systems. LAMB addresses critical gaps in existing educational AI solutions by providing a framework specifically designed for the unique requirements of the education sector. It introduces novel features, including a modular architecture for seamless integration of AI assistants into existing LMS platforms and an intuitive interface for educators to create custom AI assistants without coding skills. Unlike existing AI tools in education, LAMB provides a comprehensive framework that addresses privacy concerns, ensures alignment with institutional policies, and promotes using authoritative sources. LAMB leverages the capabilities of large language models and associated generative artificial intelligence technologies to create generative intelligent learning assistants that enhance educational experiences by providing personalized learning support based on clear directions and authoritative fonts of information. Key features of LAMB include its modular architecture, which supports prompt engineering, retrieval-augmented generation, and the creation of extensive knowledge bases from diverse educational content, including video sources. The development and deployment of LAMB were iteratively refined using a minimum viable product approach, exemplified by the learning assistant: “Macroeconomics Study Coach,” which effectively integrated lecture transcriptions and other course materials to support student inquiries. Initial validations in various educational settings demonstrate the potential that learning assistants created with LAMB have to enhance teaching methodologies, increase student engagement, and provide personalized learning experiences. The system's usability, scalability, security, and interoperability with existing LMS platforms make it a robust solution for integrating artificial intelligence into educational environments. LAMB's open-source nature encourages collaboration and innovation among educators, researchers, and developers, fostering a community dedicated to advancing the role of artificial intelligence in education. This paper outlines the system architecture, implementation details, use cases, and the significant benefits and challenges encountered, offering valuable insights for future developments in artificial intelligence assistants for any sector.
本文介绍了 LAMB(学习助手管理器和生成器),这是一个创新的开源软件框架,旨在创建人工智能驱动的学习助手,并将其集成到学习管理系统中。LAMB 针对教育领域的独特需求提供了一个专门设计的框架,填补了现有教育人工智能解决方案的重要空白。它引入了新颖的功能,包括将人工智能助手无缝集成到现有 LMS 平台的模块化架构,以及供教育工作者在无需编码技能的情况下创建自定义人工智能助手的直观界面。与教育领域现有的人工智能工具不同,LAMB 提供了一个全面的框架,可解决隐私问题,确保与机构政策保持一致,并提倡使用权威来源。LAMB 利用大型语言模型的能力和相关的生成式人工智能技术来创建生成式智能学习助手,根据明确的方向和权威的信息字体提供个性化的学习支持,从而增强教育体验。LAMB 的主要特点包括其模块化架构,该架构支持提示工程、检索增强生成以及从包括视频资源在内的各种教育内容中创建广泛的知识库。LAMB 的开发和部署采用了最小可行产品的方法,学习助手 "宏观经济学学习教练 "就是一个例子,它有效地整合了讲义转录和其他课程材料,以支持学生的查询。在各种教育环境中进行的初步验证表明,使用 LAMB 创建的学习助手在增强教学方法、提高学生参与度和提供个性化学习体验方面具有巨大潜力。该系统的可用性、可扩展性、安全性以及与现有 LMS 平台的互操作性使其成为将人工智能集成到教育环境中的强大解决方案。LAMB 的开源特性鼓励教育工作者、研究人员和开发人员之间的合作与创新,促进了一个致力于推进人工智能在教育中的作用的社区的发展。本文概述了系统架构、实施细节、用例以及所遇到的重大优势和挑战,为任何领域人工智能助手的未来发展提供了宝贵的见解。
{"title":"LAMB: An open-source software framework to create artificial intelligence assistants deployed and integrated into learning management systems","authors":"Marc Alier ,&nbsp;Juanan Pereira ,&nbsp;Francisco José García-Peñalvo ,&nbsp;Maria Jose Casañ ,&nbsp;Jose Cabré","doi":"10.1016/j.csi.2024.103940","DOIUrl":"10.1016/j.csi.2024.103940","url":null,"abstract":"<div><div>This paper presents LAMB (Learning Assistant Manager and Builder), an innovative open-source software framework designed to create AI-powered Learning Assistants tailored for integration into learning management systems. LAMB addresses critical gaps in existing educational AI solutions by providing a framework specifically designed for the unique requirements of the education sector. It introduces novel features, including a modular architecture for seamless integration of AI assistants into existing LMS platforms and an intuitive interface for educators to create custom AI assistants without coding skills. Unlike existing AI tools in education, LAMB provides a comprehensive framework that addresses privacy concerns, ensures alignment with institutional policies, and promotes using authoritative sources. LAMB leverages the capabilities of large language models and associated generative artificial intelligence technologies to create generative intelligent learning assistants that enhance educational experiences by providing personalized learning support based on clear directions and authoritative fonts of information. Key features of LAMB include its modular architecture, which supports prompt engineering, retrieval-augmented generation, and the creation of extensive knowledge bases from diverse educational content, including video sources. The development and deployment of LAMB were iteratively refined using a minimum viable product approach, exemplified by the learning assistant: “Macroeconomics Study Coach,” which effectively integrated lecture transcriptions and other course materials to support student inquiries. Initial validations in various educational settings demonstrate the potential that learning assistants created with LAMB have to enhance teaching methodologies, increase student engagement, and provide personalized learning experiences. The system's usability, scalability, security, and interoperability with existing LMS platforms make it a robust solution for integrating artificial intelligence into educational environments. LAMB's open-source nature encourages collaboration and innovation among educators, researchers, and developers, fostering a community dedicated to advancing the role of artificial intelligence in education. This paper outlines the system architecture, implementation details, use cases, and the significant benefits and challenges encountered, offering valuable insights for future developments in artificial intelligence assistants for any sector.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103940"},"PeriodicalIF":4.1,"publicationDate":"2024-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142663153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A lightweight finger multimodal recognition model based on detail optimization and perceptual compensation embedding 基于细节优化和感知补偿嵌入的轻量级手指多模态识别模型
