首页 > 最新文献

2019 5th International Conference on Web Research (ICWR)最新文献

英文 中文
An Adaptive Machine Learning Based Approach for Phishing Detection Using Hybrid Features 基于自适应机器学习的混合特征网络钓鱼检测方法
Pub Date : 2019-04-24 DOI: 10.1109/ICWR.2019.8765265
Mohammad Mehdi Yadollahi, Farzaneh Shoeleh, Elham Serkani, Afsaneh Madani, Hossein Gharaee
Nowadays, phishing is one of the most usual web threats with regards to the significant growth of the World Wide Web in volume over time. Phishing attackers always use new (zero-day) and sophisticated techniques to deceive online customers. Hence, it is necessary that the anti-phishing system be real-time and fast and also leverages from an intelligent phishing detection solution. Here, we develop a reliable detection system which can adaptively match the changing environment and phishing websites. Our method is an online and feature-rich machine learning technique to discriminate the phishing and legitimate websites. Since the proposed approach extracts different types of discriminative features from URLs and webpages source code, it is an entirely client-side solution and does not require any service from the third-party. The experimental results highlight the robustness and competitiveness of our anti-phishing system to distinguish the phishing and legitimate websites.
如今,随着万维网数量的显著增长,网络钓鱼是最常见的网络威胁之一。网络钓鱼攻击者总是使用新的(零日)和复杂的技术来欺骗在线客户。因此,反网络钓鱼系统必须是实时和快速的,并且还必须利用智能网络钓鱼检测解决方案。在此,我们开发了一个可靠的检测系统,可以自适应适应不断变化的环境和钓鱼网站。我们的方法是一种在线和功能丰富的机器学习技术来区分网络钓鱼和合法网站。由于所提出的方法从url和网页源代码中提取不同类型的区别特征,因此它完全是客户端解决方案,不需要第三方提供任何服务。实验结果表明,该反钓鱼系统具有很强的鲁棒性和竞争力,能够有效区分钓鱼网站和合法网站。
{"title":"An Adaptive Machine Learning Based Approach for Phishing Detection Using Hybrid Features","authors":"Mohammad Mehdi Yadollahi, Farzaneh Shoeleh, Elham Serkani, Afsaneh Madani, Hossein Gharaee","doi":"10.1109/ICWR.2019.8765265","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765265","url":null,"abstract":"Nowadays, phishing is one of the most usual web threats with regards to the significant growth of the World Wide Web in volume over time. Phishing attackers always use new (zero-day) and sophisticated techniques to deceive online customers. Hence, it is necessary that the anti-phishing system be real-time and fast and also leverages from an intelligent phishing detection solution. Here, we develop a reliable detection system which can adaptively match the changing environment and phishing websites. Our method is an online and feature-rich machine learning technique to discriminate the phishing and legitimate websites. Since the proposed approach extracts different types of discriminative features from URLs and webpages source code, it is an entirely client-side solution and does not require any service from the third-party. The experimental results highlight the robustness and competitiveness of our anti-phishing system to distinguish the phishing and legitimate websites.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"6 1","pages":"281-286"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75685685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Using Web Mining in the Analysis of Housing Prices: A Case study of Tehran 网络挖掘在房价分析中的应用——以德黑兰为例
Pub Date : 2019-04-24 DOI: 10.1109/ICWR.2019.8765250
R. Annamoradnejad, Issa Annamoradnejad, T. Safarrad, J. Habibi
There have been many previous works to determine the determinants of housing prices. All of these works relied on a relatively small set of data, mostly collected with the help of real estate agencies. In this work, we used web mining methods to generate a big, organized dataset from a popular national brokerage website. The dataset contains structural characteristics of more than 139,000 apartments, alongside their location and price. We provided our full dataset for the article, so that other researchers can reproduce our results or conduct further analyses. Using this dataset, we analyzed housing prices of Tehran in order to identify its major determinants. To this aim, we examine the dynamics of housing prices at the district levels of Tehran using Hedonic Price model. Our results highlight a number of points, including: Base area of an apartment is positively correlated with price per square meter (r=0.89), showing a two-folded impact on the overall price. Air quality is in a positive, and floor level is in negative correlation with housing prices.
