首页 > 最新文献

2016 7th International Conference on Information and Communication Systems (ICICS)最新文献

英文 中文
Keynote speech 1: The transformed nature of viewership 主题演讲1:观众性质的转变
Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476062
J. Jansen, A. Rayes, E. Benkhelifa
There is a change happening with viewers. The nearly ubiquitous use of mobile devices combined with easy access to social media platforms is causing a unique social interaction with broadcast media and other events that alters the nature of being a viewer. Once a passive role, viewers are now participants around an event, engaging in information sharing, consumption, and dissemination in real time with an event. This technology affordance for online conversation about an event is referred to as the second screen phenomenon, although there may be multiple (i.e., more than two) screens involved. The resulting online conversation from second screen interaction about an event is referred to as the social soundtrack. The social soundtrack is an interesting conversational form of information sharing, information interaction, and information diffusion. This keynote will discuss the constructs and empirical measures of social soundtrack and second screen research, along with application of these constructs and measures in current investigations involving millions of posts on multiple social media platforms. Research concerning social soundtrack and second screen is important in identifying the influence and affordances that technology has on social media conversations from an information sharing. Empirical research results also provide insights on social communication in relationship to the cultural impact of broadcast events, the social interaction in cross technology usage for second screens, and the changing role of being a viewer.
观众正在发生变化。移动设备几乎无处不在的使用,加上易于访问的社交媒体平台,正在与广播媒体和其他事件产生独特的社交互动,这改变了观众的本质。观众曾经是一个被动的角色,现在是事件的参与者,与事件实时参与信息共享、消费和传播。这种关于事件的在线对话的技术支持被称为第二屏幕现象,尽管可能涉及多个(即两个以上)屏幕。由第二屏幕交互产生的关于事件的在线对话被称为社交配乐。社交配乐是一种有趣的信息共享、信息交互和信息扩散的对话形式。本次主题演讲将讨论社会背景和第二屏幕研究的结构和实证措施,以及这些结构和措施在当前涉及多个社交媒体平台上数百万帖子的调查中的应用。关于社交背景音乐和第二屏幕的研究对于从信息共享中识别技术对社交媒体对话的影响和启示非常重要。实证研究结果还提供了社会传播与广播事件文化影响的关系、跨技术使用第二屏幕的社会互动以及观众角色的变化等方面的见解。
{"title":"Keynote speech 1: The transformed nature of viewership","authors":"J. Jansen, A. Rayes, E. Benkhelifa","doi":"10.1109/IACS.2016.7476062","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476062","url":null,"abstract":"There is a change happening with viewers. The nearly ubiquitous use of mobile devices combined with easy access to social media platforms is causing a unique social interaction with broadcast media and other events that alters the nature of being a viewer. Once a passive role, viewers are now participants around an event, engaging in information sharing, consumption, and dissemination in real time with an event. This technology affordance for online conversation about an event is referred to as the second screen phenomenon, although there may be multiple (i.e., more than two) screens involved. The resulting online conversation from second screen interaction about an event is referred to as the social soundtrack. The social soundtrack is an interesting conversational form of information sharing, information interaction, and information diffusion. This keynote will discuss the constructs and empirical measures of social soundtrack and second screen research, along with application of these constructs and measures in current investigations involving millions of posts on multiple social media platforms. Research concerning social soundtrack and second screen is important in identifying the influence and affordances that technology has on social media conversations from an information sharing. Empirical research results also provide insights on social communication in relationship to the cultural impact of broadcast events, the social interaction in cross technology usage for second screens, and the changing role of being a viewer.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"189 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79498720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of intelligence of user-computer interface 人机界面智能化评价
Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476077
T. Ozkul
In a world where business and life revolves around internet and computers, the quality of user-computer interfaces became very important. Designs of user interface become the utmost important issue since users, -which also happen to be customers-judge quality of a product by the ease of use of the product. Selection of menu language, placement of icons, buttons all contribute to the ease and intuitive nature of the interface which eventually determine the success of the software. With all this importance riding on the user quality, there needs to be an objective way of measuring quality of user interface. In this study we have developed an automatic assessment mechanism which predicts the quality of user interface by simply observing the behavior of the user while doing transactions with the computer. The index generated through this process is a relative value which can be used for comparing quality of similar software interfaces.
