2023 International Conference on Computing, Networking and Communications (ICNC)最新文献

筛选
英文 中文
Estimation of Cellular Wireless User Coordinates via Channel Charting and MUSIC 基于信道图和MUSIC的蜂窝无线用户坐标估计
2023 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2023-02-20 DOI: 10.1109/ICNC57223.2023.10074200
Amr Aly, E. Ayanoglu
{"title":"Estimation of Cellular Wireless User Coordinates via Channel Charting and MUSIC","authors":"Amr Aly, E. Ayanoglu","doi":"10.1109/ICNC57223.2023.10074200","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074200","url":null,"abstract":"We present a new way of producing a channel chart for cellular wireless communications in polar coordinates. We estimate the angle of arrival $theta$ and the distance between the base station and the user equipment $rho$ using the MUSIC algorithm and inverse of the root sum squares of channel coefficients (ISQ) or linear regression (LR). We compare this method with the channel charting algorithms principal component analysis (PCA), Samson’s method (SM), and autoencoder (AE). We show that ISQ and LR outperform all three in both performance and complexity. The performance of LR and ISQ are close, with ISQ having less complexity.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126719481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adversarial Technique Validation & Defense Selection Using Attack Graph & ATT&CK Matrix 基于攻击图和攻击与ck矩阵的对抗技术验证与防御选择
2023 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2023-02-20 DOI: 10.1109/ICNC57223.2023.10074241
Md. Ariful Haque, Sachin Shetty, C. Kamhoua, Kimberly Gold
{"title":"Adversarial Technique Validation & Defense Selection Using Attack Graph & ATT&CK Matrix","authors":"Md. Ariful Haque, Sachin Shetty, C. Kamhoua, Kimberly Gold","doi":"10.1109/ICNC57223.2023.10074241","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074241","url":null,"abstract":"Today cyber adversaries utilize advanced techniques to victimize target assets. To tackle the adversaries, it is of utmost importance to understand potential techniques they may use to exploit network vulnerabilities. Attack graph has always been a crucial tool for network vulnerability analysis. However, the current state-of-the-art attack graph can not predict adversarial techniques. To overcome the gap, we utilize the MITRE ATT&CK matrix in this work and map the techniques with the attack graph node descriptions. We first formulate a comprehensive dataset from ATT&CK consisting of all the adversarial strategies, subtechniques, associated tactics, and mitigation for the enterprise network. We then capture the attack graph node descriptions and apply the term frequency-inverse document frequency (TF-IDF) algorithm to map the attack techniques with the available node descriptions. Next, we generate the cosine similarity to determine an adversary’s top methods to attack a network. We then map those techniques with the associated tactics and mitigation strategies as enumerated in the ATT&CK matrix. Finally, we illustrate the analysis using a networked system’s attack graph. This proposed method would help identify and validate adversarial techniques and guide in selecting mitigation mechanisms for security enhancement.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121903431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On an Integrated Security Framework for Defense Against Various DDoS Attacks in SDN SDN中防范各种DDoS攻击的集成安全框架研究
2023 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2023-02-20 DOI: 10.1109/ICNC57223.2023.10074226
Hao Wu, Aiqin Hou, Weike Nie, C. Wu
{"title":"On an Integrated Security Framework for Defense Against Various DDoS Attacks in SDN","authors":"Hao Wu, Aiqin Hou, Weike Nie, C. Wu","doi":"10.1109/ICNC57223.2023.10074226","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074226","url":null,"abstract":"As a new network paradigm, software-defined networking (SDN) technology has been increasingly adopted. Unfortunately, SDN-enabled networks are more prone to threats from DDoS attacks than traditional networks due to the nature of centralized management. We propose an integrated defense framework to detect and mitigate various types of DDoS attacks in SDN-enabled networks. The proposed framework deploys two technical modules in the control plane of SDN for defending against high-rate and low-rate DDoS attacks, respectively. The former module consists of three components, which watch out for suspicious traffic, detect attacks using ensemble learning, and intercept malicious packets, respectively. The latter module is designed specifically to defend against the Slow Ternary Content Addressable Memory (TCAM) exhaustion attack (Slow-TCAM) using a new Alleviative Threat for TCAM (ATFT) algorithm. The proposed framework is implemented and tested in simulated networks using Mininet and further evaluated on the CICDDoS2019 dataset. Experimental results illustrate the superior performance of the proposed framework in defending against different types of DDoS attacks in comparison with other state-of-the-art algorithms.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129579408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using Artificial Intelligence and IoT Solution for Forest Fire Prevention 利用人工智能和物联网解决方案进行森林防火
2023 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2023-02-20 DOI: 10.1109/ICNC57223.2023.10074289
G. Pettorru, M. Fadda, Roberto Girau, M. Sole, M. Anedda, D. Giusto