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-23 DOI: 10.1016/j.csi.2024.103937
Zishuo Guo, Hui Ma, Ao Li
Multimodal biometric recognition technology has attracted the attention of many scholars due to its higher security and stability than single-modal recognition, but its additional parameter quantity and computational cost have brought challenges to the lightweight deployment of the model. In order to meet the needs of a wider range of application scenarios, this paper proposes a lightweight model DPNet using fingerprint and finger vein images for multimodal recognition, which adopts a double-branch lightweight feature extraction structure combining detail optimization and perception compensation. Among them, the detail extraction optimization branch uses multi-scale dimensionality reduction filtering to obtain low-redundant detail information, and combines the depth extension operation to enhance the generalization ability of detail features. The perception compensation branch expands and compensates the model's perceptual field of view through lightweight spatial location query and global information attention. In addition, this paper designs a perceptual feature embedding method to embed perceptual compensation information in the way of importance adjustment to improve the consistency of embedded features. The ABFM fusion module is proposed to carry out multi-level lightweight and deep interactive fusion of the extracted finger modal features from the global to the spatial region, so as to improve the degree and utilization rate of feature fusion. In this paper, the model recognition performance and lightweight advantages are verified on three multimodal datasets. Experimental results show that the proposed model achieves the most advanced lightweight effect and recognition performance in the experimental comparison of all datasets.
多模态生物识别技术因其比单模态识别更高的安全性和稳定性吸引了众多学者的关注,但其额外的参数量和计算成本给模型的轻量化部署带来了挑战。为了满足更广泛的应用场景需求,本文提出了一种利用指纹和指静脉图像进行多模态识别的轻量级模型 DPNet,该模型采用细节优化和感知补偿相结合的双分支轻量级特征提取结构。其中,细节提取优化分支利用多尺度降维滤波获取低冗余细节信息,并结合深度扩展操作增强细节特征的泛化能力。感知补偿分支通过轻量级空间位置查询和全局信息关注来扩展和补偿模型的感知视野。此外,本文还设计了一种感知特征嵌入方法,以重要性调整的方式嵌入感知补偿信息,提高嵌入特征的一致性。提出了 ABFM 融合模块,对提取的手指模态特征进行从全局到空间区域的多层次轻量级深度交互融合,提高了特征融合的程度和利用率。本文在三个多模态数据集上验证了模型的识别性能和轻量级优势。实验结果表明,在所有数据集的实验对比中,所提出的模型实现了最先进的轻量化效果和识别性能。
{"title":"A lightweight finger multimodal recognition model based on detail optimization and perceptual compensation embedding","authors":"Zishuo Guo,&nbsp;Hui Ma,&nbsp;Ao Li","doi":"10.1016/j.csi.2024.103937","DOIUrl":"10.1016/j.csi.2024.103937","url":null,"abstract":"<div><div>Multimodal biometric recognition technology has attracted the attention of many scholars due to its higher security and stability than single-modal recognition, but its additional parameter quantity and computational cost have brought challenges to the lightweight deployment of the model. In order to meet the needs of a wider range of application scenarios, this paper proposes a lightweight model DPNet using fingerprint and finger vein images for multimodal recognition, which adopts a double-branch lightweight feature extraction structure combining detail optimization and perception compensation. Among them, the detail extraction optimization branch uses multi-scale dimensionality reduction filtering to obtain low-redundant detail information, and combines the depth extension operation to enhance the generalization ability of detail features. The perception compensation branch expands and compensates the model's perceptual field of view through lightweight spatial location query and global information attention. In addition, this paper designs a perceptual feature embedding method to embed perceptual compensation information in the way of importance adjustment to improve the consistency of embedded features. The ABFM fusion module is proposed to carry out multi-level lightweight and deep interactive fusion of the extracted finger modal features from the global to the spatial region, so as to improve the degree and utilization rate of feature fusion. In this paper, the model recognition performance and lightweight advantages are verified on three multimodal datasets. Experimental results show that the proposed model achieves the most advanced lightweight effect and recognition performance in the experimental comparison of all datasets.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103937"},"PeriodicalIF":4.1,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142573008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing a behavioural cybersecurity strategy: A five-step approach for organisations 制定行为网络安全战略:组织的五步方法
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-22 DOI: 10.1016/j.csi.2024.103939
Tommy van Steen
With cybercriminals’ increased attention for human error as attack vector, organisations need to develop strategies to address behavioural risks if they want to keep their organisation secure. The traditional focus on awareness campaigns does not seem suitable for this goal and other avenues of applying the behavioural sciences to this field need to be explored. This paper outlines a five-step approach to developing a behavioural cybersecurity strategy to address this issue. The five steps consist of first deciding whether a solely technical solution is feasible before turning to nudging and affordances, cybersecurity training, and behavioural change campaigns for specific behaviours. The final step is to develop and implement a feedback loop that is used to assess the effectiveness of the strategy and inform organisations about next steps that can be taken. Beyond outlining the five-step approach, a research agenda is discussed aimed at strengthening each of the five steps and helping organisations in becoming more cybersecure by implementing a behavioural cybersecurity strategy.