在一个商业和生活都围绕着互联网和计算机的世界里,用户-计算机界面的质量变得非常重要。用户界面的设计成为最重要的问题,因为用户(也恰好是消费者)通过产品的易用性来判断产品的质量。菜单语言的选择,图标和按钮的放置都有助于界面的易用性和直观性,最终决定了软件的成功。鉴于用户质量的重要性,我们需要一种客观的方法来衡量用户界面的质量。在这项研究中,我们开发了一种自动评估机制,通过简单地观察用户在与计算机进行交易时的行为来预测用户界面的质量。通过此过程生成的指标是一个相对值,可用于比较同类软件界面的质量。
{"title":"Assessment of intelligence of user-computer interface","authors":"T. Ozkul","doi":"10.1109/IACS.2016.7476077","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476077","url":null,"abstract":"In a world where business and life revolves around internet and computers, the quality of user-computer interfaces became very important. Designs of user interface become the utmost important issue since users, -which also happen to be customers-judge quality of a product by the ease of use of the product. Selection of menu language, placement of icons, buttons all contribute to the ease and intuitive nature of the interface which eventually determine the success of the software. With all this importance riding on the user quality, there needs to be an objective way of measuring quality of user interface. In this study we have developed an automatic assessment mechanism which predicts the quality of user interface by simply observing the behavior of the user while doing transactions with the computer. The index generated through this process is a relative value which can be used for comparing quality of similar software interfaces.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"16 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82486580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sentiment classification techniques for Arabic language: A survey 阿拉伯语情感分类技术综述
Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476075
Mariam M. Biltawi, W. Etaiwi, Sara Tedmori, A. Hudaib, A. Awajan
With the advent of online data, sentiment analysis has received growing attention in recent years. Sentiment analysis aims to determine the overall sentiment orientation of a speaker or writer towards a specific entity or towards a specific feature of a specific entity. A fundamental task of sentiment analysis is sentiment classification, which aims to automatically classify opinionated text as being positive, negative, or neutral. Although the literature on sentiment classification is quite extensive, only a few endeavors to classify opinionated text written in the Arabic language can be found. This paper provides a comprehensive survey of existing lexicon, machine learning, and hybrid sentiment classification techniques for Arabic language.
随着在线数据的出现,情感分析近年来受到越来越多的关注。情感分析的目的是确定说话者或作者对特定实体或特定实体的特定特征的整体情感倾向。情感分析的一个基本任务是情感分类,其目的是自动将固执己见的文本分类为积极、消极或中立。虽然关于情感分类的文献相当广泛,但对阿拉伯语中固执己见的文本进行分类的努力却很少。本文对现有的阿拉伯语词汇、机器学习和混合情感分类技术进行了全面的综述。
{"title":"Sentiment classification techniques for Arabic language: A survey","authors":"Mariam M. Biltawi, W. Etaiwi, Sara Tedmori, A. Hudaib, A. Awajan","doi":"10.1109/IACS.2016.7476075","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476075","url":null,"abstract":"With the advent of online data, sentiment analysis has received growing attention in recent years. Sentiment analysis aims to determine the overall sentiment orientation of a speaker or writer towards a specific entity or towards a specific feature of a specific entity. A fundamental task of sentiment analysis is sentiment classification, which aims to automatically classify opinionated text as being positive, negative, or neutral. Although the literature on sentiment classification is quite extensive, only a few endeavors to classify opinionated text written in the Arabic language can be found. This paper provides a comprehensive survey of existing lexicon, machine learning, and hybrid sentiment classification techniques for Arabic language.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"78 1","pages":"339-346"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90499240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Known-plaintext attack and improvement of PRNG-based text encryption 已知明文攻击及基于prng的文本加密改进
Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476117
Ahmad Amro, E. M. El-Alfy
Cryptanalysis combines a set of techniques and heuristics to reveal existing security flaws in a certain cryptographic scheme, for the sake of improvement or sometimes violation. In this paper, we analyze a newly proposed text cryptosystem that uses three different schemes for a pseudorandom number generator (PRNG). We show that two of the suggested methods are not secure against known-plaintext attacks. Moreover, we propose an improved symmetric-stream encryption method based on PRNG. We implemented the proposed method in MATLAB and evaluated it for various types of attacks and different sensitivity tests. The improved method was designed to overcome the security issues in the other methods. Especially the resiliency to known-plaintext attack. Furthermore, the results of the sensitivity tests show excellent level of randomness ranging from 40% to 50%.