{"title":"Using Artificial Intelligence and IoT Solution for Forest Fire Prevention","authors":"G. Pettorru, M. Fadda, Roberto Girau, M. Sole, M. Anedda, D. Giusto","doi":"10.1109/ICNC57223.2023.10074289","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074289","url":null,"abstract":"Natural ecosystem conservation is a topical issue that is receiving increasing attention from different branches of the scientific community. Forests and woodlands are major contributors to climate change mitigation, able to absorb significant amounts of carbon dioxide. The conservation of tree areas has been addressed through the adoption of different solutions. This paper proposes a new monitoring system and the use of artificial intelligence (AI) for real-time fire detection. The system is based on intelligent Digital Mobile Radio (DMR) nodes and a Social Internet of Things (SIoT) platform on which AI algorithms have been implemented. The results obtained show the ability to detect the slightest change in observed environmental parameters, determining the direction and speed of fire propagation.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129144276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Localization System Architecture for Enhanced Positioning in Industry 4.0 Applications 工业4.0应用中增强定位的定位系统架构
2023 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2023-02-20 DOI: 10.1109/ICNC57223.2023.10074001
Ramya Vasist, V. Sark, M. Goodarzi, J. Gutiérrez, E. Grass
{"title":"Localization System Architecture for Enhanced Positioning in Industry 4.0 Applications","authors":"Ramya Vasist, V. Sark, M. Goodarzi, J. Gutiérrez, E. Grass","doi":"10.1109/ICNC57223.2023.10074001","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074001","url":null,"abstract":"Indoor localization gained popularity with increased demand for location-based services. There has been a wide range of indoor positioning algorithms across different wireless technologies, albeit with limited accuracy. This work proposes a localization system that enables positioning in a multi-technology environment, including emerging technologies like visible light communication and high-bandwidth technologies like millimeter wave (mmWave). This system provides a common framework for enhanced user positioning, regardless of the underlying technology. The localization system combines the data of different wireless technologies to estimate accurate position information. The localization system architecture is tested in a simulation environment to assess the performance of the individual technologies and a combination of positioning data from multiple technologies. The merging of the position estimates from different wireless access technologies showed a mean positioning error of 10 cm.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121497192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementing Virtual Network Functions in Named Data Networking and Web 3.0 在命名数据网络和Web 3.0中实现虚拟网络功能
2023 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2023-02-20 DOI: 10.1109/ICNC57223.2023.10074018
Puming Fang, T. Wolf
{"title":"Implementing Virtual Network Functions in Named Data Networking and Web 3.0","authors":"Puming Fang, T. Wolf","doi":"10.1109/ICNC57223.2023.10074018","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074018","url":null,"abstract":"Modern networks use Virtual Network Functions (VNFs) to implement processing functions on network traffic, such as content inspection, load balancing, etc. These network functions can be invoked directly by end systems or transparently by network providers to implement local policies. VNFs have been explored extensively for connection-oriented networks, but the use of VNFs for content-centric/information-centric networks is new. Our prior work has shown that network functions can be applied in the context of Named Data Networking (NDN) in principle and that such functionality can provide benefits to implementing network policies. This paper presents results from an actual prototype implementation of Named Data Network Functions (NDNF). Our work discusses implementation considerations and a variety of test scenarios that have been evaluated on the widely used ndnSIM simulator. We show that Named Data Network Functions can be implemented effectively and invoked by end systems or intermediate nodes to enforce network policies transparently. This technique can be applied to the emerging Web 3.0, which can be based on named data information transfers.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125493729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IP Transformation Initiatives to Generate Scalable Functional Verification Collaterals for Smart Reusability and Reduced Effort for Sign-off IP转换计划生成可伸缩的功能验证抵押品,以实现智能可重用性,并减少签字的工作量
2023 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2023-02-20 DOI: 10.1109/ICNC57223.2023.10074542
Surajit Bhattacherjee, D. Pal
{"title":"IP Transformation Initiatives to Generate Scalable Functional Verification Collaterals for Smart Reusability and Reduced Effort for Sign-off","authors":"Surajit Bhattacherjee, D. Pal","doi":"10.1109/ICNC57223.2023.10074542","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074542","url":null,"abstract":"With increasing complexity and focused efforts to achieve feature and functionality loaded digital design, there has been developing a keen interest to invest time on scope and quality of verification since a decade or more. From functional to static evaluation checks, from driving architecturally defined inputs to fuzzy logic through ports, from black-boxed DUT to white-boxed assertion analysis – what not! The dynamics of functional validation have increased to a great extent. The more complex is the design, the more is its functional verification collateral connectivity. It is evident that there are iterative processes during the IP-SoC development cycle as these involve intense human efforts to code and verify the changes. The standard UVM components and objects – sequencer, driver, monitor, scoreboard, transaction item, instantiation and connection for BFMs, additionally, several cross-module references, sequences, checkers, assertions, testcases and regression management, functional coverage and exclusions etc. are required to be replicated for any change in the design configuration of a IP in SoC. The proposed methodology attempts to strategically reduce IP’s verification environment bring up time in the execution cycle and aims at reduced effort towards verification sign-off. It also proposes an ML (Machine Learning) plug-in to extract a standard template out of already available verification collaterals.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125627521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual Curtain: A Communicative Fine-grained Privacy Control Framework for Augmented Reality 虚拟幕:用于增强现实的通信细粒度隐私控制框架