随着网络犯罪分子越来越重视将人为错误作为攻击载体,企业要想确保自身安全,就需要制定战略来应对行为风险。传统的宣传活动似乎并不适合这一目标,因此需要探索将行为科学应用于这一领域的其他途径。本文概述了针对这一问题制定行为网络安全战略的五步方法。这五个步骤包括:首先决定单纯的技术解决方案是否可行,然后再转向引导和承受能力、网络安全培训以及针对特定行为的行为改变运动。最后一步是开发和实施反馈回路,用于评估战略的有效性,并告知组织可采取的下一步措施。除了概述五步方法外,还讨论了研究议程,旨在加强五个步骤中的每一步,帮助组织通过实施行为网络安全战略来提高网络安全。
{"title":"Developing a behavioural cybersecurity strategy: A five-step approach for organisations","authors":"Tommy van Steen","doi":"10.1016/j.csi.2024.103939","DOIUrl":"10.1016/j.csi.2024.103939","url":null,"abstract":"<div><div>With cybercriminals’ increased attention for human error as attack vector, organisations need to develop strategies to address behavioural risks if they want to keep their organisation secure. The traditional focus on awareness campaigns does not seem suitable for this goal and other avenues of applying the behavioural sciences to this field need to be explored. This paper outlines a five-step approach to developing a behavioural cybersecurity strategy to address this issue. The five steps consist of first deciding whether a solely technical solution is feasible before turning to nudging and affordances, cybersecurity training, and behavioural change campaigns for specific behaviours. The final step is to develop and implement a feedback loop that is used to assess the effectiveness of the strategy and inform organisations about next steps that can be taken. Beyond outlining the five-step approach, a research agenda is discussed aimed at strengthening each of the five steps and helping organisations in becoming more cybersecure by implementing a behavioural cybersecurity strategy.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103939"},"PeriodicalIF":4.1,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142593392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare 一种可追踪、可撤销的基于属性的分散式加密方案,具有完全隐藏的访问策略,适用于基于云的智能医疗保健系统
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-19 DOI: 10.1016/j.csi.2024.103936
Yue Dai , Lulu Xue , Bo Yang , Tao Wang , Kejia Zhang
Smart healthcare is an emerging technology for enabling interaction between patients and medical personnel, medical institutions, and medical devices utilizing advanced Internet of Things (IoT) technologies. It has attracted significant attention from researchers because of the convenience of storing and sharing electronic medical records (EMRs) in the cloud. Given that a patient’s EMR contains sensitive individual information, it must be encrypted before uploading it to the cloud. As a solution for data confidentiality and fine-grained access control, the Ciphertext Policy Attribute-Based Encryption (CP-ABE) technique is proposed, which helps manipulate private personal data without explicit authorization. However, most CP-ABE schemes use a centralized mechanism which may lead to performance bottlenecks and single-point-of-failure issues. They will also be at risk of key abuse and privacy breaches in smart healthcare applications. To this end, in this paper, we investigate a traceable and revocable decentralized attribute-based encryption scheme with a fully hidden access policy (TR-HP-DABE). Firstly, to overcome the issues of user privacy leakage and single-point-of-failure, a fully hidden access policy is established for multiple attribute authorities. Secondly, to prevent key abuse, the proposed TR-HP-DABE can achieve the tracking and revocation of malicious users by using Key Encryption Key (KEK) trees and updating the partial ciphertext. Furthermore, the online/offline encryption and verifiable outsourced decryption are applied to improve its efficiency in practical smart healthcare. According to our analysis, the security and traceability of TR-HP-DABE can be proved. Finally, the performance evaluation of TR-HP-DABE is more effective than some existing typical ones.
