Proceedings of the 3rd International Conference on Networking, Information Systems & Security最新文献

筛选
英文 中文
Compressive Sensing Based on Homomorphic Encryption and Attack Classification using Machine Learning Algorithm in WSN Security 基于同态加密的压缩感知和基于机器学习算法的WSN安全攻击分类
Samir Ifzarne, I. Hafidi, Nadia Idrissi
{"title":"Compressive Sensing Based on Homomorphic Encryption and Attack Classification using Machine Learning Algorithm in WSN Security","authors":"Samir Ifzarne, I. Hafidi, Nadia Idrissi","doi":"10.1145/3386723.3387859","DOIUrl":"https://doi.org/10.1145/3386723.3387859","url":null,"abstract":"Data protection is essential for sensitive applications using Wireless Sensor Networks like health monitoring or video surveillance. WSN are deployed generally in harsh environment making them vulnerable for attacks thus it's important to secure data while being transferred from the sensor until the base station. This article is a proposal for a methodology which enable attack detection and classification on WSN. Compressive sensing is used to optimize the size of data exchange and hence optimize energy consumption. Homomorphic encryption allows to reduce encryption complexity by applying arithmetic operations on cypher text. Machine learning is applied to classify the attacks quickly.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125400118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Distributed Information Retrieval Approach for Copyright Protection 版权保护的分布式信息检索方法
Sonia Benbelgacem, L. Guezouli, Rachid Seghir
{"title":"A Distributed Information Retrieval Approach for Copyright Protection","authors":"Sonia Benbelgacem, L. Guezouli, Rachid Seghir","doi":"10.1145/3386723.3387882","DOIUrl":"https://doi.org/10.1145/3386723.3387882","url":null,"abstract":"Developments in telecommunications technology has opened up the possibility of circumventing intellectual property in the digital world, outside the legal and technical methods proposed for copyright protection, the information retrieval is considered as a computer field helping to protect these rights by proposing methods of search, analysis and comparison for protected documents. This article proposes an approach based on the distributed information retrieval allowing the detection of any unlawful manipulation for copyrighted works. In particular, we propose an architecture of a distributed information retrieval system on a peer-to-peer network as well as the specific architecture of its nodes, in addition, a double indexation (local & distributed) was proposed.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131060648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sensors Transposing Technique for Minimizing the Path Loss Effect and Enhancement of Battery Lifetime in Wireless Body Area Sensor Networks 无线体域传感器网络中最小化路径损耗和提高电池寿命的传感器调换技术
R. A. Khan, S. Memon
{"title":"Sensors Transposing Technique for Minimizing the Path Loss Effect and Enhancement of Battery Lifetime in Wireless Body Area Sensor Networks","authors":"R. A. Khan, S. Memon","doi":"10.1145/3386723.3387828","DOIUrl":"https://doi.org/10.1145/3386723.3387828","url":null,"abstract":"There has been vast development leading to advanced systems like wireless communication and development of small sized devices and sensors which can perform several tasks simultaneously. These wireless sensors have provided a great potential towards a wearable technology, however; due to the small size of battery they have a limited power storage. There are vast applications of these sensors are in medical wireless sensor networks which are very critical. If the sensors not precisely positioned on the body of a patient, the communication between them may increase the power consumption of sensor nodes and diminish the life of battery. In this paper, a transposition technique for sensor position is being proposed by using Euclidean algorithm. In this technique, the sensor nodes may get placed in such a way that they have smaller distance to communicate with each other. This makes communication effective and increase battery life by reduction of path loss which occurs in wireless sensors communication.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114617175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ankle gait-pattern generators 脚踝步态模式生成器
Mohamed Amine Mamou, N. Saadia