2023 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2023-02-20 DOI: 10.1109/ICNC57223.2023.10074372
Aakash Shrestha, Yantian Hou, Min Long, Jiawei Yuan
{"title":"Virtual Curtain: A Communicative Fine-grained Privacy Control Framework for Augmented Reality","authors":"Aakash Shrestha, Yantian Hou, Min Long, Jiawei Yuan","doi":"10.1109/ICNC57223.2023.10074372","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074372","url":null,"abstract":"The recent advancement of Augmented Reality (AR) technologies increase the risk of inadvertent privacy leakage from the physical world we live in. This work aims to design a new privacy control framework to help users to throttle the privacy leakage caused by the continuous-sensing camera on AR devices. We design our framework to include two parts: (1) a policy enacting part that allows users to conFigure their privacy needs, and (2) a policy enforcement part that executes those policies in real-time camera input streams outsourced to untrusted applications. We implement our system under Google’s ARCore platform with a Samsung S9 device to demonstrate our design. We conduct experiments to evaluate its function effectiveness and performance. Our experiment results reveal several challenges and opportunities for the future study of privacy control of AR systems.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131962545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating Weather Influence on User Participation in a Crowd-sensing Application 在人群感知应用中评估天气对用户参与的影响
2023 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2023-02-20 DOI: 10.1109/ICNC57223.2023.10074590
Iran Ribeiro, Vitor F. Calmon, Thiago H. Silva, Celso A. S. Santos, Vinícius F. S. Mota
{"title":"Evaluating Weather Influence on User Participation in a Crowd-sensing Application","authors":"Iran Ribeiro, Vitor F. Calmon, Thiago H. Silva, Celso A. S. Santos, Vinícius F. S. Mota","doi":"10.1109/ICNC57223.2023.10074590","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074590","url":null,"abstract":"The quality of life for people living in urban centers has become more difficult due to the rapid increase in the urban population. Crowdsensing services can be a helpful tool for improving people’s quality of life by giving public agents valuable data. This work proposes an analysis of traffic issues (events) reported by users of a crowd-sensing app in Vitória-ES, Brazil. The dataset was analyzed concerning the duration of the reported events, monthly variation of events, and the correlation between weather changes and events reported by users. Our findings indicate that the events exhibit an unclear seasonality pattern and may be influenced by climatic factors. We also found positive correlations between weather and events, especially when analyzing months individually. These results can provide new ways of investigation, e.g., new services for forecasting traffic problems.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"150 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130945953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Quantum Machine learning using Quantum Integrated Cloud Architecture (QICA) 基于量子集成云架构(QICA)的混合量子机器学习
2023 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2023-02-20 DOI: 10.1109/ICNC57223.2023.10074394
Samih Fadli, Bharat S. Rawal, Andrew Mentges
{"title":"Hybrid Quantum Machine learning using Quantum Integrated Cloud Architecture (QICA)","authors":"Samih Fadli, Bharat S. Rawal, Andrew Mentges","doi":"10.1109/ICNC57223.2023.10074394","DOIUrl":"https://doi.org/10.1109/ICNC57223.2023.10074394","url":null,"abstract":"Gate-based and Annealing Quantum Computing backend systems purposely built and deployed based on Quantum Integrated Cloud Architecture (QICA) design patterns, provide enhanced quantum computational capabilities that consist of a suite of hybrid quantum-classical cloud-based software and specialized hybrid quantum-classical machine learning algorithms, tools, solvers, and simulators using physics-inspired models and High-Performance Computing circuits simulators. By harnessing the unique properties of quantum mechanics and building on decades of computer science and quantum physics research, our motivation in this paper consists of two folds: (1) to provide an overview of our PATENT-PENDING Quantum Integrated Cloud Architecture (QICA) implemented in support of aerospace programs, fielded and deployed to accelerate the pace of research and commercial enterprise adoption of low-bandwidth satellite networks using nanosatellites in a low orbit. (2) Demonstrate QICA-based computational advantages of Hybrid Quantum-Classical machine learning architecture using IBM Quantum, exploring the base generic quantum neural network (QNN) interfaces provided in Qiskit Machine Learning based on which many agnostic variations of both hybrid classical-quantum and quantum neural networks (QNN) are based on hybrid quantum machine learning.","PeriodicalId":174051,"journal":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124370564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信