智能医疗是一项新兴技术,利用先进的物联网(IoT)技术实现患者与医务人员、医疗机构和医疗设备之间的互动。由于在云端存储和共享电子病历(EMR)的便利性,它引起了研究人员的极大关注。鉴于病人的电子病历包含敏感的个人信息,因此在上传到云端之前必须对其进行加密。作为数据保密性和细粒度访问控制的解决方案,提出了基于属性的密文策略加密(CP-ABE)技术,该技术有助于在没有明确授权的情况下操作个人隐私数据。然而,大多数 CP-ABE 方案都使用集中式机制,这可能会导致性能瓶颈和单点故障问题。在智能医疗应用中,这些方案还存在密钥滥用和隐私泄露的风险。为此,我们在本文中研究了一种具有完全隐藏访问策略(TR-HP-DABE)的可追踪、可撤销的基于属性的分散式加密方案。首先,为了克服用户隐私泄露和单点故障问题,我们为多个属性授权建立了完全隐藏的访问策略。其次,为防止密钥滥用,提出的TR-HP-DABE可通过密钥加密树(KEK)和更新部分密文实现对恶意用户的跟踪和撤销。此外,在线/离线加密和可验证外包解密的应用提高了其在实际智能医疗中的效率。根据我们的分析,可以证明 TR-HP-DABE 的安全性和可追溯性。最后,在性能评估方面,TR-HP-DABE 比现有的一些典型方案更加有效。
{"title":"A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare","authors":"Yue Dai ,&nbsp;Lulu Xue ,&nbsp;Bo Yang ,&nbsp;Tao Wang ,&nbsp;Kejia Zhang","doi":"10.1016/j.csi.2024.103936","DOIUrl":"10.1016/j.csi.2024.103936","url":null,"abstract":"<div><div>Smart healthcare is an emerging technology for enabling interaction between patients and medical personnel, medical institutions, and medical devices utilizing advanced Internet of Things (IoT) technologies. It has attracted significant attention from researchers because of the convenience of storing and sharing electronic medical records (EMRs) in the cloud. Given that a patient’s EMR contains sensitive individual information, it must be encrypted before uploading it to the cloud. As a solution for data confidentiality and fine-grained access control, the Ciphertext Policy Attribute-Based Encryption (CP-ABE) technique is proposed, which helps manipulate private personal data without explicit authorization. However, most CP-ABE schemes use a centralized mechanism which may lead to performance bottlenecks and single-point-of-failure issues. They will also be at risk of key abuse and privacy breaches in smart healthcare applications. To this end, in this paper, we investigate a traceable and revocable decentralized attribute-based encryption scheme with a fully hidden access policy (TR-HP-DABE). Firstly, to overcome the issues of user privacy leakage and single-point-of-failure, a fully hidden access policy is established for multiple attribute authorities. Secondly, to prevent key abuse, the proposed TR-HP-DABE can achieve the tracking and revocation of malicious users by using Key Encryption Key (KEK) trees and updating the partial ciphertext. Furthermore, the online/offline encryption and verifiable outsourced decryption are applied to improve its efficiency in practical smart healthcare. According to our analysis, the security and traceability of TR-HP-DABE can be proved. Finally, the performance evaluation of TR-HP-DABE is more effective than some existing typical ones.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103936"},"PeriodicalIF":4.1,"publicationDate":"2024-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142552134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks MARISMA:评估和管理信息网络安全风险的现代背景感知框架
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-10 DOI: 10.1016/j.csi.2024.103935
Luis E. Sánchez , Antonio Santos-Olmo , David G. Rosado , Carlos Blanco , Manuel A. Serrano , Haralambos Mouratidis , Eduardo Fernández-Medina
In a globalised world dependent on information technology, ensuring adequate protection of an organisation’s information assets has become a decisive factor for the longevity of the organisation’s operation. This is especially important when these organisations are critical infrastructures that provide essential services to nations and their citizens. However, to protect these assets, we must first be able to understand the risks to which they are subject and how to manage them properly. To understand and manage such the risks, we need first to acknowledge that organisations have changed, and they now have an increasing reliance on information assets, which in many cases are shared with other organisations. Such reliance and interconnectivity means that risks are constantly changing, they are dynamic, and potential mitigation does not just rely on the organisation’s own controls, but also on the controls put in place by the organisations with which it shares those assets. Taking the above requirements as essential, we have reviewed the state of the art, and we have concluded that current risk analysis and management systems are unable to meet all the needs inherent in this dynamic and evolving risk environment. This gap in the state of the art requires novel approaches that draw on the foundations of risk management, but they are adapted to the new challenges.
This article fulfils this gap in the literature with the introduction of MARISMA, a novel security risk analysis and management framework. MARISMA is oriented towards dynamic and adaptive risk management, considering external factors such as associative risks between organisations. MARISMA also contributes to the state of the art through newly developed mechanisms for knowledge reuse and dynamic learning. An important advantage of MARISMA is the connections between its elements that make it possible to reduce the subjectivity inherent in classical risk analysis systems, thereby generating suggestions that allow the translation of perceived security risks into real security risks. The framework comprises a reusable meta-pattern comprising different elements and their interdependencies, a supporting method that guides the entire process, and a cloud-based tool that automates data management and risk methods. MARISMA has been applied to many companies from different countries and sectors (government, maritime, energy, and pharmaceutical). In this paper, we demonstrate its applicability through its application to a real world case study involving a company in the technology sector.
