2019 IEEE International Conference on Intelligence and Security Informatics (ISI)最新文献

筛选
英文 中文
Securing Machine Learning Engines in IoT Applications with Attribute-Based Encryption 使用基于属性的加密保护物联网应用中的机器学习引擎
2019 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2019-07-01 DOI: 10.1109/ISI.2019.8823199
Agus Kurniawan, M. Kyas
{"title":"Securing Machine Learning Engines in IoT Applications with Attribute-Based Encryption","authors":"Agus Kurniawan, M. Kyas","doi":"10.1109/ISI.2019.8823199","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823199","url":null,"abstract":"Machine learning has been adopted widely to perform prediction and classification. Implementing machine learning increases security risks when computation process involves sensitive data on training and testing computations. We present a proposed system to protect machine learning engines in IoT environment without modifying internal machine learning architecture. Our proposed system is designed for passwordless and eliminated the third-party in executing machine learning transactions. To evaluate our a proposed system, we conduct experimental with machine learning transactions on IoT board and measure computation time each transaction. The experimental results show that our proposed system can address security issues on machine learning computation with low time consumption.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114987401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ISI 2019 Author Index ISI 2019作者索引
2019 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2019-07-01 DOI: 10.1109/isi.2019.8823197
{"title":"ISI 2019 Author Index","authors":"","doi":"10.1109/isi.2019.8823197","DOIUrl":"https://doi.org/10.1109/isi.2019.8823197","url":null,"abstract":"","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116065475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Security and Data Governance Roles and Responsibilities at the C-Level and the Board c级和董事会的网络安全和数据治理角色和职责
2019 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2019-07-01 DOI: 10.1109/ISI.2019.8823534
B. Thuraisingham
{"title":"Cyber Security and Data Governance Roles and Responsibilities at the C-Level and the Board","authors":"B. Thuraisingham","doi":"10.1109/ISI.2019.8823534","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823534","url":null,"abstract":"Corporate governance and the roles and responsibilities of the corporate officers and the board of directors have received an increasing interest since the Enron scandal of the early 2000s. This scandal resulted in enacting policies, laws and regulations such as the Sarbanes-Oxley and others. More recently, the near daily cyber security attacks on the infrastructures and data assets of corporations have resulted in cyber security professionals taking a serious look at the roles and responsibilities of the corporate officers and the board with respect to cyber security and data governance. This paper discusses the issues and challenges for cyber security governance with an emphasis on data governance and the potential roles and responsibilities of the corporate officers and the board of directors.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129201622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Capturing Deep Dynamic Information for Mapping Users across Social Networks 捕获深度动态信息映射用户跨社交网络
2019 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2019-07-01 DOI: 10.1109/ISI.2019.8823341
C. Cai, Linjing Li, Weiyun Chen, D. Zeng
{"title":"Capturing Deep Dynamic Information for Mapping Users across Social Networks","authors":"C. Cai, Linjing Li, Weiyun Chen, D. Zeng","doi":"10.1109/ISI.2019.8823341","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823341","url":null,"abstract":"Nowadays, it is common that a netizen creates multiple accounts across social platforms. Mapping accounts across platforms could facilitate various applications in security. Existing methods usually focus on profile and network based features. In this paper, we concentrate on capturing dynamic information of social users and present a deep dynamic user mapping model to identify the accounts across platforms. The proposed model captures dynamic latent features from three aspects including posting pattern, writing pattern, and emotional fluctuation. We also develop a matching network that fuses dynamic and traditional features to identify accounts. To the best knowledge of ourselves, this is the first trial that applies deep neural network in mapping users with dynamic information. Experiments on real world dataset demonstrated the effectiveness of the proposed method.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123730545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
User Preferences and Situational Needs of Mobile User Authentication Methods 移动用户认证方法的用户偏好和情境需求
2019 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2019-07-01 DOI: 10.1109/ISI.2019.8823274
Kanlun Wang, Lina Zhou, Dongsong Zhang
