2021 International Carnahan Conference on Security Technology (ICCST)最新文献

筛选
英文 中文
Artificial Intelligence in Security Technologies: Levels of Intelligent Autonomy and Risk 安全技术中的人工智能:智能自主和风险水平
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717405
Deborah Evans, Michael Coole
{"title":"Artificial Intelligence in Security Technologies: Levels of Intelligent Autonomy and Risk","authors":"Deborah Evans, Michael Coole","doi":"10.1109/ICCST49569.2021.9717405","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717405","url":null,"abstract":"The development and use of Artificial Intelligence (AI) within security technologies presents a number of opportunities and risks for security professionals. The study was undertaken to investigate the use of AI in security technologies within the functional categories of Observing, Detecting, Controlling and Responding technologies, exploring the risks associated with enhanced AI across these technologies. In exploring these risks, the study developed a novel scale to define the level of intelligent autonomy a technology may possess during operation, in addition the degree of human involvement retained at each level across the various stages of the AI operational cycle. The Security Technology Intelligent Autonomy Scale may be used to consider the risks which may emerge at each level, with a weighting towards consequences of outcome.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122166837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emotional analysis of safeness and risk perception of London and Rome airports during the COVID-19 pandemic COVID-19大流行期间伦敦和罗马机场安全性和风险认知的情感分析
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717386
F. Garzia, F. Borghini, Mattia Zita, M. Lombardi, S. Ramalingam
{"title":"Emotional analysis of safeness and risk perception of London and Rome airports during the COVID-19 pandemic","authors":"F. Garzia, F. Borghini, Mattia Zita, M. Lombardi, S. Ramalingam","doi":"10.1109/ICCST49569.2021.9717386","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717386","url":null,"abstract":"The evaluation of perceived safeness and risk by individuals is really useful for security and safety managing. Every individual is founded on the opinion of other individuals to get a selection and the Internet personifies the location where these judgments are mainly sought, obtained, and evaluated. From this point of view, social networks are characterized by a significant effect. Due to this reason, Opinion Mining and Sentiment Analysis have found remarkable uses in various environments and one of the most interesting is embodied by public security and safety. The aim of this work is to study the perception of risk of aircraft passengers and users of airports of London (UK) and Rome (Italy) during COVID-19 pandemic. In particular, the airports of London Heathrow and Gatwick and the airports of Rome Fiumicino and Ciampino were studied, from March 23 to July 9, 2020, highlighting the emotional components in three distinct pandemic phases of the considered period in the two countries, by means of the semantic analysis of the textual contents existing in Twitter.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133317484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards the Resolution of Safety and Security Conflicts 安全与安保冲突的解决之路
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717390
C. Menon, S. Vidalis
{"title":"Towards the Resolution of Safety and Security Conflicts","authors":"C. Menon, S. Vidalis","doi":"10.1109/ICCST49569.2021.9717390","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717390","url":null,"abstract":"Safety engineering and cyber security have complementary aims, but typically realise these using different techniques, risk assessment methods and cultural approaches. As a result, the integration of safety and cyber security concerns is a complex process, with potential for conflict. We present a generalized taxonomy of common conflict areas between safety and cyber security, oriented around the development and deployment lifecycle, and supplement this with a discussion of concepts and methodologies for resolution based on the shared principle of defence-in-depth.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129300840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Network Intrusion Detection System Using Ensemble Machine Learning 基于集成机器学习的网络入侵检测系统
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717397
Aklil Zenebe Kiflay, A. Tsokanos, Raimund Kirner
{"title":"A Network Intrusion Detection System Using Ensemble Machine Learning","authors":"Aklil Zenebe Kiflay, A. Tsokanos, Raimund Kirner","doi":"10.1109/ICCST49569.2021.9717397","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717397","url":null,"abstract":"The type and number of cyber-attacks on data networks have been increasing. As networks grow, the importance of Network Intrusion Detection Systems (NIDS) in monitoring cyber threats has also increased. One of the challenges in NIDS is the high number of alerts the systems generate, and the overwhelming effect that alerts have on security operations. To process alerts efficiently, NIDS can be designed to include Machine Learning (ML) capabilities. In the literature, various NIDS architectures that use ML approaches have been proposed. However, high false alarm rates continue to be challenges to most NID systems. In this paper, we present a NIDS that uses ensemble ML in order to improve the performance of attack detection and to decrease the rate of false alarms. To this end, we combine four ensemble ML classifiers - (Random Forest, AdaBoost, XGBoost and Gradient boosting decision tree) using a soft voting scheme.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130875314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dynamic Key Generation Mechanism to Strengthen the Data Security 增强数据安全性的动态密钥生成机制
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717370
J. S. Prasath, D. Jose, B. Rammyaa, R. Pandian
{"title":"Dynamic Key Generation Mechanism to Strengthen the Data Security","authors":"J. S. Prasath, D. Jose, B. Rammyaa, R. Pandian","doi":"10.1109/ICCST49569.2021.9717370","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717370","url":null,"abstract":"Information Technology (IT) networks are susceptible to varieties of intrusions. Data communication through industrial networks needs to be protected from unauthorized access. The number of attacks increases rapidly due to the wide range of network operations. Industrial networks provide a connection between servers and control devices, which are located at the plant. The security attacks rises due to the wide usage of internet for accessing and monitoring the plant information. It is essential to preserve data communication in process monitoring and control operations. This proposed work is the novel dynamic key generation algorithm that generates different keys each time during the process of encoding. The security mechanism is developed that enhances the security and protects the information from unauthorized access. This security algorithm is developed and simulated using MATLAB software. This proposed cryptographic algorithm can perform encryption of the infinite number of bytes which provides additional network security. It can be applicable for securing the sensitive process parameters in industrial operations.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127594543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Assessment of the Impact of Displaying Two Rear Registration Plates on ANPR 评估显示两个后牌照对车辆安全检讨的影响