在依赖信息技术的全球化世界中,确保对组织的信息资产提供充分保护已成为组织能否长久运营的决定性因素。当这些组织是为国家及其公民提供重要服务的关键基础设施时,这一点尤为重要。然而,要保护这些资产,我们必须首先了解它们所面临的风险以及如何妥善管理这些风险。要了解和管理这些风险,我们首先需要认识到组织已经发生了变化,它们现在越来越依赖于信息资产,而在许多情况下,信息资产是与其他组织共享的。这种依赖性和相互关联性意味着风险是不断变化的,是动态的,潜在的风险缓解不仅依赖于组织自身的控制,也依赖于与之共享这些资产的组织所实施的控制。以上述要求为基本条件,我们对最新技术进行了审查,得出的结论是,目前的风险分析和管理系统无法满足这种动态和不断变化的风险环境中固有的所有需求。本文介绍的 MARISMA 是一种新型安全风险分析和管理框架,弥补了文献中的这一空白。MARISMA 以动态和适应性风险管理为导向,考虑了组织间关联风险等外部因素。MARISMA 还通过新开发的知识再利用和动态学习机制,为技术发展做出了贡献。MARISMA 的一个重要优势在于其各要素之间的联系,这种联系可以减少传统风险分析系统固有的主观性,从而提出建议,将感知到的安全风险转化为真正的安全风险。该框架包括一个由不同要素及其相互依存关系组成的可重复使用的元模式、一个指导整个流程的辅助方法,以及一个可实现数据管理和风险方法自动化的云工具。MARISMA 已应用于不同国家和行业(政府、海事、能源和制药)的许多公司。在本文中,我们将通过一个涉及科技行业公司的真实案例研究来展示其适用性。
{"title":"MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks","authors":"Luis E. Sánchez ,&nbsp;Antonio Santos-Olmo ,&nbsp;David G. Rosado ,&nbsp;Carlos Blanco ,&nbsp;Manuel A. Serrano ,&nbsp;Haralambos Mouratidis ,&nbsp;Eduardo Fernández-Medina","doi":"10.1016/j.csi.2024.103935","DOIUrl":"10.1016/j.csi.2024.103935","url":null,"abstract":"<div><div>In a globalised world dependent on information technology, ensuring adequate protection of an organisation’s information assets has become a decisive factor for the longevity of the organisation’s operation. This is especially important when these organisations are critical infrastructures that provide essential services to nations and their citizens. However, to protect these assets, we must first be able to understand the risks to which they are subject and how to manage them properly. To understand and manage such the risks, we need first to acknowledge that organisations have changed, and they now have an increasing reliance on information assets, which in many cases are shared with other organisations. Such reliance and interconnectivity means that risks are constantly changing, they are dynamic, and potential mitigation does not just rely on the organisation’s own controls, but also on the controls put in place by the organisations with which it shares those assets. Taking the above requirements as essential, we have reviewed the state of the art, and we have concluded that current risk analysis and management systems are unable to meet all the needs inherent in this dynamic and evolving risk environment. This gap in the state of the art requires novel approaches that draw on the foundations of risk management, but they are adapted to the new challenges.</div><div>This article fulfils this gap in the literature with the introduction of MARISMA, a novel security risk analysis and management framework. MARISMA is oriented towards dynamic and adaptive risk management, considering external factors such as associative risks between organisations. MARISMA also contributes to the state of the art through newly developed mechanisms for knowledge reuse and dynamic learning. An important advantage of MARISMA is the connections between its elements that make it possible to reduce the subjectivity inherent in classical risk analysis systems, thereby generating suggestions that allow the translation of perceived security risks into real security risks. The framework comprises a reusable meta-pattern comprising different elements and their interdependencies, a supporting method that guides the entire process, and a cloud-based tool that automates data management and risk methods. MARISMA has been applied to many companies from different countries and sectors (government, maritime, energy, and pharmaceutical). In this paper, we demonstrate its applicability through its application to a real world case study involving a company in the technology sector.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103935"},"PeriodicalIF":4.1,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142446082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing usability/user experience heuristics to evaluate e-assessments administered to children 设计可用性/用户体验启发式方法,评估面向儿童的电子评估
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-09 DOI: 10.1016/j.csi.2024.103933
Florence Lehnert , Sophie Doublet , Gavin Sim
The application of electronic assessments (e-assessments) has increased, particularly among elementary-school-aged children. Paper-based assessments are frequently converted into digital formats for efficiency gains, with little thought given to their user experience (UX) and usability. Individual differences, particularly among young children, can inhibit test-takers from completing the assessment tasks that are not designed to match their needs and abilities. Consequently, studies have raised concerns about the generalizability and fairness of e-assessments. Whereas heuristic evaluation is a standard method for evaluating and enhancing the efficacy of a product with respect to a set of guidelines, more information is needed about its added value when designing e-assessments for children. This paper synthesizes heuristics on the basis of the literature and expert judgments to accommodate children's abilities for interacting with e-assessment platforms. We present a final set of 10 heuristics, validated and refined by applying a heuristic evaluation workshop and collecting 24 expert surveys. The results indicate that the derived heuristics can help evaluate the UX and usability-related aspects of e-assessments with 6- to 12-year-old children. Moreover, the present paper proposes recommendations for a framework for developing usability/UX heuristics that can be used to help researchers develop domain-specific heuristics in the future.