以前有很多研究确定房价的决定因素。所有这些工作都依赖于相对较小的一组数据,这些数据主要是在房地产中介的帮助下收集的。在这项工作中,我们使用web挖掘方法从一个流行的全国性经纪网站生成一个大的、有组织的数据集。该数据集包含超过13.9万套公寓的结构特征,以及它们的位置和价格。我们为这篇文章提供了完整的数据集,以便其他研究人员可以复制我们的结果或进行进一步的分析。使用这个数据集,我们分析了德黑兰的房价,以确定其主要决定因素。为此,我们使用享乐价格模型研究了德黑兰地区房价的动态。我们的结果突出了一些要点,包括:公寓的基础面积与每平方米的价格呈正相关(r=0.89),显示出对整体价格的双重影响。空气质量与房价呈正相关,楼面与房价呈负相关。
{"title":"Using Web Mining in the Analysis of Housing Prices: A Case study of Tehran","authors":"R. Annamoradnejad, Issa Annamoradnejad, T. Safarrad, J. Habibi","doi":"10.1109/ICWR.2019.8765250","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765250","url":null,"abstract":"There have been many previous works to determine the determinants of housing prices. All of these works relied on a relatively small set of data, mostly collected with the help of real estate agencies. In this work, we used web mining methods to generate a big, organized dataset from a popular national brokerage website. The dataset contains structural characteristics of more than 139,000 apartments, alongside their location and price. We provided our full dataset for the article, so that other researchers can reproduce our results or conduct further analyses. Using this dataset, we analyzed housing prices of Tehran in order to identify its major determinants. To this aim, we examine the dynamics of housing prices at the district levels of Tehran using Hedonic Price model. Our results highlight a number of points, including: Base area of an apartment is positively correlated with price per square meter (r=0.89), showing a two-folded impact on the overall price. Air quality is in a positive, and floor level is in negative correlation with housing prices.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"14 1","pages":"55-60"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75460037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Web Covert Timing Channels Detection based on Entropy 基于熵的Web隐蔽时序通道检测
Pub Date : 2019-04-24 DOI: 10.1109/ICWR.2019.8765291
Mehrdad Nasseralfoghara, Hamid-Reza Hamidi
Todays analyzing web weaknesses and vulnerabilities in order to find security attacks has become more urgent. In case there is a communication contrary to the system security policies, a covert channel has been created. The attacker can easily disclosure information from the victim’s system with just one public access permission. Covert timing channels, unlike covert storage channels, do not have memory storage and they draw less attention. Different methods have been proposed for their identification, which generally benefit from the shape of traffic and the channel’s regularity. In this article, an entropy-based detection method is designed and implemented. The attacker can adjust the amount of channel entropy by controlling measures such as changing the channel’s level or creating noise on the channel to protect from the analyst’s detection. As a result, the entropy threshold is not always constant for detection. By comparing the entropy from different levels of the channel and the analyst, we conclude that the analyst must investigate traffic at all possible levels.