{"title":"Ankle gait-pattern generators","authors":"Mohamed Amine Mamou, N. Saadia","doi":"10.1145/3386723.3387833","DOIUrl":"https://doi.org/10.1145/3386723.3387833","url":null,"abstract":"Different lower limbs robotic rehabilitation devices are under study to help patients to recover gestures altered, affected or lost after traffic accident injury, illness or disability. Especially ankle because is a complex part of the human skeleton. In this paper we present our contribution to the ankle foot robotic device. We will present our strategy to generate the setpoint trajectory for ankle devices that is based on neural networks. The latter will generate the trajectory of the ankle from the angular position sensors of the hip joint and the knee joint. This gave good results, but we noticed during the tests that the ankle trajectory contained sporadic peaks. This was the case of the right and left ankle. An optimization algorithm is developed to eliminate this phenomenon; it will be presented soon.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132448681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sampling techniques for Arabic Sentiment Classification: A Comparative Study 阿拉伯语情感分类的抽样技术:比较研究
H. A. Addi, R. Ezzahir
{"title":"Sampling techniques for Arabic Sentiment Classification: A Comparative Study","authors":"H. A. Addi, R. Ezzahir","doi":"10.1145/3386723.3387899","DOIUrl":"https://doi.org/10.1145/3386723.3387899","url":null,"abstract":"Over the last decade, the web 2.0 has been shifting the web to turn it into an opinion platform. This results in a large amount of raw data that overwhelms human capacity to extract valuable knowledge without assistance of machines. In real world applications, sentiment analysis faces imbalanced data problem. To tackle this problem, sampling techniques have been proposed. In this paper, we focus on studying the performance of these techniques on Imbalanced Data of Arabic Sentiment. We then conduct a comparative evaluation using Support Vector Machine (SVM), Naive Bayes (NB), and Random Forest (RF) as classification algorithms.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116145267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Web OAuth-based SSO Systems Security 基于Web oauth的SSO系统安全性
Yassine Sadqi, Yousra Belfaik, S. Safi
{"title":"Web OAuth-based SSO Systems Security","authors":"Yassine Sadqi, Yousra Belfaik, S. Safi","doi":"10.1145/3386723.3387888","DOIUrl":"https://doi.org/10.1145/3386723.3387888","url":null,"abstract":"In the present digital world, users have to access multiple applications for carrying out their day-to-day business activities. As the amount of apps increase, the number of credentials (e.g. username/password) for each user increases and thereby the possibility of losing or forgetting them also increases. Single Sign-On (SSO) can be used to solve many problems related to web user authentication. OAuth-based SSO Systems are widely deployed by big tech companies such as Facebook and Google. In this paper we provide an in-depth review analysis of OAuth-based SSO systems security issues. In fact, previous efforts have been aimed either at finding errors in specific implementations, or at finding security problems within the specification itself. The main paper contribution is twofold: (1) describe in detail the OAuth 2.0 authorization flows and summarize the differences between the flows of each scenario that affect the security of the OAuth 2.0 protocol, and (2) examine the security problems related to the OAuth 2.0 specification and its implementation in the Web environment.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129864368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Speedy and efficient malwares images classifier using reduced GIST features for a new defense guide 快速和有效的恶意图像分类器使用减少GIST特征为新的防御指南
B. Ikram, Lotfi El Aachak, Boudhir Anouar Abdelhakim, B. Mohammed
{"title":"Speedy and efficient malwares images classifier using reduced GIST features for a new defense guide","authors":"B. Ikram, Lotfi El Aachak, Boudhir Anouar Abdelhakim, B. Mohammed","doi":"10.1145/3386723.3387839","DOIUrl":"https://doi.org/10.1145/3386723.3387839","url":null,"abstract":"Malwares attacks are becoming increasingly destructive. Hackers target all types of devices from big to the most little ones. Researcher's communities in cybersecurity field are working hard to defend malwares attacks as well as any other malicious activity. In fact, the primary goal is to defend cyberattacks as fast as possible to avoid catastrophic damages. In this paper, we proposed new cybersecurity architecture specialized in malwares attacks defense. This proposal puts together four layers based on malwares behaviors. In addition, we perform malware classifier using malware visualization technique, GIST descriptor features and K-Nearest Neighbor algorithm. The classifier is able to put each input malware image into its corresponding family. Families distribution is been divided by malwares behaviors. For the purpose of attaining speedy malwares classifier, we use Univariate Feature Selection technique to reduce GIST feature. So we succeeded in getting from 320 to only 50 features in less timing with very close accuracy of 97,67%.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130363572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fog Computing for Smart Healthcare data Analytics: An Urgent Necessity 用于智能医疗数据分析的雾计算:迫切需要
