{"title":"An Open Source Plugin for Image Analysis in Biology","authors":"Giorgia Campanile, C. D. Ruberto, A. Loddo","doi":"10.1109/WETICE.2019.00042","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00042","url":null,"abstract":"Image analysis is an important tool for several application fields, like biology and especially botany. Analysis of seed fossils can provide important information about their evolution, on agriculture origin, on plants domestication and knowledge of diets in ancient times. The aim of this work is to make the analysis process simple for biologists, by obtaining all the features needed for botanist user through a unique framework, that is still not available at the moment. We propose an ImageJ plugin able to extract morphological, textural and color features from seeds images in order to use them for classification. The experimental results have confirmed the goodness and correctness of the extracted features, making the proposed framework easily extendable to other application domains.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124553711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"JSCAN: Designing an Easy to use LLVM-Based Static Analysis Framework","authors":"Andrea Fornaia, Stefano Scafiti, E. Tramontana","doi":"10.1109/WETICE.2019.00058","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00058","url":null,"abstract":"Assisting code evolution (refactoring, adaptation, parallelisation, etc.) can be handy for improving code quality and execution speed. Generally, tools assisting developers are tailored to some language, making analyses approaches hard to be applied in practice when using a different language. In this paper, we propose a cross-language framework for implementing analyses on object-oriented code. By separating the logic for computing metrics, or detecting code smells, that lets us identify the need for improvements, from code exploration, we enable developers designing high-level recommendation tools that can be effectively applied on the most common object-oriented languages, such as e.g. Java and C++. Code exploration components will provide inspection and data commonly needed for representing the details of the code, such as control and data dependencies, or object and method lists. These will be language-specific and provided by the framework itself.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126171742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hassan Mokalled, Rosario Catelli, V. Casola, Daniele Debertol, Ermete Meda, R. Zunino
{"title":"The Applicability of a SIEM Solution: Requirements and Evaluation","authors":"Hassan Mokalled, Rosario Catelli, V. Casola, Daniele Debertol, Ermete Meda, R. Zunino","doi":"10.1109/WETICE.2019.00036","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00036","url":null,"abstract":"The need for SIEM systems increased in the last few years, especially as cyber-attacks are evolving and targeting enterprises, which may cause discontinuity of their services, leakage of their data, and affect their reputation. Cybersecurity breaches can range from no or limited impact to stealing or manipulation of data, or even taking control of systems. Many companies seek to reinforce their security capabilities to better safeguard against cybersecurity threats, so they adopt multi-layered security strategies that include using a SIEM solution. A significant factor for the increasing adoption of SIEMs is the capabilities that such systems offer, being able to provide near-real time analysis of security alerts and logs generated from various set of sources within an organization IT infrastructure. However, implementing a SIEM solution is not just an installation phase that fits any scenario within any organization; the best SIEM system for an organization may not be suitable at all for another one. An organization should consider other factors along with the technical side when evaluating a SIEM solution. This paper proposes an approach to aid enterprises, in selecting the most suitable SIEM solution; it suggests technical and organizational requirements that should be addressed and examines the SIEM applicability using quantitative and qualitative evaluation criteria.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115317567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amina Brahem, Nizar Messai, Yacine Sam, Sami Bhiri, T. Devogele, Walid Gaaloul
{"title":"Blockchain's Fame Reaches the Execution of Personalized Touristic Itineraries","authors":"Amina Brahem, Nizar Messai, Yacine Sam, Sami Bhiri, T. Devogele, Walid Gaaloul","doi":"10.1109/WETICE.2019.00047","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00047","url":null,"abstract":"Blockchain trends cover more and more tech domains making it one of the most used technologies in the last few years. This is due to two essential aspects. First, it is a distributed peer-to-peer network where there is no need for third part to execute operations between peers. Second, blockchain implements mechanisms to make the most data sensitive operations executed in a trusted way. Regarding these attractive aspects, we intend in this work to use the blockchain technology for the implementation of touristic itineraries. We consider the latter as process choreographies involving different participants. We intend to model and execute the touristic itineraries generated from a personalized trip planner called CART in raw XML format in a way that respects this collaborative aspect and resolves the problem of trust. We will propose a pattern and its transformation rules to reconstruct the itineraries presented in declarative annotations such as XML to smart contracts written in some smart contract-specific programming language called Solidity. Experimental results show promising perspectives of the deployment of the proposed solution to execute touristic plans.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116296786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Cisse, H. Tran, Samba Diaw, B. Coulette, A. Bah
{"title":"Using Patterns to Parameterize the Execution of Collaborative Tasks","authors":"M. Cisse, H. Tran, Samba Diaw, B. Coulette, A. Bah","doi":"10.1109/WETICE.2019.00031","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00031","url":null,"abstract":"During the execution of a process, managing the collaboration inside a task performed by various actors is not straightforward due to possible changes of the process's context and the collaboration strategy. Process management solutions which describe the collaboration at modeling time offer a rigid control for conducting such collaborative tasks and thus cannot adapt to changes. To enable a flexible execution of collaborative tasks, we propose using the late-binding mechanism to allow process actors, at execution time, choosing or adapting strategies to perform their collaboration. To do so, first we model collaboration strategies as process patterns providing different ways to implement a collaborative tasks at execution time. These collaboration patterns describe how to establish necessary relations for coordinating different instances of the task, for sharing and exchanging working artifacts among actors performing those instances. Then we define actions to execute collaborative tasks. These actions take collaboration patterns as parameters. Thus, by letting process actor selecting a suitable collaboration pattern, they allow binding dynamically a collaborative task to its implementation flexibly.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"35 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116743317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Bicocchi, Giacomo Cabri, L. Leonardi, Giulio Salierno