{"title":"User Preferences and Situational Needs of Mobile User Authentication Methods","authors":"Kanlun Wang, Lina Zhou, Dongsong Zhang","doi":"10.1109/ISI.2019.8823274","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823274","url":null,"abstract":"As it becomes commonplace to use mobile devices to store personal and sensitive data, mobile user authentication (MUA) methods have witnessed significant advancement to improve data and device security. On the other hand, traditional MUA methods such as password (or passcode) are still being widely deployed. Despite the growing body of knowledge on technical strengths and security vulnerabilities of various MUA methods, the perception of mobile users may be different, which can play a decisive role in MUA adoption. Additionally, user preferences for MUA methods may be subject to the influence of their demographic factors and device types. Furthermore, the pervasive use of mobile devices has generated many situations that create new usability and security needs of MUA methods such as support of one-handed and/or sight-free interaction. This study investigates user perception and situational needs of MUA methods using a survey questionnaire. The research findings can guide the design and selection of MUA methods.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114821719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient Adversarial Chaff Generation for Challenge-Response Authentication Over Unsecure Networks with an Application to Civilian Radio Networks 不安全网络挑战-响应认证的高效对抗性箔条生成及其在民用无线网络中的应用
2019 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2019-07-01 DOI: 10.1109/ISI.2019.8823381
B. Kitts, Andrew Potter
{"title":"Efficient Adversarial Chaff Generation for Challenge-Response Authentication Over Unsecure Networks with an Application to Civilian Radio Networks","authors":"B. Kitts, Andrew Potter","doi":"10.1109/ISI.2019.8823381","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823381","url":null,"abstract":"Challenge Response is one of the cornerstones of online security. The simplest form of Challenge-Response is asking for a password. Much cryptographic work has focused on developing strong forms of encryption, however some networks require transmission over networks which might be monitored. We discuss this problem in the context of a particular kind of open network used by 30,000 users, and which is an important medium supporting emergency services. The current challenge-response implementation on this network relies upon sending information about the password. We calculate the number of observations needed to capture password using brute force attack, replay attack, and version spaces. We show that even strong passwords (completely random set of characters) are at significant risk of discovery in as few as 16 login attempts. We next present an algorithm that adds adversarial “chaff” to the password information designed to minimize relative information gain during challenge-response. We show that, with enough adversarial chaff, unambiguous password recovery from passive data capture may not be possible, although passwords can still be recovered by an attacker actively probing the system. Despite this, better protection of passwords is useful, and would be immediately helpful to people using these services.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127891558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building Terrorist Knowledge Graph from Global Terrorism Database and Wikipedia 从全球恐怖主义数据库和维基百科构建恐怖分子知识图谱
2019 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2019-07-01 DOI: 10.1109/ISI.2019.8823450
Tian Xia, Yijun Gu
{"title":"Building Terrorist Knowledge Graph from Global Terrorism Database and Wikipedia","authors":"Tian Xia, Yijun Gu","doi":"10.1109/ISI.2019.8823450","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823450","url":null,"abstract":"The Global Terrorism Database (GTD) is the most important dataset in counter-terrorism domain. Existed studies based on GTD focused on terrorism influences, data statistics and visualization, and terrorism event mining such as classification and clustering. In this paper, we build a terrorism knowledge graph(TKG) from GTD and Wikipedia. Compared with GTD, TKG enhaced the organizations of terrorism entities and relationships, and enriched the description by attatching Wikipedia knowledges. Therefore, TKG can better the understanding of terrorism attacks for both human beings and machine processing like graph mining and knowledge reasoning.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127428914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Massive Meme Identification and Popularity Analysis in Geopolitics 地缘政治中的海量模因识别与流行分析
2019 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2019-07-01 DOI: 10.1109/ISI.2019.8823294
Saike He, Hongtao Yang, Xiaolong Zheng, Bo Wang, Yujun Zhou, Yanjun Xiong, D. Zeng