密码分析结合了一组技术和启发式方法来揭示某些加密方案中存在的安全缺陷,以改进或有时违反。本文分析了一种新提出的文本密码系统,该系统使用三种不同的伪随机数生成器(PRNG)方案。我们证明了两种建议的方法对于已知明文攻击是不安全的。此外,我们提出了一种改进的基于PRNG的对称流加密方法。我们在MATLAB中实现了所提出的方法,并对其进行了各种类型的攻击和不同的灵敏度测试。改进后的方法克服了其他方法存在的安全问题。特别是对已知明文攻击的弹性。此外,灵敏度测试的结果显示,在40%至50%的范围内,随机性水平很高。
{"title":"Known-plaintext attack and improvement of PRNG-based text encryption","authors":"Ahmad Amro, E. M. El-Alfy","doi":"10.1109/IACS.2016.7476117","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476117","url":null,"abstract":"Cryptanalysis combines a set of techniques and heuristics to reveal existing security flaws in a certain cryptographic scheme, for the sake of improvement or sometimes violation. In this paper, we analyze a newly proposed text cryptosystem that uses three different schemes for a pseudorandom number generator (PRNG). We show that two of the suggested methods are not secure against known-plaintext attacks. Moreover, we propose an improved symmetric-stream encryption method based on PRNG. We implemented the proposed method in MATLAB and evaluated it for various types of attacks and different sensitivity tests. The improved method was designed to overcome the security issues in the other methods. Especially the resiliency to known-plaintext attack. Furthermore, the results of the sensitivity tests show excellent level of randomness ranging from 40% to 50%.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"78 1","pages":"233-238"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88337748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hybrid-based Arabic single-document text summarization approach using genatic algorithm 基于遗传算法的混合阿拉伯语单文档文本摘要方法
Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476091
Yazan A. Jaradat, Ahmad T. Al-Taani
Text summarization is one of the most paramount applications of the field of natural language processing. This paper presents a Hybrid-based Single-document Extractive Arabic Text Summarization approach based on Genetic Algorithm. The proposed summarization approach was evaluated using EASC corpus, and ROUGE evaluation method to determine the accuracy of the proposed approach. The result showed that our method outperformed many state-of-the art methods.
文本摘要是自然语言处理领域最重要的应用之一。提出了一种基于遗传算法的混合单文档抽取阿拉伯语文本摘要方法。采用EASC语料库和ROUGE评价法对所提出的摘要方法进行评价,以确定所提出方法的准确性。结果表明,我们的方法优于许多最先进的方法。
{"title":"Hybrid-based Arabic single-document text summarization approach using genatic algorithm","authors":"Yazan A. Jaradat, Ahmad T. Al-Taani","doi":"10.1109/IACS.2016.7476091","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476091","url":null,"abstract":"Text summarization is one of the most paramount applications of the field of natural language processing. This paper presents a Hybrid-based Single-document Extractive Arabic Text Summarization approach based on Genetic Algorithm. The proposed summarization approach was evaluated using EASC corpus, and ROUGE evaluation method to determine the accuracy of the proposed approach. The result showed that our method outperformed many state-of-the art methods.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"25 1","pages":"85-91"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85951056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Protection oriented observability in multi-terminal HVDC systems 多端高压直流系统中面向保护的可观测性
Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476094
A. Hossam-eldin, A. Lotfy, Mohammed Elgamal, Mohammed Ebeed
Voltage source converter (VSC) based multi-terminal HVDC systems (MTHVDC) require rigid detection and fault clearing techniques capable of detecting commonly occurring faults. Furthermore, reduction of installation cost implies minimizing the expensive current and voltage sensors. In this paper, a new observability analysis algorithm is proposed to obtain the minimum number of sensors and their placement, required to control and protect MTHVDC grid. The proposed algorithm is incorporated with a developed wavelet - fuzzy logic based protection algorithm to identify fault types and location with minimum number of sensors. A new software tool-box is created and applied to test systems to verify the validity and importance of the proposed algorithm.