Hayat Khaloufi, Karim Abouelmehdi, A. B. Hssane
{"title":"Fog Computing for Smart Healthcare data Analytics: An Urgent Necessity","authors":"Hayat Khaloufi, Karim Abouelmehdi, A. B. Hssane","doi":"10.1145/3386723.3387861","DOIUrl":"https://doi.org/10.1145/3386723.3387861","url":null,"abstract":"The advent of Internet of Things (IoT) technologies in the 21st century has led to exciting achievements. IoT smart medical devices along with wearables are generating and communicating high volume and high-velocity of heterogeneous data. Consequently, services provided by traditional methods such as cloud computing to manage these data become insufficient. Fog computing is seen as being the most effective solution for IoT-based healthcare. The stringy demand of this model was principally driven by a growing need for real-time analysis and low latency. It is apparently envisioned that the medicine field expects to draw enormous interest in combining IoT and fog computing. This in turn, improved the patient treatment, staff satisfaction, and operational efficiency and showed positive influence on all aspects of healthcare. This paper has reviewed fog computing in the context of medical IoT while comparing it with cloud computing and has attempted to present the three-layer architecture of fog-based healthcare system containing: edge, fog and cloud. It has also highlighted challenges facing IoT-driven healthcare in an ever-changing world.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125561674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Latest Trends in Recommender Systems applied in the medical domain: A Systematic Review 推荐系统在医学领域应用的最新趋势:系统综述
O. Stitini, S. Kaloun, O. Bencharef
{"title":"Latest Trends in Recommender Systems applied in the medical domain: A Systematic Review","authors":"O. Stitini, S. Kaloun, O. Bencharef","doi":"10.1145/3386723.3387860","DOIUrl":"https://doi.org/10.1145/3386723.3387860","url":null,"abstract":"Recommender systems use algorithms to provide users with product or service recommendations. In recent times, these systems have been using Artificial Intelligence algorithms. However, choosing a suitable AI algorithm for a recommender system is difficult because of the number of algorithms described in the literature. Researchers and practitioners developing recommender systems are left with little information about the current approaches in algorithm usage. Moreover, the development of recommender systems using AI algorithms often faces problems and raises questions that must be resolved. In this context developing recommender system in the medical domain are presented as complementary tools in decision-making processes in healthcare services, it allows to increase the usability of technologies and reduce information overload in processes. This paper presents a systematic review of the literature that analyze the use of AI algorithms in recommender system and identify new research opportunities. The goals of this study are to (i) identify latest trends in the use or research of AI algorithms in recommender system applied in the medical domain;(ii)identify open questions in the use or research of AI algorithms, and (iii)assist new researchers to position new research activity in this domain appropriately.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"19 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120813752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Approach of Constructing an Islamic Pattern Respecting the "HASBA" Method 尊重“HASBA”方法构建伊斯兰模式的途径
Ait Lahcen Yassine, Jali Abdelaziz, El Oirrak Ahmed
{"title":"Approach of Constructing an Islamic Pattern Respecting the \"HASBA\" Method","authors":"Ait Lahcen Yassine, Jali Abdelaziz, El Oirrak Ahmed","doi":"10.1145/3386723.3387872","DOIUrl":"https://doi.org/10.1145/3386723.3387872","url":null,"abstract":"In this article, we put forth an approach to build a geometric Islamic pattern, according to a method called Hasba. This kind of geometric pattern is generally found in Moroccan geometric art, adopted by artisans; it is rather suitable for sculpture and painting on wood. It is based on geometric rules and the concept of symmetry. Here we describe step by step the basic approach to create a new model respecting certain rules of the \"Hasba\" method.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126483886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信