Thomas Becmeur, Xavier Boudvin, David Brosset, Gaël Héno, Benjamin Costé, Y. Kermarrec, Pedro Merino Laso
{"title":"Generating data sets as inputs of reference for cyber security issues and industrial control systems","authors":"Thomas Becmeur, Xavier Boudvin, David Brosset, Gaël Héno, Benjamin Costé, Y. Kermarrec, Pedro Merino Laso","doi":"10.1109/RCIS.2017.7956582","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956582","url":null,"abstract":"In this paper, we present a platform we have designed and built in order to generate data and scenario traces that can serve as inputs and references when evaluating our algorithms for detecting cyber security intrusions. Our context is related to civilian and military ships and our research is performed within a strong partnership with industry and academy. As obtaining actual and accurate data sets are not straightforward, we have chosen do generate realistic datasets with a platform we have designed and built.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134625325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Community detection in dynamic graphs with missing edges","authors":"Oualid Benyahia, C. Largeron, Baptiste Jeudy","doi":"10.1109/RCIS.2017.7956562","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956562","url":null,"abstract":"Social networks are usually analyzed and mined without taking into account the presence of missing values. In this article, we consider dynamic networks represented by sequences of graphs that change over time and we study the robustness and the accuracy of the community detection algorithms in presence of missing edges. We assume that the network evolution can provide a complementary information allowing to neutralize the missing data. To confirm our hypothesis, we designed an experimental framework to simulate the missing data and compare the communities identified by the methods, with or without missing links. We explore two types of methods. The first ones, based on tensor decomposition, are adapted for dynamic networks. The second ones correspond to conventional community detection algorithms able to handle simple graphs. In our framework, the latter ones are adapted to dynamic graphs, either by merging the data during the preprocessing step or by merging the partitions during a post-processing step. The experimentation was conducted on synthetic and real dynamic networks for which the ground truth is available. The results confirm the best performances of the methods suited for dynamic networks when they present a complex community structure.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128829020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Alsaffar, Lyn Pemberton, K. Rodriguez-Echavarria, Mithileysh Sathiyanarayanan
{"title":"Visual behaviour in searching information: A preliminary eye tracking study","authors":"Mohammad Alsaffar, Lyn Pemberton, K. Rodriguez-Echavarria, Mithileysh Sathiyanarayanan","doi":"10.1109/RCIS.2017.7956560","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956560","url":null,"abstract":"Human Computer Interaction (HCI) is a discipline that has progressed to establish a smooth understanding between humans and computers for effective visual searchability, accessibility and usability. With a lot of advances in search engine technology, only a few studies have examined how the results are viewed from the perspective of end users from different regions. The main aim of this research is to investigate and explore whether there are cultural variations in visual search behaviour and eye movements on Search Engine Results Page (SERP) between two different cultures (Arabic and English), using the eye-tracking method in order to provide insights for global implementations of search engines. This research also aims to explore to what extent users with a different language and cultural background differ in their visual search behaviour, performance and satisfaction when they are searching SERP with different layout and tasks. As a preliminary study, a controlled eye-tracking experiment was conducted to explore and evaluate the visual search behaviour of Arabs and English when searching through the Google result Pages. The preliminary results provide new insights into the differences in visual search behaviours and eye movements between participants from the Middle East and the United Kingdom.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131153356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LogMap+: Relational data enrichment and linked data resources matching","authors":"Slavko Žitnik, M. Bajec, D. Lavbič","doi":"10.1109/RCIS.2017.7956546","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956546","url":null,"abstract":"Relational database to ontology mapping and ontology matching techniques are mostly addressed separately, even though it is known that the real power of semantic data lies in data interconnection. The latter is especially important when designing a new ontology, which often includes at least some of the concepts that already exist in the linked open data cloud. Thus, in this paper we describe a new end-to-end tool LogMap+ for transformation of relational data into an ontology and matching it against a pre-existent semantic source. Apart from offering the efficient web-based application, the main contributions are the improvements of the domain specific LogMap system. We evaluate our general tool against OAEI 2014 challenge datasets and achieve comparable results to the top performing algorithms and also outperform the domain specific LogMap tool.