基于电压源变换器(VSC)的多终端高压直流系统(MTHVDC)需要严格的检测和故障清除技术,能够检测到常见的故障。此外,降低安装成本意味着尽量减少昂贵的电流和电压传感器。本文提出了一种新的可观测性分析算法,以获得控制和保护MTHVDC电网所需的最小传感器数量及其放置位置。该算法与基于小波模糊逻辑的保护算法相结合,以最小的传感器数量识别故障类型和位置。创建了一个新的软件工具箱,并将其应用于测试系统,以验证所提出算法的有效性和重要性。
{"title":"Protection oriented observability in multi-terminal HVDC systems","authors":"A. Hossam-eldin, A. Lotfy, Mohammed Elgamal, Mohammed Ebeed","doi":"10.1109/IACS.2016.7476094","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476094","url":null,"abstract":"Voltage source converter (VSC) based multi-terminal HVDC systems (MTHVDC) require rigid detection and fault clearing techniques capable of detecting commonly occurring faults. Furthermore, reduction of installation cost implies minimizing the expensive current and voltage sensors. In this paper, a new observability analysis algorithm is proposed to obtain the minimum number of sensors and their placement, required to control and protect MTHVDC grid. The proposed algorithm is incorporated with a developed wavelet - fuzzy logic based protection algorithm to identify fault types and location with minimum number of sensors. A new software tool-box is created and applied to test systems to verify the validity and importance of the proposed algorithm.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"309 1","pages":"102-108"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82884787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A linguistic method for Arabic normative provisions' annotation based on contextual exploration 基于语境探索的阿拉伯语规范性条款注释语言学方法
Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476076
Ines Berrazega, R. Faiz, Ghassan Mourad, A. Bouhafs
We present in this paper a linguistic method to automatically identify and semantically annotate the categories of normative provisions in Arabic legal texts. The proposed method is based on a contextual exploration of the discursive knowledge conveyed in the processed texts. Coupled to a taxonomy of Arabic normative provisions and a set of annotation rules, this method enables the semantic annotation of the normative provisions based on a surface analysis in order to extract a set of relevant linguistic markers having contextual dependencies. The performance of this method has been evaluated by developing a prototype to automatically identify the normative categories over a large set of Arabic normative texts collected from the Official Gazette of the Republic of Tunisia. Evaluation was conducted in terms of Precision, Recall and F-score. We obtained respectively 96,4%, 96,06% and 96,23% for Precision, Recall and F-score.
本文提出了一种自动识别和语义注释阿拉伯法律文本中规范性条款类别的语言方法。所提出的方法是基于对加工文本中所传达的语篇知识的语境探索。该方法与阿拉伯语规范条款的分类法和一组注释规则相结合,可以基于表面分析对规范条款进行语义注释,以便提取一组具有上下文依赖性的相关语言标记。通过开发一个原型来自动识别从突尼斯共和国官方公报收集的大量阿拉伯语规范性文本的规范类别,对该方法的性能进行了评估。从查准率、查全率和f分三个方面进行评价。Precision、Recall和F-score分别为96.4%、96.06%和96.23%。
{"title":"A linguistic method for Arabic normative provisions' annotation based on contextual exploration","authors":"Ines Berrazega, R. Faiz, Ghassan Mourad, A. Bouhafs","doi":"10.1109/IACS.2016.7476076","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476076","url":null,"abstract":"We present in this paper a linguistic method to automatically identify and semantically annotate the categories of normative provisions in Arabic legal texts. The proposed method is based on a contextual exploration of the discursive knowledge conveyed in the processed texts. Coupled to a taxonomy of Arabic normative provisions and a set of annotation rules, this method enables the semantic annotation of the normative provisions based on a surface analysis in order to extract a set of relevant linguistic markers having contextual dependencies. The performance of this method has been evaluated by developing a prototype to automatically identify the normative categories over a large set of Arabic normative texts collected from the Official Gazette of the Republic of Tunisia. Evaluation was conducted in terms of Precision, Recall and F-score. We obtained respectively 96,4%, 96,06% and 96,23% for Precision, Recall and F-score.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"4 1","pages":"347-352"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90635469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Anomaly detection using Wavelet-based estimation of LRD in packet and byte count of control traffic 基于小波估计控制流量数据包和字节数LRD的异常检测
Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476071
Khan Zeb, Basil AsSadhan, J. Al-Muhtadi, S. Alshebeili
