Proceedings of the 18th International Conference on Computer Systems and Technologies最新文献

筛选
英文 中文
Cyber Threat Hunting Through the Use of an Isolation Forest 通过使用隔离森林进行网络威胁搜索
D. Karev, Christopher B. McCubbin, R. Vaulin
{"title":"Cyber Threat Hunting Through the Use of an Isolation Forest","authors":"D. Karev, Christopher B. McCubbin, R. Vaulin","doi":"10.1145/3134302.3134319","DOIUrl":"https://doi.org/10.1145/3134302.3134319","url":null,"abstract":"Most intrusion detection systems use supervised machine learning algorithms which allow them to detect only recorded types of malicious attacks. This paper applies a fundamentally different approach to the problem, exploiting Isolation Forests, an unsupervised machine learning algorithm in a new context. One of the most important advantages of the algorithm is that it can identify and record novel intrusion models. We conduct experiments using HTTP log data to explore the algorithm's accuracy under various conditions. We empirically determine the optimal values for the algorithm's parameters and prove that the originally suggested standard Isolation Forest's parameters do not always produce optimal results. Furthermore, we explore which HTTP features achieve the best results for differentiating between malicious and normal data by running a genetic algorithm. After applying the established results, we achieve approximately 300% increase in the accuracy and we decrease the requested time of the algorithm by nearly 50%.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127548920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Mass-spring Cloth Simulation with Shape Matching 基于形状匹配的质量-弹簧布仿真
T. Vassilev
{"title":"Mass-spring Cloth Simulation with Shape Matching","authors":"T. Vassilev","doi":"10.1145/3134302.3134332","DOIUrl":"https://doi.org/10.1145/3134302.3134332","url":null,"abstract":"This paper proposes an improved mass-spring elastic model of cloth by applying a shape matching technique to the original Hookean springs. As a result the springs do not obey to the Hook's law anymore, which allows stable simulation of cloth with larger time steps, with the simplicity and efficiency of the mass-spring system preserved. The proposed model was implemented in a system for dressing garments on virtual human bodies. Test results are given at the end of the paper, which show the advantages of the new approach, compared to the original mass-spring model.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127832440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CutSurf: a Software Tool for Cut Surface Evaluation of White Cheese CutSurf:白奶酪切面评估的软件工具
A. Bosakova-Ardenska, H. Andreeva, P. Boyanova, P. Panayotov
{"title":"CutSurf: a Software Tool for Cut Surface Evaluation of White Cheese","authors":"A. Bosakova-Ardenska, H. Andreeva, P. Boyanova, P. Panayotov","doi":"10.1145/3134302.3134318","DOIUrl":"https://doi.org/10.1145/3134302.3134318","url":null,"abstract":"This paper presents a software tool named CutSurf. The tool was designed to process BMP images and calculate the ratio of white over all pixels into binary images. The main purpose of processing is to make an objective evaluation of cut surface of white brined cheese. Cut surface of five white cheeses of sheep milk were examine by organoleptic evaluation and by processing of microscopic images with CutSurf. The results show that CutSurf could be used for organoleptic evaluation of white brined cheese cut surface.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128559455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Algorithm for Micro-localization in Large Public Buildings 大型公共建筑微定位算法研究
R. Ivanov
{"title":"An Algorithm for Micro-localization in Large Public Buildings","authors":"R. Ivanov","doi":"10.1145/3134302.3134315","DOIUrl":"https://doi.org/10.1145/3134302.3134315","url":null,"abstract":"This paper presents an algorithm for people localization in large public buildings using Bluetooth Low Energy (BLE) beacons, Near-Field Communication (NFC) passive tags and information from specially designed Building Information Model (BIM). The proposed algorithm does not require any pre-data collection. An adaptive Kalman filter is used to decrease the noise in Received Signal-Strength Index (RSSI) raw measurements from beacons. To calculate a fine-grained user's position we find intersection points between rings, which inner and outer radiuses depends on fluctuations in RSSI signals from beacons. Then, for calculated intersection points, we obtain the optimal number of clusters using ANN clustering and inter-clusters entropy. These cluster canters are potential candidates for the position of the visitor. Using dead reckoning, we find a circle-shaped area in which the visitor is expected to be. Only clusters with centres located within this area are taken into account. If several points are in this area, the winner point is one, which belongs to clustering process that gives minimum inter-cluster entropy. The tests show that the localization error is below 1.5 m for all simulated and real world test scenarios.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"294 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121257444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fuzzy Model of an Intelligent Agent Behaviour and Method of Fire Extinguishing Control 智能Agent行为模糊模型及灭火控制方法
A. Senkov, A. Chepikov
{"title":"Fuzzy Model of an Intelligent Agent Behaviour and Method of Fire Extinguishing Control","authors":"A. Senkov, A. Chepikov","doi":"10.1145/3134302.3134324","DOIUrl":"https://doi.org/10.1145/3134302.3134324","url":null,"abstract":"The article considers a fuzzy intelligent agent behavior model that controls fire fighting. In contrast to existing fire extinguishing means the model is notable for local application of fire extinguishing means. It allocates available firefighting resources in proportion to the rate of the threat and is able to \"share\" firefighting resources with allied intelligent agents. Effectiveness of the model is determined by reduction of the area affected by the fire or damaged by fire extinguishing means (e.g. flooded).","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126315325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Informatics Solutions for Smart Trading on Wholesale Electricity Markets Containing RES Bidders 包含RES投标人的批发电力市场智能交易的信息学解决方案