{"title":"A Survey of the Use of Software Agents in Digital Factories","authors":"N. Bicocchi, Giacomo Cabri, L. Leonardi, Giulio Salierno","doi":"10.1109/WETICE.2019.00010","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00010","url":null,"abstract":"Digital factories represent an abstraction of real factories, which is useful to manage at a high level the processes as well as the interactions inside the factories but also the interactions between factories. This abstraction can automatize several processes and can enable to dynamically adapt the factory production to unexpected situations. Software agents can meet the requirements of digital factories by means of their features of autonomy, reactivity, proactivity and sociality. In this paper, we survey the use of software agents in the context of digital factories, showing how they can be exploited. A discussion about the advantages brought by software agents and the limitation of agent-based approaches completes the paper.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126467643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Trust in Collaborative Filtering for Recommendations","authors":"F. Saleem, N. Iltaf, H. Afzal, M. Shahzad","doi":"10.1109/WETICE.2019.00053","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00053","url":null,"abstract":"Recommender systems are increasingly being used in e-commerce websites to solve the problem of finding right kind of information. Collaborative filtering is considered as most promising method for recommendation because it recommends items based on common interests of users. Trust Aware Recommender Systems (TARS) is an enhancement of traditional recommendation systems to improve recommendation quality which uses trusted users for recommending an item to an active user. From literature, it is proven that including all trusted users in recommendation process reduces its performance so this research work performs a filtration process on users for reduction of trusted neighborhood of an active user. The main idea of this research work is to keep only those users in trusted neighborhood whose rating behavior is similar to an active user. Subspace clustering method is used for filtration process. The proposed algorithm uses both implicit and explicit trust for trust value calculation. The results demonstrates that the proposed algorithm improves results in terms of Mean Absolute Error and Coverage as compared to other conventional methods.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133435716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Validation of Safety Critical Collaboration Systems (VSC) at WETICE 2019: Track Report","authors":"E. Tramontana, Andrea Calvagna, Andrea Fornaia","doi":"10.1109/WETICE.2019.00055","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00055","url":null,"abstract":"This report describes the scope of the VSC track held at the IEEE WETICE 2019 conference. The 2019 edition of WETICE was held in Capri (Naples), Italy, from June, the 12th to 14th. The papers accepted and presented to the VSC track dealt with the analysis of complex systems in order to detect erroneous or unexpected behaviour, especially from the security, and safety perspective.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117272768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authentication for Smart Grid AMI Systems: Threat Models, Solutions, and Challenges","authors":"Mourad Benmalek, Y. Challal, A. Derhab","doi":"10.1109/WETICE.2019.00052","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00052","url":null,"abstract":"Advanced Metering Infrastructure (AMI) has been regarded as a foundational part of the Smart Grid (SG). Consequently, AMI security is of critical importance. In this paper, we describe and investigate the current proposed authentication schemes and techniques for AMI. We discuss the challenges and desired objectives of authentication. We also provide a review of the recent proposed schemes for AMI along with their advantages and drawbacks towards meeting the discussed challenges and objectives. Based on the current survey, we identify open issues and suggest possible future research directions.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134367903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scanclave: Verifying Application Runtime Integrity in Untrusted Environments","authors":"M. Morbitzer","doi":"10.1109/WETICE.2019.00050","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00050","url":null,"abstract":"Data hosted in a cloud environment can be subject to attacks from a higher privileged adversary, such as a malicious or compromised cloud provider. To provide confidentiality and integrity even in the presence of such an adversary, a number of Trusted Execution Environments (TEEs) have been developed. A TEE aims to protect data and code within its environment against high privileged adversaries, such as a malicious operating system or hypervisor. While mechanisms exist to attest a TEE's integrity at load time, there are no mechanisms to attest its integrity at runtime. Work also exists that discusses mechanisms to verify the runtime integrity of programs and system components. However, those verification mechanisms are themselves not protected against attacks from a high privileged adversary. It is therefore desirable to combine the protection mechanisms of TEEs with the ability of application runtime integrity verification. In this paper, I present Scanclave, a lightweight design which achieves three design goals: Trustworthiness of the verifier, a minimal trusted software stack and the possibility to access an application's memory from a TEE. Having achieved these goals, I am able to verify the runtime integrity of applications even in the presence of a high privileged adversary. I refrain from discussing which properties define the runtime integrity of an application, as different applications will require different verification methods. Instead, I show how Scanclave enables a remote verifier to determine the runtime integrity of an application. Afterwards, I perform a security analysis for the different steps of my design. Additionally, I discuss different enclave implementations that might be used for the implementation of Scanclave.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127783889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}