The detection of anomalous behavior such as low volume attacks and abnormalities in today's large volume of Internet traffic has become a challenging problem in the network community. An efficient and real-time detection of anomaly traffic is crucial in order to rapidly diagnose and mitigate the anomaly, and to recover the resulting malfunction. In this paper, we present an efficient anomaly detection method based on the estimation of long-range dependence (LRD) behavior in packet and byte count of the aggregated control traffic. This method surrogates Internet aggregated whole traffic (i.e., control plus data) by the aggregated control traffic and detects anomaly traffic through the wavelet-based estimation of LRD behavior in the corresponding control traffic. Since Internet traffic exhibits LRD behavior during benign normal condition, deviation from this behavior can indicate an anomalous behavior. Experiments on the KSU dataset demonstrate that this method not only significantly improves the process of anomaly detection by considerably reducing the large-volume of traffic to be processed but also achieves a high detection effect. Because the control traffic constitute a small fraction of the whole traffic, and usually most of the attacks are manifested and carried out in the control traffic; therefore, surrogating the whole traffic by the control traffic increases the detection efficacy.
在互联网大流量的今天,如何检测小容量攻击和异常等异常行为已经成为网络界的一个难题。为了快速诊断和缓解异常,并恢复由此产生的故障,有效、实时地检测异常流量至关重要。本文提出了一种基于对聚合控制流量中数据包和字节数的远程依赖行为估计的有效异常检测方法。该方法将互联网聚合的整体流量(即控制加数据)替换为聚合的控制流量,并通过对相应控制流量中LRD行为的小波估计来检测异常流量。由于互联网流量在良性正常状态下表现出LRD行为,因此偏离这种行为可能表明存在异常行为。在KSU数据集上的实验表明,该方法不仅通过大幅减少需要处理的大量流量,显著改善了异常检测的过程,而且取得了较高的检测效果。由于控制流量只占整个流量的一小部分,通常大多数攻击都是在控制流量中表现和进行的;因此,用控制流量代替整个流量可以提高检测效率。
{"title":"Anomaly detection using Wavelet-based estimation of LRD in packet and byte count of control traffic","authors":"Khan Zeb, Basil AsSadhan, J. Al-Muhtadi, S. Alshebeili","doi":"10.1109/IACS.2016.7476071","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476071","url":null,"abstract":"The detection of anomalous behavior such as low volume attacks and abnormalities in today's large volume of Internet traffic has become a challenging problem in the network community. An efficient and real-time detection of anomaly traffic is crucial in order to rapidly diagnose and mitigate the anomaly, and to recover the resulting malfunction. In this paper, we present an efficient anomaly detection method based on the estimation of long-range dependence (LRD) behavior in packet and byte count of the aggregated control traffic. This method surrogates Internet aggregated whole traffic (i.e., control plus data) by the aggregated control traffic and detects anomaly traffic through the wavelet-based estimation of LRD behavior in the corresponding control traffic. Since Internet traffic exhibits LRD behavior during benign normal condition, deviation from this behavior can indicate an anomalous behavior. Experiments on the KSU dataset demonstrate that this method not only significantly improves the process of anomaly detection by considerably reducing the large-volume of traffic to be processed but also achieves a high detection effect. Because the control traffic constitute a small fraction of the whole traffic, and usually most of the attacks are manifested and carried out in the control traffic; therefore, surrogating the whole traffic by the control traffic increases the detection efficacy.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"19 1","pages":"316-321"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78079397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance of simplified Faster-than-Nyquist tranceiver 简化的比奈奎斯特更快的收发器性能
Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476106
Mohamed El-Barbary, F. Newagy, I. Hafez
As OFDM has become the basis of many of telecommunication standards due to its ease of implementation, stability and efficiency, Faster-than-Nyquist signaling became an interesting base for envisioned telecommunication breakthrough, since it is based on an already used and successfully implemented technology which is OFDM, and it inherently obtains the legacy system merits, at the expense of system complexity. In this article we introduce signaling over none orthogonal carriers with a controllable orthogonality factor that optimizes channel usage based on channel quality feedback, with agility to cope with varying channels with rate higher that OFDM can tolerate.
