2017 8th International Conference on Information and Communication Systems (ICICS)最新文献

筛选
英文 中文
Automated malicious advertisement detection using VirusTotal, URLVoid, and TrendMicro 自动恶意广告检测使用VirusTotal, URLVoid和趋势科技
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921994
Rima Masri, M. Aldwairi
{"title":"Automated malicious advertisement detection using VirusTotal, URLVoid, and TrendMicro","authors":"Rima Masri, M. Aldwairi","doi":"10.1109/IACS.2017.7921994","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921994","url":null,"abstract":"The Internet economy is based on free access to content in exchange of viewing advertisements that might lead to online purchases. Advertisements represent an important source of revenue to Advertising companies. Those companies employ every possible technique and trick to maximize clicks and visits to advertisers' websites. Modern websites exchange advertisement contents from ads' providers (such as Google AdSense), which means they do not control the contents of those advertisements. Although large providers such as Google and Yahoo! are supposed to be trustworthy, ad arbitration allows them to auction of those ad slots to other providers. Therefore, web administrators cannot guarantee the source of the ads on their delegated website areas. Those advertisements contain Javascript and may redirect to malicious websites which might lead to malicious code being executed or malware being installed. This paper proposes and implements a system for automatically detecting malicious advertisements. It employs three different online malware domain detections systems (VirusTotal, URLVoid, and TrendMicro) for malicious advertisements detection purposes and reports the number of detected malicious advertisements using each system. In addition, we study the efficiency of each system by calculating the confusion matrix and accuracy. We find that URLVoid is the best in terms of accuracy (73%) because it uses a combination of well known website scanners and domain blacklists.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117306694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
A secure hiding scheme for tamper-proofing and authentication of color biometrie templates 一种用于彩色生物特征模板防篡改和认证的安全隐藏方案
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921961
Eyad Ben Tarif, S. Wibowo, S. Wasimi, Afaf Tareef, Abedalraheem Tareaf
{"title":"A secure hiding scheme for tamper-proofing and authentication of color biometrie templates","authors":"Eyad Ben Tarif, S. Wibowo, S. Wasimi, Afaf Tareef, Abedalraheem Tareaf","doi":"10.1109/IACS.2017.7921961","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921961","url":null,"abstract":"With the rapid growth of the biometric-based identification and authentication systems, establishing the integrity and authenticity of biometric data has become a serious research issue. Information hiding has emerged as an efficient way to secure the biometric data during transmission in web-based applications. In this paper, a content authentication and tamper-proofing system is presented to localize and correct the corrupted area in color biometric data. Information hiding based on sparsity theory is utilized to hide a copy of the luminance component of the color biometric image. The proposed scheme has been evaluated using Georgia Technology face database, and the results have demonstrated the reliability and efficiency of the proposed scheme in identifying and restoring the tampered area, even when the biometric image is seriously corrupted.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123627631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security behaviors of healthcare providers using HIT outside of work: A technology threat avoidance perspective 医疗保健提供者在工作之外使用HIT的安全行为:技术威胁避免的视角
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921995
Bahae Samhan
{"title":"Security behaviors of healthcare providers using HIT outside of work: A technology threat avoidance perspective","authors":"Bahae Samhan","doi":"10.1109/IACS.2017.7921995","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921995","url":null,"abstract":"This study empirically tests the model of the Technology Threats Avoidance Theory (TTAT) in a healthcare context to investigate health information technology (HIT) avoidance behaviors when used in unsecure environment. Testing the model in this new context explained avoidance behaviors towards HIT in a holistic way. It is found that the HIT avoidance is predicted by levels of perceived threat, avoidance motivation, perceived effectiveness of the safeguarding measure, perceived cost of the safeguarding measure, and the self-efficacy of using this safeguarding measure. The study also controlled for a number of variables and found that levels of education and age have significant influence on avoidance behavior towards the HIT.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115361241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Spam profile detection in social networks based on public features 基于公共特征的社交网络垃圾信息检测
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921959
Ala’ M. Al-Zoubi, Ja'far Alqatawna, Hossam Paris