电子评估(e-assessments)的应用越来越多,尤其是在小学学龄儿童中。为了提高效率,纸质测评经常被转换成数字格式,却很少考虑其用户体验(UX)和可用性。个体差异,尤其是幼儿的个体差异,会阻碍应试者完成评估任务,因为评估任务的设计并不符合他们的需求和能力。因此,一些研究对电子评估的通用性和公平性提出了担忧。启发式评估是一种标准方法,用于评估和提高产品在一系列指导方针方面的功效,但在设计儿童电子评估时,还需要更多关于其附加值的信息。本文在文献和专家判断的基础上综合了启发式方法,以适应儿童与电子评估平台互动的能力。通过启发式评估研讨会和收集 24 份专家调查,我们最终提出了 10 套启发式方法,并对其进行了验证和完善。结果表明,所得出的启发式方法有助于评估 6 至 12 岁儿童电子测评的用户体验和可用性相关方面。此外,本文还就可用性/用户体验启发式方法的开发框架提出了建议,可用于帮助研究人员在未来开发特定领域的启发式方法。
{"title":"Designing usability/user experience heuristics to evaluate e-assessments administered to children","authors":"Florence Lehnert ,&nbsp;Sophie Doublet ,&nbsp;Gavin Sim","doi":"10.1016/j.csi.2024.103933","DOIUrl":"10.1016/j.csi.2024.103933","url":null,"abstract":"<div><div>The application of electronic assessments (e-assessments) has increased, particularly among elementary-school-aged children. Paper-based assessments are frequently converted into digital formats for efficiency gains, with little thought given to their user experience (UX) and usability. Individual differences, particularly among young children, can inhibit test-takers from completing the assessment tasks that are not designed to match their needs and abilities. Consequently, studies have raised concerns about the generalizability and fairness of e-assessments. Whereas heuristic evaluation is a standard method for evaluating and enhancing the efficacy of a product with respect to a set of guidelines, more information is needed about its added value when designing e-assessments for children. This paper synthesizes heuristics on the basis of the literature and expert judgments to accommodate children's abilities for interacting with e-assessment platforms. We present a final set of 10 heuristics, validated and refined by applying a heuristic evaluation workshop and collecting 24 expert surveys. The results indicate that the derived heuristics can help evaluate the UX and usability-related aspects of e-assessments with 6- to 12-year-old children. Moreover, the present paper proposes recommendations for a framework for developing usability/UX heuristics that can be used to help researchers develop domain-specific heuristics in the future.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103933"},"PeriodicalIF":4.1,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142532400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of multiple-input multiple-output orthogonal frequency division multiplexing system using arithmetic optimization algorithm 使用算术优化算法对多输入多输出正交频分复用系统进行性能分析
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-06 DOI: 10.1016/j.csi.2024.103934
Deepa R , Karthick R , Jayaraj Velusamy , Senthilkumar R
This research aims to optimize the interference mitigation and improve system performance metrics, such as bit error rates, inter-carrier interference (ICI), and inter-symbol interference (ISI), by integrating the Redundant Discrete Wavelet Transform (RDWT) with the Arithmetic Optimization Algorithm (AOA). This will increase the spectral efficiency of MIMOOFDM systems for ultra-high data rate (UHDR) transmission in 5 G networks. The most important contribution of this study is the innovative combination of RDWT and AOA, which effectively addresses the down sampling issues in DWT-OFDM systems and significantly improves both error rates and data rates in high-speed wireless communication. Fifth-generation wireless networks require transmission at ultra-high data rates, which necessitates reducing ISI and ICI. Multiple-input multiple-output orthogonal frequency division multiplexing (MIMOOFDM) is employed to achieve the UHDR. The bandwidth and orthogonality of DWT-OFDM (discrete wavelet transform-based OFDM) are increased; however system performance is degraded due to down sampling. The redundant discrete wavelet transform (RDWT) is proposed for eliminating down sampling complexities. Simulation results demonstrate that RDWT effectively lowers bit error rates, ICI, and ISI by increasing the carrier-to-interference power ratio (CIR). The Arithmetic Optimization Algorithm is used to optimize ICI cancellation weights, further enhancing spectrum efficiency. The proposed method is executed in MATLAB and achieves notable performance gains: up to 82.95 % lower error rates and 39.88 % higher data rates compared to the existing methods.

Conclusion

The integration of RDWT with AOA represents a significant advancement in enhancing the spectral efficiency of MIMOOFDM systems for UHDR transmission in 5 G networks. The proposed method not only enhances system performance but also lays a foundation for future developments in high-speed wireless communication by addressing down sampling issues and optimizing interference mitigation.
本研究旨在通过将冗余离散小波变换(RDWT)与算术优化算法(AOA)相结合,优化干扰缓解并改善系统性能指标,如误码率、载波间干扰(ICI)和符号间干扰(ISI)。这将提高 MIMOOFDM 系统在 5 G 网络中进行超高数据速率(UHDR)传输时的频谱效率。这项研究最重要的贡献是创新性地将 RDWT 和 AOA 结合起来,有效解决了 DWT-OFDM 系统中的向下采样问题,显著提高了高速无线通信中的误码率和数据速率。第五代无线网络要求以超高数据速率传输,这就必须降低 ISI 和 ICI。多输入多输出正交频分复用技术(MIMOOFDM)可用于实现超高速数据传输。DWT-OFDM (基于离散小波变换的 OFDM)的带宽和正交性得到了提高,但由于向下采样,系统性能有所下降。为消除向下采样的复杂性,提出了冗余离散小波变换(RDWT)。仿真结果表明,RDWT 通过提高载波与干扰功率比 (CIR) 有效降低了误码率、ICI 和 ISI。算术优化算法用于优化 ICI 消除权重,进一步提高频谱效率。建议的方法在 MATLAB 中执行,取得了显著的性能提升:与现有方法相比,错误率降低了 82.95%,数据传输率提高了 39.88%。所提出的方法不仅提高了系统性能,而且通过解决向下采样问题和优化干扰缓解,为高速无线通信的未来发展奠定了基础。