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717394
Mike Rhead, Robert Gurney, W. E. Martin
{"title":"Assessment of the Impact of Displaying Two Rear Registration Plates on ANPR","authors":"Mike Rhead, Robert Gurney, W. E. Martin","doi":"10.1109/ICCST49569.2021.9717394","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717394","url":null,"abstract":"This paper considers the implications of displaying two rear registration plates on trailers following the UK's ratification of the Vienna Convention of Road Traffic. The UK's application of the Vienna Convention is at variance with that of EU members that have ratified the Vienna Convention. Furthermore, it considers how the variability of UK registration plates can have an adverse impact on Automatic Number Plate Recognition (ANPR) and capture rate.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131967445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emotional reactions to risk perception in the Herculaneum Archaeological Park 赫库兰尼姆考古公园对风险感知的情绪反应
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717406
F. Garzia, F. Borghini, L. Minò, Alberto Bruni, S. Ramalingam, M. Lombardi
{"title":"Emotional reactions to risk perception in the Herculaneum Archaeological Park","authors":"F. Garzia, F. Borghini, L. Minò, Alberto Bruni, S. Ramalingam, M. Lombardi","doi":"10.1109/ICCST49569.2021.9717406","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717406","url":null,"abstract":"In safety and security management, it is important to evaluate the extent of perceived risk by tourists of heritage and cultural sites. Social media is very powerful in this regard as it facilitates reviews that influences the opinions of one by others. It is a key media of advertisement and 90% of tourists rely heavily on the reviews added to these sites. Research in opinion mining and sentiment analysis has gained importance in recent times with a need to enhance public safety and security. Such analysis aids security personnel to look out for unforeseen events that might lead to risks. In some cases, the perceived risks could be exaggerated. Therefore, there is a need to understand the reasons behind such anxiety and include mitigation in place. In this work, we consider the risk perception estimation for the Herculaneum Archaeological Park in Italy. We show how this can influence visitors emotionally by applying sentiment analysis on Twitter data.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116410084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy and Security Threats from Smart Meters Technology 智能电表技术带来的隐私和安全威胁
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717384
M. Robinson, P. Schirmer, I. Mporas
{"title":"Privacy and Security Threats from Smart Meters Technology","authors":"M. Robinson, P. Schirmer, I. Mporas","doi":"10.1109/ICCST49569.2021.9717384","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717384","url":null,"abstract":"Energy smart meters have become very popular, advantaging the general public and utility companies via instant energy monitoring, and modelling, respectively. The information available from smart metering could however be used maliciously with the use of non-intrusive load monitoring technology. In this paper, we explore the vectors for attack on the smart metering network, showing physical and logical locations from which data could be stolen; and show how socio-economic, health related, occupancy, and multi-media viewing habits can be estimated to a high accuracy, thus posing a threat to users' privacy and security.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122019283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing a Modular and Distributed Web Crawler Focused on Unstructured Cybersecurity Intelligence 面向非结构化网络安全智能的模块化分布式网络爬虫设计
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717379
Don Jenkins, L. Liebrock, V. Urias
{"title":"Designing a Modular and Distributed Web Crawler Focused on Unstructured Cybersecurity Intelligence","authors":"Don Jenkins, L. Liebrock, V. Urias","doi":"10.1109/ICCST49569.2021.9717379","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717379","url":null,"abstract":"There are many use cases for cybersecurity related information available on the Internet. Tasks relating to natural language processing and machine learning require large amounts of structured and labeled data. However, the availability of recent data is limited due to the difficulty in its sanitization, retrieval, and labeling. Data on the Internet is generally diverse and unstructured, and storing this information in a manner that is easily usable for research and development purposes is not an intuitive task. We propose architectural considerations when developing a distributed system consisting of web crawlers, web scrapers, and various post-processing components, as well as possible implementations of these considerations. Our team developed such a system that is capable of applying structure and storing open source intelligence data from the Internet in an easily-searchable software platform called Splunk.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125084033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Process to Plan Security Measures for Cultural Events 文化活动安全措施的规划过程
2021 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717380
Dora Kotkova, Tereza Sternova, Zdenek Kalvach, Lukas Kotek
{"title":"The Process to Plan Security Measures for Cultural Events","authors":"Dora Kotkova, Tereza Sternova, Zdenek Kalvach, Lukas Kotek","doi":"10.1109/ICCST49569.2021.9717380","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717380","url":null,"abstract":"This article is focused on the planning of security measures. In our research, we are focused on soft targets and their protection. In this article, we present one part of our work - the process of planning and security strategy. In the beginning, the definitions of the soft targets and the cultural events are. Then we describe our proposal for schedule steps and security documents for effective security measures, generally for effective security and protection of people. The last part is about security strategy. We need to understand the possibilities of different strategies, their advantages and disadvantages.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123794638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信