{"title":"Spam profile detection in social networks based on public features","authors":"Ala’ M. Al-Zoubi, Ja'far Alqatawna, Hossam Paris","doi":"10.1109/IACS.2017.7921959","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921959","url":null,"abstract":"In the context of Online Social Networks, Spam profiles are not just a source of unwanted ads, but a serious security threat used by online criminals and terrorists for various malicious purposes. Recently, such criminals were able to steal a number of accounts that belong to NatWest bank's customers. Their attack vector was based on spam tweets posted by a Twitter account which looked very close to NatWest customer support account and leaded users to a link of a phishing site. In this study, we investigate the nature of spam profiles in Twitter with a goal to improve social spam detection. Based on a set of publicly available features, we develop spam profiles detection models. At this stage, a dataset of 82 Twitter's profiles are collected and analyzed. With feature engineering, we investigate ten binary and simple features that can be used to classify spam profiles. Moreover, a feature selection process is utilized to identify the most influencing features in the process of detecting spam profiles. For feature selection, two methods are used ReliefF and Information Gain. While for classification, four classification algorithms are applied and compared: Decision Trees, Multilayer Perceptron, k-Nearest neighbors and Naive Bayes. Preliminary experiments in this work show that the promising detection rates can be obtained using such features regardless of the language of the tweets.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114851594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Dealing with decisional natural language why-question in business intelligence 商业智能中决策性自然语言“为什么”问题的处理
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921945
Meriem Amel Guessoum, Rahma Djiroun, K. Boukhalfa
{"title":"Dealing with decisional natural language why-question in business intelligence","authors":"Meriem Amel Guessoum, Rahma Djiroun, K. Boukhalfa","doi":"10.1109/IACS.2017.7921945","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921945","url":null,"abstract":"Business Intelligence aims at providing information to non expert users to make appropriate decisions. To access decisional information, the decision maker should express his/her requirements in Natural Language interfaces instead of technical languages, to avoid IT designer dependency and formal language's unfamiliarity. A Natural Language query is formulated according to several types such as WH-questions as “What, Who, Where, etc.” questions, Keyword-like questions, etc. We focus on “Why-Question” and we present an approach handling this kind of question. We begin by modelling the Why-Question, then we present a mathematical model based on numerical analysis to detect the eventual Why-Questions answers. We propose a tool called Why-Question analyser implementing our approach. A preliminary evaluation is presented.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129649543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Early diagnosis of Alzheimer using mini mental state examination method: MMSE 微型精神状态检查方法早期诊断阿尔茨海默病:MMSE
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921958
Dong Chen, A. Alsadoon, P. Prasad, A. Elchouemi
{"title":"Early diagnosis of Alzheimer using mini mental state examination method: MMSE","authors":"Dong Chen, A. Alsadoon, P. Prasad, A. Elchouemi","doi":"10.1109/IACS.2017.7921958","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921958","url":null,"abstract":"This study aims to analyse the current method in diagnosing early Alzheimer disease and offer a new method to improve the performance of bioinformatics techniques. It proposes a hybrid MRI image processing method to improve the image quality for Alzheimer disease classification. This hybrid method has four stages consisting of image pre-processing, segmentation, feature extraction, and classification. Experimental results using a hybrid image pre-processing method apply on original MRI image data. The study shows that the Mini Mental State Examination (MMSE) method together with the residual intensity non-uniformity method in the SPM machine could make MRI image more effective with high accuracy and sensitive rates. The study shows that a well-designed pre-processing stage could improve the image quality of the subject for final classification. It can help researchers to gain high value of diagnosing early Alzheimer disease by filtering most of the image noise.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124449667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using delay tolerant network for the Internet of Things: Opportunities and challenges 在物联网中使用容延迟网络:机遇与挑战
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921980
Fatima-Zohra Benhamida, A. Bouabdellah, Y. Challal
{"title":"Using delay tolerant network for the Internet of Things: Opportunities and challenges","authors":"Fatima-Zohra Benhamida, A. Bouabdellah, Y. Challal","doi":"10.1109/IACS.2017.7921980","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921980","url":null,"abstract":"Delay Tolerant Network (DTN) is a class of network architectures that address the lack of continuous network connectivity. This issue has been studied for over a decade by promoting new routing protocols. However, recent researches in DTN should rekindle proposed solutions to support new emerging network-based applications, in which DTN techniques can be used to offer delay tolerant support. Example of these applications domains is Internet of Things (IoT). We survey the use of DTN solutions in IoT applications to overcome connectivity problems considering the opportunities and challenges for each technology. The purpose of this work is to introduce most recent solutions that enable delay tolerant IoT. We propose a taxonomy and discuss advantages and limitations for each study.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134412648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Evaluating Jordanian universities' websites based on data envelopment analysis 基于数据包络分析的约旦大学网站评价