{"title":"Performance analysis of multiple-input multiple-output orthogonal frequency division multiplexing system using arithmetic optimization algorithm","authors":"Deepa R ,&nbsp;Karthick R ,&nbsp;Jayaraj Velusamy ,&nbsp;Senthilkumar R","doi":"10.1016/j.csi.2024.103934","DOIUrl":"10.1016/j.csi.2024.103934","url":null,"abstract":"<div><div>This research aims to optimize the interference mitigation and improve system performance metrics, such as bit error rates, inter-carrier interference (ICI), and inter-symbol interference (ISI), by integrating the Redundant Discrete Wavelet Transform (RDWT) with the Arithmetic Optimization Algorithm (AOA). This will increase the spectral efficiency of MIMO<img>OFDM systems for ultra-high data rate (UHDR) transmission in 5 G networks. The most important contribution of this study is the innovative combination of RDWT and AOA, which effectively addresses the down sampling issues in DWT-OFDM systems and significantly improves both error rates and data rates in high-speed wireless communication. Fifth-generation wireless networks require transmission at ultra-high data rates, which necessitates reducing ISI and ICI. Multiple-input multiple-output orthogonal frequency division multiplexing (MIMO<img>OFDM) is employed to achieve the UHDR. The bandwidth and orthogonality of DWT-OFDM (discrete wavelet transform-based OFDM) are increased; however system performance is degraded due to down sampling. The redundant discrete wavelet transform (RDWT) is proposed for eliminating down sampling complexities. Simulation results demonstrate that RDWT effectively lowers bit error rates, ICI, and ISI by increasing the carrier-to-interference power ratio (CIR). The Arithmetic Optimization Algorithm is used to optimize ICI cancellation weights, further enhancing spectrum efficiency. The proposed method is executed in MATLAB and achieves notable performance gains: up to 82.95 % lower error rates and 39.88 % higher data rates compared to the existing methods.</div></div><div><h3>Conclusion</h3><div>The integration of RDWT with AOA represents a significant advancement in enhancing the spectral efficiency of MIMO<img>OFDM systems for UHDR transmission in 5 G networks. The proposed method not only enhances system performance but also lays a foundation for future developments in high-speed wireless communication by addressing down sampling issues and optimizing interference mitigation.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103934"},"PeriodicalIF":4.1,"publicationDate":"2024-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142442192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel secure privacy-preserving data sharing model with deep-based key generation on the blockchain network in the cloud 云中区块链网络上基于深度密钥生成的新型安全隐私保护数据共享模型
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-29 DOI: 10.1016/j.csi.2024.103932
Samuel B , Kasturi K
Cloud computing is currently emerging as a developing technology in which a Cloud Service Provider (CSP) is a third-party organization that provides effective storage of data and facilities to a large client base. Saving information in a cloud offers users the satisfaction of accessing it without the need for direct knowledge of the distribution and management of an infrastructure. The primary objective is to develop a novel, secure, and privacy-preserving data-sharing model that utilizes deep-based key generation on blockchain in the cloud. Data communication is done using multiple entities. The research aims to develop a collaborative data-sharing method in the cloud for the authentication scheme for cloud security on blockchain and smart contracts. Initialization, registration, key generation, authentication of data sharing, and validation are carried out here. The proposed data-sharing model involves a revenue distribution model that depends on Multiple Services (MS) models to improve multiple cloud services. The security parameters namely passwords, hashing functions, key interpolation, and encryption are used for preserving the Data privacy and here the SpinalNet is used for generating keys. Furthermore, the devised SpinalNet_Genkey obtained a value of 45.001 MB, 0.002, and 0.003 sec for memory usage, revenue, and computation cost.
云计算是目前新兴的发展中技术,其中云服务提供商(CSP)是一个第三方组织,为庞大的客户群提供有效的数据存储和设施。将信息保存在云中,用户无需直接了解基础设施的分布和管理情况,就可以访问这些信息。主要目标是开发一种新颖、安全和保护隐私的数据共享模型,该模型利用云中区块链上的深度密钥生成。数据通信是通过多个实体完成的。该研究旨在开发一种云端协作数据共享方法,用于区块链和智能合约上的云安全认证方案。这里进行了初始化、注册、密钥生成、数据共享认证和验证。所提出的数据共享模型涉及一种收益分配模型,该模型依赖于多重服务(MS)模型,以改善多种云服务。密码、散列函数、密钥插值和加密等安全参数用于保护数据隐私,SpinalNet 用于生成密钥。此外,设计的 SpinalNet_Genkey 在内存使用量、收入和计算成本方面的值分别为 45.001 MB、0.002 和 0.003 秒。
{"title":"A novel secure privacy-preserving data sharing model with deep-based key generation on the blockchain network in the cloud","authors":"Samuel B ,&nbsp;Kasturi K","doi":"10.1016/j.csi.2024.103932","DOIUrl":"10.1016/j.csi.2024.103932","url":null,"abstract":"<div><div>Cloud computing is currently emerging as a developing technology in which a Cloud Service Provider (CSP) is a third-party organization that provides effective storage of data and facilities to a large client base. Saving information in a cloud offers users the satisfaction of accessing it without the need for direct knowledge of the distribution and management of an infrastructure. The primary objective is to develop a novel, secure, and privacy-preserving data-sharing model that utilizes deep-based key generation on blockchain in the cloud. Data communication is done using multiple entities. The research aims to develop a collaborative data-sharing method in the cloud for the authentication scheme for cloud security on blockchain and smart contracts. Initialization, registration, key generation, authentication of data sharing, and validation are carried out here. The proposed data-sharing model involves a revenue distribution model that depends on Multiple Services (MS) models to improve multiple cloud services. The security parameters namely passwords, hashing functions, key interpolation, and encryption are used for preserving the Data privacy and here the SpinalNet is used for generating keys. Furthermore, the devised SpinalNet_Genkey obtained a value of 45.001 MB, 0.002, and 0.003 sec for memory usage, revenue, and computation cost.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103932"},"PeriodicalIF":4.1,"publicationDate":"2024-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142422181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrating deep learning and data fusion for advanced keystroke dynamics authentication 整合深度学习和数据融合,实现高级按键动态身份验证