如今,分析web弱点和漏洞以发现安全攻击变得更加紧迫。如果存在违反系统安全策略的通信,则创建了隐蔽通道。攻击者只需一个公共访问权限就可以轻松地从受害者的系统中泄露信息。隐蔽时序通道与隐蔽存储通道不同,它没有内存存储,因而较少引起人们的注意。人们提出了不同的方法来识别它们,这些方法通常受益于交通的形状和信道的规律性。本文设计并实现了一种基于熵的检测方法。攻击者可以通过控制诸如改变信道电平或在信道上制造噪声等措施来调整信道熵的数量,以防止分析者的检测。因此,对于检测来说,熵阈值并不总是恒定的。通过比较来自不同层次的信道和分析的熵,我们得出结论,分析必须在所有可能的层次上调查流量。
{"title":"Web Covert Timing Channels Detection based on Entropy","authors":"Mehrdad Nasseralfoghara, Hamid-Reza Hamidi","doi":"10.1109/ICWR.2019.8765291","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765291","url":null,"abstract":"Todays analyzing web weaknesses and vulnerabilities in order to find security attacks has become more urgent. In case there is a communication contrary to the system security policies, a covert channel has been created. The attacker can easily disclosure information from the victim’s system with just one public access permission. Covert timing channels, unlike covert storage channels, do not have memory storage and they draw less attention. Different methods have been proposed for their identification, which generally benefit from the shape of traffic and the channel’s regularity. In this article, an entropy-based detection method is designed and implemented. The attacker can adjust the amount of channel entropy by controlling measures such as changing the channel’s level or creating noise on the channel to protect from the analyst’s detection. As a result, the entropy threshold is not always constant for detection. By comparing the entropy from different levels of the channel and the analyst, we conclude that the analyst must investigate traffic at all possible levels.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"5 1","pages":"12-15"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81552221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Architecture for Managing Internet of Things based on Cognitive Peer-to-peer Networks 基于认知点对点网络的物联网管理体系结构
Pub Date : 2019-04-24 DOI: 10.1109/ICWR.2019.8765283
Mahdi Ghorbani, M. Meybodi, Ali Mohammad Saghiri
Peer-to-peer systems are well-known patterns of distributed systems which created several revelations in designing ultra-scalable systems. Recently, these types of systems are evolved into cognitive peer-to-peer networks. Because of the distributed nature of Internet of Things (IoT), peer-to-peer systems such as blockchain can be used to design management mechanisms in IoT. Therefore, we need an architecture which facilitates the utilization of peer-to-peer systems in IoT based systems. To the best of our knowledge, there is no general architecture based on cognitive peer-to-peer networks. Therefore, in this paper, we propose an architecture for managing IoT based on cognitive peer-to-peer networks. In order to study the potential of the proposed architecture, we suggest an adaptive search mechanism and also a topology management algorithm utilizing the proposed architecture. The results show the efficiency of the suggested algorithms. The proposed architecture may facilitate a new evolution from peer-to-peer systems to thing-to-thing systems.
点对点系统是众所周知的分布式系统模式,它为设计超可扩展系统提供了一些启示。最近,这些类型的系统演变为认知点对点网络。由于物联网(IoT)的分布式特性,区块链等点对点系统可用于设计物联网中的管理机制。因此,我们需要一种便于在基于物联网的系统中使用点对点系统的架构。据我们所知,目前还没有基于认知点对点网络的通用架构。因此,在本文中,我们提出了一种基于认知对等网络的物联网管理架构。为了研究该架构的潜力,我们提出了一种自适应搜索机制和一种利用该架构的拓扑管理算法。实验结果表明了所提算法的有效性。所提出的体系结构可能促进从点对点系统到物对物系统的新演变。
{"title":"An Architecture for Managing Internet of Things based on Cognitive Peer-to-peer Networks","authors":"Mahdi Ghorbani, M. Meybodi, Ali Mohammad Saghiri","doi":"10.1109/ICWR.2019.8765283","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765283","url":null,"abstract":"Peer-to-peer systems are well-known patterns of distributed systems which created several revelations in designing ultra-scalable systems. Recently, these types of systems are evolved into cognitive peer-to-peer networks. Because of the distributed nature of Internet of Things (IoT), peer-to-peer systems such as blockchain can be used to design management mechanisms in IoT. Therefore, we need an architecture which facilitates the utilization of peer-to-peer systems in IoT based systems. To the best of our knowledge, there is no general architecture based on cognitive peer-to-peer networks. Therefore, in this paper, we propose an architecture for managing IoT based on cognitive peer-to-peer networks. In order to study the potential of the proposed architecture, we suggest an adaptive search mechanism and also a topology management algorithm utilizing the proposed architecture. The results show the efficiency of the suggested algorithms. The proposed architecture may facilitate a new evolution from peer-to-peer systems to thing-to-thing systems.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"31 1","pages":"111-116"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91354496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multimedia Delivery Techniques over Software-Defined Networks: A Survey 软件定义网络上的多媒体传输技术:综述
