{"title":"Cyber Threat Hunting Through the Use of an Isolation Forest","authors":"D. Karev, Christopher B. McCubbin, R. Vaulin","doi":"10.1145/3134302.3134319","DOIUrl":"https://doi.org/10.1145/3134302.3134319","url":null,"abstract":"Most intrusion detection systems use supervised machine learning algorithms which allow them to detect only recorded types of malicious attacks. This paper applies a fundamentally different approach to the problem, exploiting Isolation Forests, an unsupervised machine learning algorithm in a new context. One of the most important advantages of the algorithm is that it can identify and record novel intrusion models. We conduct experiments using HTTP log data to explore the algorithm's accuracy under various conditions. We empirically determine the optimal values for the algorithm's parameters and prove that the originally suggested standard Isolation Forest's parameters do not always produce optimal results. Furthermore, we explore which HTTP features achieve the best results for differentiating between malicious and normal data by running a genetic algorithm. After applying the established results, we achieve approximately 300% increase in the accuracy and we decrease the requested time of the algorithm by nearly 50%.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127548920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mass-spring Cloth Simulation with Shape Matching","authors":"T. Vassilev","doi":"10.1145/3134302.3134332","DOIUrl":"https://doi.org/10.1145/3134302.3134332","url":null,"abstract":"This paper proposes an improved mass-spring elastic model of cloth by applying a shape matching technique to the original Hookean springs. As a result the springs do not obey to the Hook's law anymore, which allows stable simulation of cloth with larger time steps, with the simplicity and efficiency of the mass-spring system preserved. The proposed model was implemented in a system for dressing garments on virtual human bodies. Test results are given at the end of the paper, which show the advantages of the new approach, compared to the original mass-spring model.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127832440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Bosakova-Ardenska, H. Andreeva, P. Boyanova, P. Panayotov
{"title":"CutSurf: a Software Tool for Cut Surface Evaluation of White Cheese","authors":"A. Bosakova-Ardenska, H. Andreeva, P. Boyanova, P. Panayotov","doi":"10.1145/3134302.3134318","DOIUrl":"https://doi.org/10.1145/3134302.3134318","url":null,"abstract":"This paper presents a software tool named CutSurf. The tool was designed to process BMP images and calculate the ratio of white over all pixels into binary images. The main purpose of processing is to make an objective evaluation of cut surface of white brined cheese. Cut surface of five white cheeses of sheep milk were examine by organoleptic evaluation and by processing of microscopic images with CutSurf. The results show that CutSurf could be used for organoleptic evaluation of white brined cheese cut surface.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128559455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Algorithm for Micro-localization in Large Public Buildings","authors":"R. Ivanov","doi":"10.1145/3134302.3134315","DOIUrl":"https://doi.org/10.1145/3134302.3134315","url":null,"abstract":"This paper presents an algorithm for people localization in large public buildings using Bluetooth Low Energy (BLE) beacons, Near-Field Communication (NFC) passive tags and information from specially designed Building Information Model (BIM). The proposed algorithm does not require any pre-data collection. An adaptive Kalman filter is used to decrease the noise in Received Signal-Strength Index (RSSI) raw measurements from beacons. To calculate a fine-grained user's position we find intersection points between rings, which inner and outer radiuses depends on fluctuations in RSSI signals from beacons. Then, for calculated intersection points, we obtain the optimal number of clusters using ANN clustering and inter-clusters entropy. These cluster canters are potential candidates for the position of the visitor. Using dead reckoning, we find a circle-shaped area in which the visitor is expected to be. Only clusters with centres located within this area are taken into account. If several points are in this area, the winner point is one, which belongs to clustering process that gives minimum inter-cluster entropy. The tests show that the localization error is below 1.5 m for all simulated and real world test scenarios.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"294 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121257444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Model of an Intelligent Agent Behaviour and Method of Fire Extinguishing Control","authors":"A. Senkov, A. Chepikov","doi":"10.1145/3134302.3134324","DOIUrl":"https://doi.org/10.1145/3134302.3134324","url":null,"abstract":"The article considers a fuzzy intelligent agent behavior model that controls fire fighting. In contrast to existing fire extinguishing means the model is notable for local application of fire extinguishing means. It allocates available firefighting resources in proportion to the rate of the threat and is able to \"share\" firefighting resources with allied intelligent agents. Effectiveness of the model is determined by reduction of the area affected by the fire or damaged by fire extinguishing means (e.g. flooded).","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126315325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Bâra, S. Oprea, Adina Uta, O. B. Tör, M. E. Cebeci