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"613 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116322651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling Contextualized Flexible Cloud Workflow Services: An MDE based approach","authors":"Yosra Lassoued, S. Nurcan","doi":"10.1109/RCIS.2017.7956516","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956516","url":null,"abstract":"The evolution of the economy, competition, development of new technologies and globalization explain the blooming of inter-organizations cooperation. The interorganizations cooperation represents a new opportunity to answer to complex challenges that a single organization can't face alone. Cloud Computing is an emerging computation paradigm in information technology and networking. Most recently business applications are leveraging the power of this novel technology. In this work, we are interested in the issue of Inter-organizations Cooperation in Cloud Computing environment. More precisely, this paper deals with Contextualized Flexible Cloud Workflow Services (CWS). By CWS, we mean services automating loosely coupled fragments of inter-organization business processes and whose description and execution are accessible through the Cloud. One possible way to deal with CWS modeling in a comprehensive conceptual framework is to use the Model-Driven Engineering. The basic principle of MDE is the separation of organizational concerns from their technical achievement. Therefore, business models are not corrupted by technical concerns and vice versa. Following this practice, we first propose the Cloud Workflow Service Meta-Model (CWS2M) by extending BPMN 2.0 to support the modeling of CWS. In order to deal with variability, evolution and adaptation of CWS, we also propose the Flexible Cloud Workflow Service Meta-Model (FCWS2M) as an extension of the CWS2M meta-model using the versioning technique. Finally, we propose the Contextualized Flexible Cloud Workflow Service Meta-Model (CFCWS2M) to characterize the situations in which CWS versions are executed. We illustrate our solution through the “Drug Development Process” case study.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123921553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sara Bouzit, Gaëlle Calvary, J. Coutaz, D. Chêne, E. Petit, J. Vanderdonckt
{"title":"The PDA-LPA design space for user interface adaptation","authors":"Sara Bouzit, Gaëlle Calvary, J. Coutaz, D. Chêne, E. Petit, J. Vanderdonckt","doi":"10.1109/RCIS.2017.7956559","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956559","url":null,"abstract":"This paper presents a design space for engineering adaptive user interfaces throughout the user interface development life cycle in order to describe any adaptation technique, adaptable or adaptive, to compare two or more techniques, and to generate new, perhaps unprecedented, techniques. Grounded in the theory of psychological perception, this design space structures the adaptation life cycle into two regulation loops between the user and the system: a perception-decision-action (PDA) loop for both the system and the user, and a learning-prediction-adaptation (LPA) for supporting the adaptation, this last being particularly expressive for adaptivity. This PDA-LPA design space enables defining properties for assessing the quality of these loops between the system and the end-user. This design space of is instantiated on two advanced adaptive user interfaces: adaptive user interfaces based on machine learning and adaptive layouts. This design space provides new insights for considering adaptivity design options.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122514352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Sample, T. Watson, Steve E. Hutchinson, B. Hallaq, Jennifer Cowley, C. Maple
{"title":"Data fidelity: Security's soft underbelly","authors":"C. Sample, T. Watson, Steve E. Hutchinson, B. Hallaq, Jennifer Cowley, C. Maple","doi":"10.1109/RCIS.2017.7956552","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956552","url":null,"abstract":"The events of 2016 created a growing concern over the weaponization of information. Weaponized information is actually a symptom of a larger problem, namely, data fidelity. This group of researchers began considering the impact and issues that associate with data fidelity in cyber security. Presently, a fundamental universal assumption existing in cyber security solutions is that the entered data being secured is an accurate, faithful representation of the actual events that are occurring in the real world. This assumption of data fidelity is present in every major cyber security product. This work-in-progress paper acknowledges the data fidelity problem, by providing a model that couples the data object with the environment in an attempt to reduce the potential for weaponized information, thereby improving data fidelity.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128850888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}