Pub Date : 2019-04-24 DOI: 10.1109/ICWR.2019.8765278
M. Sanaei, S. Mostafavi
In the recent years, many solutions have been proposed to deliver multimedia over the best-effort Internet. The objective of these approaches is to ensure high Quality of Service (QoS) and Quality of Experience (QoE) for multimedia delivery in the presence of bandwidth fluctuations made by factors like signal propagation and network congestion. However, many of these techniques faces severe limitations such as network bottleneck and congestion due to the lack of global network view. The separation of control logic and data plane in Software Defined Networking (SDN) architecture contributes to the smartness, flexibility, and controllability of computer networks and provides new opportunities for guaranteeing higher QoE for multimedia viewers. In this survey, we present a taxonomy of the state-of-art SDN-based solutions for multimedia communications and we shed light on the research gaps in this area.
近年来,已经提出了许多解决方案,以在尽力的Internet上传递多媒体。这些方法的目标是在信号传播和网络拥塞等因素造成带宽波动的情况下,确保多媒体交付的高服务质量(QoS)和高体验质量(QoE)。然而,由于缺乏全局网络视图,这些技术面临着网络瓶颈和拥塞等严重的限制。SDN (Software Defined Networking)架构中控制逻辑和数据平面的分离,提高了计算机网络的智能性、灵活性和可控性,为多媒体观众提供了更高的QoE保障。在这项调查中,我们提出了一种最新的基于sdn的多媒体通信解决方案的分类,并阐明了该领域的研究差距。
{"title":"Multimedia Delivery Techniques over Software-Defined Networks: A Survey","authors":"M. Sanaei, S. Mostafavi","doi":"10.1109/ICWR.2019.8765278","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765278","url":null,"abstract":"In the recent years, many solutions have been proposed to deliver multimedia over the best-effort Internet. The objective of these approaches is to ensure high Quality of Service (QoS) and Quality of Experience (QoE) for multimedia delivery in the presence of bandwidth fluctuations made by factors like signal propagation and network congestion. However, many of these techniques faces severe limitations such as network bottleneck and congestion due to the lack of global network view. The separation of control logic and data plane in Software Defined Networking (SDN) architecture contributes to the smartness, flexibility, and controllability of computer networks and provides new opportunities for guaranteeing higher QoE for multimedia viewers. In this survey, we present a taxonomy of the state-of-art SDN-based solutions for multimedia communications and we shed light on the research gaps in this area.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"29 1","pages":"105-110"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83503154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
New Methodology for Contextual Features Usage in Duplicate Bug Reports Detection : Dimension Expansion based on Manhattan Distance Similarity of Topics 重复Bug报告中上下文特征使用的新方法:基于主题曼哈顿距离相似度的维度扩展
Pub Date : 2019-04-24 DOI: 10.1109/ICWR.2019.8765296
Behzad Soleimani Neysiani, Seyed Morteza Babamir
Duplicate bug report detection is one of the major problems in software triage systems like Bugzilla to deal with end user requests. User request contains some categorical and especially textual fields which need feature extraction for duplicate detection. Contextual and topical features are acquired using calculating cosine similarity between term frequency or inverse document frequency or BM25F technique from a pair of bug reports against some topics. This research proposes the individual Manhattan distance similarity approach instead of cosine distance similarity for every topic in contextual features to expand the feature dimension which can increase the accuracy of the duplicate bug report detection process. The four famous datasets of bug reports have used for evaluation of the proposed method including Android, Eclipse, Mozilla, and Open Office which the experimental results indicate performance improvement for four contextual features including general, cryptography, network, and Java topics.