{"title":"Informatics Solutions for Smart Trading on Wholesale Electricity Markets Containing RES Bidders","authors":"A. Bâra, S. Oprea, Adina Uta, O. B. Tör, M. E. Cebeci","doi":"10.1145/3134302.3134327","DOIUrl":"https://doi.org/10.1145/3134302.3134327","url":null,"abstract":"This paper presents an informatics solution that aims to assist energy suppliers in setting up their bids on wholesale electricity markets. The solution is developed into a cloud computing platform as an online dashboard, including the following components: consumption optimization and forecasting, generation forecasting, advanced data analytics, and decision rules. These components require a complex data integration model that gathers data from different sources such as: smart meters and appliances, SCADA systems and wholesale electricity market.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131924472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Terzieva, Katia Todorova, Yuri P. Pavlov, P. Kademova-Katzarova
{"title":"Utility and Optimal Usage of ICT in Schools","authors":"V. Terzieva, Katia Todorova, Yuri P. Pavlov, P. Kademova-Katzarova","doi":"10.1145/3134302.3134345","DOIUrl":"https://doi.org/10.1145/3134302.3134345","url":null,"abstract":"The main purpose of this study is to reveal the usage of modern tools in the context of school education. We examine teachers' practice concerning the implementation of technology in diverse classroom activities. Further, we estimate and represent teachers' subjective preferences in accordance with their experience. The estimation is calculated by an application of the normative decision-making approach, stochastic approximation, and mathematical modelling. Utility functions that represent teacher-expert's preferences about presentations, virtual laboratories, and educational games respectively are derived. The optimal degree of usage of these ICT-based learning resources in classroom activities is determined. The goal is to estimate the portion of technology-supported resources, which should be used in the educational process so as to be useful.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115937020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Conceptual Model of an Electronic Appendix Called \"Nursing file for palliative care\", for Training Students from the Speciality of Nurse","authors":"G. Koleva, Despina Georgieva, Yavor Stefanov","doi":"10.1145/3134302.3134309","DOIUrl":"https://doi.org/10.1145/3134302.3134309","url":null,"abstract":"Globally, nursing as a science is dynamically developing, in response to the growing needs of health care. The documentation of the performed activities and interventions by the nurse, is an important element of her work and a specific moment of the training process of the field of study. The suggested conceptual method of Electronic nursing file, gives opportunity to systematize and optimize the training process, and also responds to the digital generations' expectations. It creates conditions for interactive training, for a timely reaction by the student, as well as a fair estimation of the achieved skills, knowledge and competence.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123613232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Continuous Requirements Engineering","authors":"M. Kirikova","doi":"10.1145/3134302.3134304","DOIUrl":"https://doi.org/10.1145/3134302.3134304","url":null,"abstract":"The paper presents fractal functional architecture of the FREEDOM framework of continuous requirements engineering and illustrates its applicability using three methods of continuous requirements engineering. The fractal architecture of the continuous requirements engineering framework assists in representing scalability in requirements engineering. It also supports flexibility of requirements engineering by providing the ability to adjust to different systems development contexts, different software engineering approaches, and different requirements handling methods.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127991733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Application Sandboxing Techniques","authors":"S. Laurén, Sampsa Rauti, V. Leppänen","doi":"10.1145/3134302.3134312","DOIUrl":"https://doi.org/10.1145/3134302.3134312","url":null,"abstract":"The principle of least privilege states that components in a system should only be allowed to perform actions that are required for them to function. The wish to limit what programs can access has given rise to a set of application-level sandboxing solutions. In this paper, we survey recent research on application-level sandboxing. We discuss the properties of the major implementations and highlight the key differences between them. In addition, we show how recent features in mainline Linux kernel have altered the sandboxing landscape.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124487641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}