{"title":"Massive Meme Identification and Popularity Analysis in Geopolitics","authors":"Saike He, Hongtao Yang, Xiaolong Zheng, Bo Wang, Yujun Zhou, Yanjun Xiong, D. Zeng","doi":"10.1109/ISI.2019.8823294","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823294","url":null,"abstract":"Geopolitics is a long-lasting key issue for governments and nations to assess the international political landscape. The great proliferation of social media in recently years have provided a new avenue to make such political actions in a data driven manner. As the information consumption ability of human is limited, there demands an automatic approach to effectively identify and trace the bursts continuously emerging on social media platforms. Existing studies focusing on named entities recognition or topic detection could provide useful insights for analyzing events that are already known, yet they are incapable of identifying timely emerging trending catchphrase or topics, or memes in general.To tackle with this issue, we elaborate a framework to identify online memes and trace their future dynamics. This framework identify memes based on their independency with regard to the context, and aggregate literal variants of a same meme together into a memeplex with a newly proposed MemeMesh algorithm. Evaluation results on a large scale Twitter dataset suggest that the framework could identify geopolitical memes effectively. Further exploration on meme popularity factors reveals that popularity memes tend to generate more variants during their diffusion, and establish their dominance by attracting a large volume of active users engaging in their diffusion. Causality analysis between meme diversity and user volume suggests that high diversity of meme variants can attract more users involved in spreading a meme at the initial, but these users seldom regenerate more variants in the later time.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122091160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Insider Threat Detection Based on Adaptive Optimization DBN by Grid Search 基于网格搜索自适应优化DBN的内部威胁检测
2019 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2019-07-01 DOI: 10.1109/ISI.2019.8823459
Jiange Zhang, Yue Chen, Kuiwu Yang, Jian Zhao, Xincheng Yan
{"title":"Insider Threat Detection Based on Adaptive Optimization DBN by Grid Search","authors":"Jiange Zhang, Yue Chen, Kuiwu Yang, Jian Zhao, Xincheng Yan","doi":"10.1109/ISI.2019.8823459","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823459","url":null,"abstract":"Aiming at the problem that one-dimensional parameter optimization in insider threat detection using deep learning will lead to unsatisfactory overall performance of the model, an insider threat detection method based on adaptive optimization DBN by grid search is designed. This method adaptively optimizes the learning rate and the network structure which form the two-dimensional grid, and adaptively selects a set of optimization parameters for threat detection, which optimizes the overall performance of the deep learning model. The experimental results show that the method has good adaptability. The learning rate of the deep belief net is optimized to 0.6, the network structure is optimized to 6 layers, and the threat detection rate is increased to 98.794%. The training efficiency and the threat detection rate of the deep belief net are improved.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125052499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dark-Net Ecosystem Cyber-Threat Intelligence (CTI) Tool 暗网生态系统网络威胁情报(CTI)工具
2019 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2019-07-01 DOI: 10.1109/ISI.2019.8823501
N. Arnold, Mohammadreza Ebrahimi, Ning Zhang, Ben Lazarine, Mark W. Patton, Hsinchun Chen, S. Samtani
{"title":"Dark-Net Ecosystem Cyber-Threat Intelligence (CTI) Tool","authors":"N. Arnold, Mohammadreza Ebrahimi, Ning Zhang, Ben Lazarine, Mark W. Patton, Hsinchun Chen, S. Samtani","doi":"10.1109/ISI.2019.8823501","DOIUrl":"https://doi.org/10.1109/ISI.2019.8823501","url":null,"abstract":"The frequency and costs of cyber-attacks are increasing each year. By the end of 2019, the total cost of data breaches is expected to reach $2.1 trillion through the ever-growing online presence of enterprises and their consumers. The tools to perform these attacks and the breached data can often be purchased within the Dark-net. Many of the threat actors within this realm use its various platforms to broker, discuss, and strategize these cyber-threat assets. To combat these attacks, researchers are developing Cyber-Threat Intelligence (CTI) tools to proactively monitor the ever-growing online hacker community. This paper will detail the creation and use of a CTI tool that leverages a social network to identify cyber-threats across major Dark-net data sources. Through this network, emerging threats can be quickly identified so proactive or reactive security measures can be implemented.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129102054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信