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921964
Hassan M. Najadat, A. Al-Badarneh, Rasha K. Al-Huthaifi, Assia Abo-Zaitoon, Yasmin Al-Omary
{"title":"Evaluating Jordanian universities' websites based on data envelopment analysis","authors":"Hassan M. Najadat, A. Al-Badarneh, Rasha K. Al-Huthaifi, Assia Abo-Zaitoon, Yasmin Al-Omary","doi":"10.1109/IACS.2017.7921964","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921964","url":null,"abstract":"Websites of universities have become vital in evaluating universities' performance. These websites may face some weaknesses, including poor design, insecure system, bad performance or usability. There is a limited research work that evaluates the universities' websites performance. In this paper, a new approach is proposed in order to evaluate the Jordanian universities based on data envelopment analysis. The dataset is collected from 23 Jordanian universities' websites by using four tools to extract a set of vital features from each website. We applied data envelopment analysis to provide decision makers of universities a plan to improve the websites. In this paper, the websites' efficiencies are evaluated in three viewpoints including usability, design, and performance. The results of the usability show that 18 websites are usable while 5 websites are not usable, while the results of the design show that only 7 websites have good design. Finally, the websites' performances are classified into efficient or inefficient. The result shows that among 23 universities, there are 4 websites are rated as efficient and 19 sites are rated as inefficient.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115925774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Defense against impersonating attackers: An efficient RFID mutual authentication protocol based on standard 防范假冒攻击者:一种基于标准的高效RFID互认证协议
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921977
Shiqi Wang, Linsen Li, Gaosheng Chen, Tao Chen, Zeming Wang
{"title":"Defense against impersonating attackers: An efficient RFID mutual authentication protocol based on standard","authors":"Shiqi Wang, Linsen Li, Gaosheng Chen, Tao Chen, Zeming Wang","doi":"10.1109/IACS.2017.7921977","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921977","url":null,"abstract":"As the RFID based Internet of Things (loT) gets worldwide attention, to prepare for the rapidly increasing applications in daily life, various security protocols are proposed. But, these protocols, most of which are limited by the tag processing capacity and dangerous exposure during transmission, could only be applied in certain fields. Previously, Chen and Deng's mutual authentication and privacy protection protocol which conforming EPC Class 1 Generation 2 Standards stands out for low cost as well as little requirements of the tag processing capacity. However, currently reported by others, this system faces up with severe dangers of tracking or cloning tags via impersonating attacks. After scrutiny, we found out that these vulnerabilities lie in the insufficient protections of random numbers, and we reconstruct the request and response based on the original protocol by making message unrepeatable, key elements secret and adding small storage for comparisons. The security of our protocol, proved by Ban logic analysis, is ensured by double protections — secret key pairs and dynamic random numbers. Our comparisons show that our protocol not only is safe under traditional attacks guaranteed by the original protocol but also overcomes impersonating attacks which represents the inherent weakness of information exposure in public.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123760539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Gesture recognition implemented on a personal limited device 手势识别实现在个人有限的设备
2017 8th International Conference on Information and Communication Systems (ICICS) Pub Date : 2017-04-01 DOI: 10.1109/IACS.2017.7921966
Benoit Ducray, Sheila Cobourne, K. Mayes, K. Markantonakis
{"title":"Gesture recognition implemented on a personal limited device","authors":"Benoit Ducray, Sheila Cobourne, K. Mayes, K. Markantonakis","doi":"10.1109/IACS.2017.7921966","DOIUrl":"https://doi.org/10.1109/IACS.2017.7921966","url":null,"abstract":"For a biometrics system, one of the principal challenges is to protect the biometric reference template, as if a malicious individual is able to obtain this template, the genuine user would not be able to reuse the biometric for any application. A solution may be to use a new form of authentication based on gesture recognition. This type of authentication has the added advantage that in the case of compromise, the gesture can be changed yet still retain the advantages of the biometric input. In this paper, we investigate whether it is feasible to implement a Gesture Recognition system on a personal limited device such as a smart card. To do this, we set out an experiment using sample gestures based on practical results of gesture authentication trials and an optimised version of Dynamic Time Warping (DTW) algorithm to analyse the data captured. We implemented them on both a contact Smart Card (SC) and the more powerful Samsung Galaxy S4 mobile phone, using Host Card Emulation (HCE). The result of this experiment was that it would take around a minute for the SC and a second for HCE.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130859798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信