A. Bâra, S. Oprea, Adina Uta, O. B. Tör, M. E. Cebeci
{"title":"Informatics Solutions for Smart Trading on Wholesale Electricity Markets Containing RES Bidders","authors":"A. Bâra, S. Oprea, Adina Uta, O. B. Tör, M. E. Cebeci","doi":"10.1145/3134302.3134327","DOIUrl":"https://doi.org/10.1145/3134302.3134327","url":null,"abstract":"This paper presents an informatics solution that aims to assist energy suppliers in setting up their bids on wholesale electricity markets. The solution is developed into a cloud computing platform as an online dashboard, including the following components: consumption optimization and forecasting, generation forecasting, advanced data analytics, and decision rules. These components require a complex data integration model that gathers data from different sources such as: smart meters and appliances, SCADA systems and wholesale electricity market.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131924472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utility and Optimal Usage of ICT in Schools 信息通信技术在学校的效用和最佳使用
V. Terzieva, Katia Todorova, Yuri P. Pavlov, P. Kademova-Katzarova
{"title":"Utility and Optimal Usage of ICT in Schools","authors":"V. Terzieva, Katia Todorova, Yuri P. Pavlov, P. Kademova-Katzarova","doi":"10.1145/3134302.3134345","DOIUrl":"https://doi.org/10.1145/3134302.3134345","url":null,"abstract":"The main purpose of this study is to reveal the usage of modern tools in the context of school education. We examine teachers' practice concerning the implementation of technology in diverse classroom activities. Further, we estimate and represent teachers' subjective preferences in accordance with their experience. The estimation is calculated by an application of the normative decision-making approach, stochastic approximation, and mathematical modelling. Utility functions that represent teacher-expert's preferences about presentations, virtual laboratories, and educational games respectively are derived. The optimal degree of usage of these ICT-based learning resources in classroom activities is determined. The goal is to estimate the portion of technology-supported resources, which should be used in the educational process so as to be useful.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115937020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Conceptual Model of an Electronic Appendix Called "Nursing file for palliative care", for Training Students from the Speciality of Nurse “姑息治疗护理档案”电子附录的概念模型,用于培训护士专业学生
G. Koleva, Despina Georgieva, Yavor Stefanov
{"title":"A Conceptual Model of an Electronic Appendix Called \"Nursing file for palliative care\", for Training Students from the Speciality of Nurse","authors":"G. Koleva, Despina Georgieva, Yavor Stefanov","doi":"10.1145/3134302.3134309","DOIUrl":"https://doi.org/10.1145/3134302.3134309","url":null,"abstract":"Globally, nursing as a science is dynamically developing, in response to the growing needs of health care. The documentation of the performed activities and interventions by the nurse, is an important element of her work and a specific moment of the training process of the field of study. The suggested conceptual method of Electronic nursing file, gives opportunity to systematize and optimize the training process, and also responds to the digital generations' expectations. It creates conditions for interactive training, for a timely reaction by the student, as well as a fair estimation of the achieved skills, knowledge and competence.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123613232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Continuous Requirements Engineering 持续需求工程
M. Kirikova
{"title":"Continuous Requirements Engineering","authors":"M. Kirikova","doi":"10.1145/3134302.3134304","DOIUrl":"https://doi.org/10.1145/3134302.3134304","url":null,"abstract":"The paper presents fractal functional architecture of the FREEDOM framework of continuous requirements engineering and illustrates its applicability using three methods of continuous requirements engineering. The fractal architecture of the continuous requirements engineering framework assists in representing scalability in requirements engineering. It also supports flexibility of requirements engineering by providing the ability to adjust to different systems development contexts, different software engineering approaches, and different requirements handling methods.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127991733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Survey on Application Sandboxing Techniques 应用沙盒技术综述
S. Laurén, Sampsa Rauti, V. Leppänen
{"title":"A Survey on Application Sandboxing Techniques","authors":"S. Laurén, Sampsa Rauti, V. Leppänen","doi":"10.1145/3134302.3134312","DOIUrl":"https://doi.org/10.1145/3134302.3134312","url":null,"abstract":"The principle of least privilege states that components in a system should only be allowed to perform actions that are required for them to function. The wish to limit what programs can access has given rise to a set of application-level sandboxing solutions. In this paper, we survey recent research on application-level sandboxing. We discuss the properties of the major implementations and highlight the key differences between them. In addition, we show how recent features in mainline Linux kernel have altered the sandboxing landscape.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124487641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信