重复错误报告检测是Bugzilla等软件分类系统处理最终用户请求时遇到的主要问题之一。用户请求包含一些分类字段,特别是文本字段,这些字段需要提取特征以进行重复检测。上下文和主题特征是通过计算术语频率或逆文档频率或BM25F技术之间的余弦相似度来获得的,这些相似度来自针对某些主题的一对错误报告。本研究提出了上下文特征中每个主题的单独曼哈顿距离相似度方法来代替余弦距离相似度,以扩大特征维度,提高重复错误报告检测过程的准确性。使用Android、Eclipse、Mozilla和Open Office这四个著名的bug报告数据集对所提出的方法进行了评估,实验结果表明,包括通用、加密、网络和Java主题在内的四个上下文特性的性能有所提高。
{"title":"New Methodology for Contextual Features Usage in Duplicate Bug Reports Detection : Dimension Expansion based on Manhattan Distance Similarity of Topics","authors":"Behzad Soleimani Neysiani, Seyed Morteza Babamir","doi":"10.1109/ICWR.2019.8765296","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765296","url":null,"abstract":"Duplicate bug report detection is one of the major problems in software triage systems like Bugzilla to deal with end user requests. User request contains some categorical and especially textual fields which need feature extraction for duplicate detection. Contextual and topical features are acquired using calculating cosine similarity between term frequency or inverse document frequency or BM25F technique from a pair of bug reports against some topics. This research proposes the individual Manhattan distance similarity approach instead of cosine distance similarity for every topic in contextual features to expand the feature dimension which can increase the accuracy of the duplicate bug report detection process. The four famous datasets of bug reports have used for evaluation of the proposed method including Android, Eclipse, Mozilla, and Open Office which the experimental results indicate performance improvement for four contextual features including general, cryptography, network, and Java topics.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"112 1","pages":"178-183"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89339878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Organizational Factors Affecting the Adoption of a Technological Innovation: A Study of the Hospital Information System (HIS) 影响技术创新的组织因素——基于医院信息系统的研究
Pub Date : 2019-04-24 DOI: 10.1109/ICWR.2019.8765270
Hossein Ahmadi, F sadoughi, L. Gholamhosseini, Tannaz Azadi, A. Sheikhtaheri, M. Nilashi, A. Dehnad
Hospital Information System (HIS) plays a dominant role in improving health processes and in the provision of patient care services. This study seeks potential organizational factors influencing adoption of HIS in Malaysian public hospitals. This study integrates the Technology Organization Environment (TOE) framework and Absorptive Capacity Theory (ACT) in proposing a new theoretical framework for HIS adoption in Malaysia. Specifically, we examined the organizational dimension in the proposed framework and investigated moderating role of hospital size in the adoption of HIS. This research applied a quantitative approach and conducted a nationwide survey involving 137 public hospitals, with different hospital size. A survey method using a web-based questionnaire was conducted to examine the effects of the identified factors on HIS adoption. The logistic regression method is then deployed for testing the research hypotheses. Regarding the hospital size as the only moderator of this study, we found that effects of the significant factors on HIS adoption are the same in different hospital sizes. This analytical study approaches to the TOE framework and extends it by taking into account the absorptive capacity of hospital as the important component of the internal organization. Therefore, the study and its findings are to provide more insight into the process of successful adoption of HIS for public hospitals of Malaysia.