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-28 DOI: 10.1016/j.csi.2024.103931
Arnoldas Budžys, Olga Kurasova, Viktor Medvedev
By enhancing user authentication protocols, especially in critical infrastructures vulnerable to complex cyberthreats, we present an advanced approach that integrates a deep learning-based model and data fusion techniques applied to analyze keystroke dynamics. With the growing need for robust security measures, especially in critical infrastructure environments, traditional authentication mechanisms often fail to cope with advanced threats. Our approach focuses on the unique behavioral biometric characteristics of keystrokes, which offers promising opportunities to improve user authentication processes. We have developed a data fusion-based methodology that utilizes the unique features of keystroke dynamics combined with deep learning techniques to improve user authentication systems. Using the capabilities of data fusion and deep learning, the proposed methodology not only captures the complex behavioral biometrics inherent in keystroke dynamics but also addresses the challenges posed by varying password lengths and typing styles. We conducted extensive experiments on several fixed-text datasets, including the Carnegie Mellon University dataset, the KeyRecs dataset, and the GREYC-NISLAB dataset, with a total of approximately 54,000 password records. Comprehensive experiments on various datasets with different password lengths have shown that our approach is scalable and accurate for user authentication, which significantly improves the security of critical infrastructure. By using interpolation-based data fusion techniques to standardize the keystroke data to a uniform length and employing a Siamese neural network with a triplet loss function, the best equal error rate of 0.13281 was achieved for the unseen fused data. The integration of deep learning and data fusion effectively generalizes to different user profiles, demonstrating its adaptability and accuracy in authenticating users in different scenarios. The findings are crucial for improving security in sensitive applications, ranging from accessing personal devices to protecting critical infrastructure.
通过加强用户身份验证协议,特别是在易受复杂网络威胁的关键基础设施中,我们提出了一种先进的方法,它集成了基于深度学习的模型和数据融合技术,应用于分析按键动态。随着对强大安全措施的需求日益增长,尤其是在关键基础设施环境中,传统的身份验证机制往往无法应对高级威胁。我们的方法侧重于按键的独特行为生物特征,这为改进用户身份验证流程提供了大有可为的机会。我们开发了一种基于数据融合的方法,利用击键动态的独特特征与深度学习技术相结合来改进用户身份验证系统。利用数据融合和深度学习的能力,所提出的方法不仅能捕捉到按键动态中固有的复杂行为生物识别特征,还能解决因密码长度和打字风格不同而带来的挑战。我们在多个固定文本数据集上进行了广泛的实验,包括卡内基梅隆大学数据集、KeyRecs 数据集和 GREYC-NISLAB 数据集,共计约 54,000 条密码记录。在具有不同密码长度的各种数据集上进行的综合实验表明,我们的方法在用户身份验证方面具有可扩展性和准确性,可显著提高关键基础设施的安全性。通过使用基于插值的数据融合技术将按键数据标准化为统一长度,并采用具有三重损失函数的连体神经网络,未见过的融合数据取得了 0.13281 的最佳相等错误率。深度学习与数据融合的整合能有效地泛化到不同的用户配置文件中,证明了它在不同场景中验证用户身份的适应性和准确性。这些发现对于提高从访问个人设备到保护关键基础设施等敏感应用的安全性至关重要。
{"title":"Integrating deep learning and data fusion for advanced keystroke dynamics authentication","authors":"Arnoldas Budžys,&nbsp;Olga Kurasova,&nbsp;Viktor Medvedev","doi":"10.1016/j.csi.2024.103931","DOIUrl":"10.1016/j.csi.2024.103931","url":null,"abstract":"<div><div>By enhancing user authentication protocols, especially in critical infrastructures vulnerable to complex cyberthreats, we present an advanced approach that integrates a deep learning-based model and data fusion techniques applied to analyze keystroke dynamics. With the growing need for robust security measures, especially in critical infrastructure environments, traditional authentication mechanisms often fail to cope with advanced threats. Our approach focuses on the unique behavioral biometric characteristics of keystrokes, which offers promising opportunities to improve user authentication processes. We have developed a data fusion-based methodology that utilizes the unique features of keystroke dynamics combined with deep learning techniques to improve user authentication systems. Using the capabilities of data fusion and deep learning, the proposed methodology not only captures the complex behavioral biometrics inherent in keystroke dynamics but also addresses the challenges posed by varying password lengths and typing styles. We conducted extensive experiments on several fixed-text datasets, including the Carnegie Mellon University dataset, the KeyRecs dataset, and the GREYC-NISLAB dataset, with a total of approximately 54,000 password records. Comprehensive experiments on various datasets with different password lengths have shown that our approach is scalable and accurate for user authentication, which significantly improves the security of critical infrastructure. By using interpolation-based data fusion techniques to standardize the keystroke data to a uniform length and employing a Siamese neural network with a triplet loss function, the best equal error rate of 0.13281 was achieved for the unseen fused data. The integration of deep learning and data fusion effectively generalizes to different user profiles, demonstrating its adaptability and accuracy in authenticating users in different scenarios. The findings are crucial for improving security in sensitive applications, ranging from accessing personal devices to protecting critical infrastructure.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103931"},"PeriodicalIF":4.1,"publicationDate":"2024-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142358060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Standards & Interfaces
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1