由于OFDM易于实现、稳定和高效,它已经成为许多电信标准的基础,比奈奎斯特更快的信令成为了一个有趣的基础,因为它基于一种已经使用并成功实现的技术,即OFDM,它固有地获得了遗留系统的优点,但代价是系统的复杂性。在本文中,我们介绍了一种基于信道质量反馈优化信道使用的可控正交系数的非正交载波信令,它能够灵活地应对速率高于OFDM所能容忍的不同信道。
{"title":"Performance of simplified Faster-than-Nyquist tranceiver","authors":"Mohamed El-Barbary, F. Newagy, I. Hafez","doi":"10.1109/IACS.2016.7476106","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476106","url":null,"abstract":"As OFDM has become the basis of many of telecommunication standards due to its ease of implementation, stability and efficiency, Faster-than-Nyquist signaling became an interesting base for envisioned telecommunication breakthrough, since it is based on an already used and successfully implemented technology which is OFDM, and it inherently obtains the legacy system merits, at the expense of system complexity. In this article we introduce signaling over none orthogonal carriers with a controllable orthogonality factor that optimizes channel usage based on channel quality feedback, with agility to cope with varying channels with rate higher that OFDM can tolerate.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"33 1","pages":"174-179"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88796004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of Linux SMTP server security aspects — A case study 评估Linux SMTP服务器安全方面-一个案例研究
Pub Date : 2016-04-05 DOI: 10.1109/IACS.2016.7476120
S. Khanji, Raja Jabir, Liza Ahmad, O. Alfandi, Huwida E. Said
Humans communication and interaction have dramatically changed in the last century with the introduction of advanced technologies. One important form of communication are electronic mails (email), as it is not only used for personal purposes but also used on a professional level. With the increase of electronic communication, spams have widely increased targeting individuals, having a doubtful intention such as stealing personal information to be misused or even to paralyze the Email system by injecting viruses. Therefore, to protect email users from spams and viruses, it is crucial to protect our SMTP server. In this paper, a case study is raised by configuring two SMTP servers and 6 different scenarios, for the purpose of evaluating and addressing email security issues. Various anti-spam and filtering techniques were highlighted and analyzed, along with reporting and visualizing functionalities to further assist system administrators to control and monitor SMTP server.
在上个世纪,随着先进技术的引入,人类的交流和互动发生了巨大的变化。电子邮件是一种重要的交流方式,因为它不仅用于个人目的,也用于专业水平。随着电子通信的增加,以个人为目标的垃圾邮件越来越多,这些垃圾邮件具有窃取个人信息并加以滥用,甚至注入病毒使电子邮件系统瘫痪等可疑意图。因此,为了保护电子邮件用户免受垃圾邮件和病毒的侵害,保护我们的SMTP服务器是至关重要的。在本文中,通过配置两个SMTP服务器和6种不同的场景,提出了一个案例研究,以评估和解决电子邮件安全问题。强调和分析了各种反垃圾邮件和过滤技术,以及报告和可视化功能,以进一步帮助系统管理员控制和监视SMTP服务器。
{"title":"Evaluation of Linux SMTP server security aspects — A case study","authors":"S. Khanji, Raja Jabir, Liza Ahmad, O. Alfandi, Huwida E. Said","doi":"10.1109/IACS.2016.7476120","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476120","url":null,"abstract":"Humans communication and interaction have dramatically changed in the last century with the introduction of advanced technologies. One important form of communication are electronic mails (email), as it is not only used for personal purposes but also used on a professional level. With the increase of electronic communication, spams have widely increased targeting individuals, having a doubtful intention such as stealing personal information to be misused or even to paralyze the Email system by injecting viruses. Therefore, to protect email users from spams and viruses, it is crucial to protect our SMTP server. In this paper, a case study is raised by configuring two SMTP servers and 6 different scenarios, for the purpose of evaluating and addressing email security issues. Various anti-spam and filtering techniques were highlighted and analyzed, along with reporting and visualizing functionalities to further assist system administrators to control and monitor SMTP server.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"252-257"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86943328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2016 7th International Conference on Information and Communication Systems (ICICS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1