医院信息系统(HIS)在改善卫生过程和提供病人护理服务方面起着主导作用。本研究寻求影响马来西亚公立医院采用HIS的潜在组织因素。本研究整合了技术组织环境(TOE)框架和吸收能力理论(ACT),为马来西亚采用HIS提出了一个新的理论框架。具体地说,我们检查了拟议框架中的组织维度,并调查了医院规模在采用HIS中的调节作用。本研究采用定量方法,在全国范围内调查了137家不同规模的公立医院。采用基于网络的问卷调查方法来检查已确定的因素对卫生信息系统采用的影响。然后采用逻辑回归方法对研究假设进行检验。将医院规模作为本研究的唯一调节因子,我们发现不同医院规模的显著因素对HIS采用的影响是相同的。本分析研究接近TOE框架,并将医院的吸收能力作为内部组织的重要组成部分加以扩展。因此,本研究及其结果旨在为马来西亚公立医院成功采用HIS的过程提供更多的见解。
{"title":"Organizational Factors Affecting the Adoption of a Technological Innovation: A Study of the Hospital Information System (HIS)","authors":"Hossein Ahmadi, F sadoughi, L. Gholamhosseini, Tannaz Azadi, A. Sheikhtaheri, M. Nilashi, A. Dehnad","doi":"10.1109/ICWR.2019.8765270","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765270","url":null,"abstract":"Hospital Information System (HIS) plays a dominant role in improving health processes and in the provision of patient care services. This study seeks potential organizational factors influencing adoption of HIS in Malaysian public hospitals. This study integrates the Technology Organization Environment (TOE) framework and Absorptive Capacity Theory (ACT) in proposing a new theoretical framework for HIS adoption in Malaysia. Specifically, we examined the organizational dimension in the proposed framework and investigated moderating role of hospital size in the adoption of HIS. This research applied a quantitative approach and conducted a nationwide survey involving 137 public hospitals, with different hospital size. A survey method using a web-based questionnaire was conducted to examine the effects of the identified factors on HIS adoption. The logistic regression method is then deployed for testing the research hypotheses. Regarding the hospital size as the only moderator of this study, we found that effects of the significant factors on HIS adoption are the same in different hospital sizes. This analytical study approaches to the TOE framework and extends it by taking into account the absorptive capacity of hospital as the important component of the internal organization. Therefore, the study and its findings are to provide more insight into the process of successful adoption of HIS for public hospitals of Malaysia.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"48 1","pages":"240-245"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87944906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Sentiment Aggregation System based on an OWA Operator 基于OWA算子的情感聚合系统
Pub Date : 2019-04-24 DOI: 10.1109/ICWR.2019.8765285
H. Abbasimehr, M. Shabani
User-Generated-Content (UGC) in the form of online reviews can be an invaluable source of information for both customers and businesses. Sentiment analysis and opinion mining tools and techniques have been proposed in the literature to extract knowledge from online reviews. Aspect-based opinion mining which has gained growing attention mainly has two tasks including aspect extraction and sentiment polarity detection. Once an aspect-based opinion mining task has been accomplished; a bag of sentiments will be achieved. In many cases, it is necessary to obtain an overall sentiment about a typical aspect. In this study, we have proposed a sentiment aggregation system based on weighted selective aggregated majority OWA (WSAM-OWA). WSAM-OWA considers both the majority and the degree of importance of information source in the process of aggregation. The proposed system exploits the helpfulness rating of reviews in determining the reliability and credibility of each sentiment. A case study was conducted to illustrates the usefulness of the proposed system. The results of this study demonstrated that the proposed sentiment aggregation system could be incorporated in opinion mining systems.
在线评论形式的用户生成内容(UGC)对于客户和企业来说都是宝贵的信息来源。情感分析和意见挖掘工具和技术已经在文献中提出,从在线评论中提取知识。基于方面的意见挖掘越来越受到关注,它主要有两个任务:方面提取和情感极性检测。一旦基于方面的意见挖掘任务完成;一袋情感将会实现。在许多情况下,有必要获得对一个典型方面的总体看法。在本研究中,我们提出了一种基于加权选择性聚合多数OWA (WSAM-OWA)的情感聚合系统。WSAM-OWA在聚合过程中既考虑信息源的多数度,又考虑信息源的重要程度。提出的系统利用评论的有用性评级来确定每个情感的可靠性和可信度。通过一个案例研究来说明所提出的系统的有效性。研究结果表明,所提出的情感聚合系统可以应用于意见挖掘系统中。
{"title":"A Sentiment Aggregation System based on an OWA Operator","authors":"H. Abbasimehr, M. Shabani","doi":"10.1109/ICWR.2019.8765285","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765285","url":null,"abstract":"User-Generated-Content (UGC) in the form of online reviews can be an invaluable source of information for both customers and businesses. Sentiment analysis and opinion mining tools and techniques have been proposed in the literature to extract knowledge from online reviews. Aspect-based opinion mining which has gained growing attention mainly has two tasks including aspect extraction and sentiment polarity detection. Once an aspect-based opinion mining task has been accomplished; a bag of sentiments will be achieved. In many cases, it is necessary to obtain an overall sentiment about a typical aspect. In this study, we have proposed a sentiment aggregation system based on weighted selective aggregated majority OWA (WSAM-OWA). WSAM-OWA considers both the majority and the degree of importance of information source in the process of aggregation. The proposed system exploits the helpfulness rating of reviews in determining the reliability and credibility of each sentiment. A case study was conducted to illustrates the usefulness of the proposed system. The results of this study demonstrated that the proposed sentiment aggregation system could be incorporated in opinion mining systems.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"98 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74949002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Anomaly-Based IDS for Detecting Attacks in RPL-Based Internet of Things 一种基于异常的物联网攻击检测方法
Pub Date : 2019-04-24 DOI: 10.1109/ICWR.2019.8765272
Behnam Farzaneh, M. A. Montazeri, S. Jamali
The Internet of Things (IoT) is a concept that allows the networking of various objects of everyday life and communications on the Internet without human interaction. The IoT consists of Low-Power and Lossy Networks (LLN) which for routing use a special protocol called Routing over Low-Power and Lossy Networks (RPL). Due to the resource-constrained nature of RPL networks, they may be exposed to a variety of internal attacks. Neighbor attack and DIS attack are the specific internal attacks at this protocol. This paper presents an anomaly-based lightweight Intrusion Detection System (IDS) based on threshold values for detecting attacks on the RPL protocol. The results of the simulation using Cooja show that the proposed model has a very high True Positive Rate (TPR) and in some cases, it can be 100%, while the False Positive Rate (FPR) is very low. The results show that the proposed model is fully effective in detecting attacks and applicable to large-scale networks.
物联网(IoT)是一个概念,它允许在互联网上连接日常生活和通信的各种对象,而无需人工交互。物联网由低功耗和有损网络(LLN)组成,它使用一种称为低功耗和有损网络路由(RPL)的特殊协议进行路由。由于RPL网络的资源约束性质,它们可能暴露于各种内部攻击。邻居攻击和DIS攻击是该协议特有的内部攻击。提出了一种基于阈值的基于异常的轻量级入侵检测系统(IDS),用于检测针对RPL协议的攻击。使用Cooja进行的仿真结果表明,所提出的模型具有很高的真阳性率(True Positive Rate, TPR),在某些情况下可以达到100%,而假阳性率(False Positive Rate, FPR)非常低。结果表明,该模型能够有效地检测攻击,适用于大规模网络。
{"title":"An Anomaly-Based IDS for Detecting Attacks in RPL-Based Internet of Things","authors":"Behnam Farzaneh, M. A. Montazeri, S. Jamali","doi":"10.1109/ICWR.2019.8765272","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765272","url":null,"abstract":"The Internet of Things (IoT) is a concept that allows the networking of various objects of everyday life and communications on the Internet without human interaction. The IoT consists of Low-Power and Lossy Networks (LLN) which for routing use a special protocol called Routing over Low-Power and Lossy Networks (RPL). Due to the resource-constrained nature of RPL networks, they may be exposed to a variety of internal attacks. Neighbor attack and DIS attack are the specific internal attacks at this protocol. This paper presents an anomaly-based lightweight Intrusion Detection System (IDS) based on threshold values for detecting attacks on the RPL protocol. The results of the simulation using Cooja show that the proposed model has a very high True Positive Rate (TPR) and in some cases, it can be 100%, while the False Positive Rate (FPR) is very low. The results show that the proposed model is fully effective in detecting attacks and applicable to large-scale networks.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"210 1","pages":"61-66"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73144114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Mobility-Aware Parent Selection for Routing Protocol in Wireless Sensor Networks using RPL 基于RPL的无线传感器网络路由协议移动感知父协议选择
Pub Date : 2019-04-24 DOI: 10.1109/ICWR.2019.8765273
Samaneh Hoghooghi, Ramin Nasr Esfahani
Recently, mobile devices have been introduced in various Wireless Sensor Networks (WSNs) applications in order to increase data collection efficiency. Mobility and resources optimized management are still open challenging issues for the success and proliferation of the Internet of mobile things. Routing plays an important role in the overall architecture of the IoT. The existing routing protocol RPL has a very low reactivity to mobility making it inefficient and open to further research improvements. In this paper, the RPL protocol has been improved to support mobility on the network. We created a continuous connection by reducing the number of hand-offs using the hop count metric. This led to the reduced network overhead and the increased data delivery rate. To simulate the proposed protocol, the Contiki 6LoWPAN/RPL stack has been used. Obtained simulation results show that proposed protocol outperforms both the RPL and the MRPL protocols in terms of packet delivery rate, delay, network overhead and energy consumption.
近年来,移动设备被引入到各种无线传感器网络(WSNs)应用中,以提高数据采集效率。对于移动物联网的成功和扩散,移动性和资源优化管理仍然是一个具有挑战性的开放性问题。路由在物联网的整体架构中扮演着重要的角色。现有的路由协议RPL对移动的响应性很低,效率低下,需要进一步的研究改进。本文对RPL协议进行了改进,以支持网络上的移动性。我们通过使用跳数度量减少切换次数来创建连续连接。这降低了网络开销,提高了数据传输速率。为了模拟所提出的协议,使用了Contiki 6LoWPAN/RPL堆栈。仿真结果表明,该协议在分组传输速率、时延、网络开销和能耗等方面均优于RPL和MRPL协议。
{"title":"Mobility-Aware Parent Selection for Routing Protocol in Wireless Sensor Networks using RPL","authors":"Samaneh Hoghooghi, Ramin Nasr Esfahani","doi":"10.1109/ICWR.2019.8765273","DOIUrl":"https://doi.org/10.1109/ICWR.2019.8765273","url":null,"abstract":"Recently, mobile devices have been introduced in various Wireless Sensor Networks (WSNs) applications in order to increase data collection efficiency. Mobility and resources optimized management are still open challenging issues for the success and proliferation of the Internet of mobile things. Routing plays an important role in the overall architecture of the IoT. The existing routing protocol RPL has a very low reactivity to mobility making it inefficient and open to further research improvements. In this paper, the RPL protocol has been improved to support mobility on the network. We created a continuous connection by reducing the number of hand-offs using the hop count metric. This led to the reduced network overhead and the increased data delivery rate. To simulate the proposed protocol, the Contiki 6LoWPAN/RPL stack has been used. Obtained simulation results show that proposed protocol outperforms both the RPL and the MRPL protocols in terms of packet delivery rate, delay, network overhead and energy consumption.","PeriodicalId":6680,"journal":{"name":"2019 5th International Conference on Web Research (ICWR)","volume":"88 1","pages":"79-84"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78314529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2019 5th International Conference on Web Research (ICWR)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1