{"title":"Protection Mechanism against Software Supply Chain Attacks through Blockchain","authors":"Muhammad Zeeshan Malik, Syed Zain Ali Bukhari","doi":"10.1109/ComTech57708.2023.10164932","DOIUrl":"https://doi.org/10.1109/ComTech57708.2023.10164932","url":null,"abstract":"Software supply chain attack is exceptionally fatal, overwhelmingly rapid, and almost effortless on the part of the attacker. A single compromise or hack can lead to multiple businesses sufferings because suppliers and providers have a vast user network. Protection against software supply chain attacks is being achieved through some outdated concepts like honeytokens and privileged pathway, but an integrated and proper mechanism is still lacking. In recent years, blockchain technology represents a fundamental shift that can replace conventional business models that rely on third parties for trust. This paper proposes a protection mechanism through validity concept with the implementation of blockchain to retain an immutable and trustworthy record of propagating payload (i.e., official update) that is transmitted across the supply chain systems. Blockchain can be used to circumvent these supply chain attacks by keeping a digital log of all propagating information. Each block contains the information regarding validity of propagating data, based on this an official update can be accepted or rejected.","PeriodicalId":203804,"journal":{"name":"2023 International Conference on Communication Technologies (ComTech)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116648614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bi-Directional LSTM-Based Search Engine for Source Code Retrieval","authors":"Nazia Bibi, T. Rana, A. Maqbool","doi":"10.1109/ComTech57708.2023.10165061","DOIUrl":"https://doi.org/10.1109/ComTech57708.2023.10165061","url":null,"abstract":"The code retrieval process looks for the most relevant code fragments. For this purpose, many code-search methods support natural-language queries. But still, there are problems with figuring out the pros and cons of each technique and choosing the best one for the task of code search. The proposed approach employs Word2Vec embedding and Bi- LSTM, a neural network model, to identify query title similarities with the existing dataset to search the code fragment. A novel model named BiD-CSE (Bi-Direction LSTM Code Search Engine) is proposed which generates source code recommendations. The proposed system assists programmers in locating appropriate implementations of sample code based on requirements specified in the query. The evaluation of the proposed framework is performed using three datasets. BiD-CSE collects and analyzes the input query which is then parsed to find the best match in the dataset. BiD-CSE finds the desired code by matching variables, functions, doc-strings, and comments. The BiD-CSE model is implemented using a web-based platform that allows users to enter a query and obtain the top ten most effective results. Evaluation results show that the performance of the model is better than the current baseline approaches.","PeriodicalId":203804,"journal":{"name":"2023 International Conference on Communication Technologies (ComTech)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125420892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electricity Theft Detection Via Deep Learning","authors":"Sehrish Farid, N. Iltaf, H. Afzal","doi":"10.1109/ComTech57708.2023.10164983","DOIUrl":"https://doi.org/10.1109/ComTech57708.2023.10164983","url":null,"abstract":"Electricity theft is a major problem facing many countries around the world. Its adverse effects include loss in revenue for power distribution companies and the government economy, the distribution quality of electricity, increased generation load, and high electricity cost which affects honest consumers as well. With the advancement in smart meters in electricity infrastructure, massive data is generated that can be analyzed for electricity consumers’ consumption patterns. With the help of these consumption patterns of consumers, several machine learning and deep learning models and techniques are built to detect fraudulent consumers. With the help of detection of the theft location and fraud consumers, energy distribution companies can impose fines on these consumers and reduce revenue losses. In this research, a combination of CNN and STN based model is proposed to detect electricity theft. STN is used in many image classification problems along with CNN to enhance the performance of the models. STN along with CNN is used for the first time in electricity theft detection. STN is used to translate, rotate and scale the original input. The dataset used in this research is real customers’ electricity usage data publicly provided by the State Grid Corporation of China (SGCC). SGCC dataset has missing values and also has class imbalance problems. The number of theft users is significantly lower than the number of honest consumers, which is addressed by using the Synthetic Minority Oversampling Technique (SMOTE). State-of-the-art machine learning and deep learning models are compared to the proposed model, and the findings reveal that the suggested model can recognize theft and regular users more accurately.","PeriodicalId":203804,"journal":{"name":"2023 International Conference on Communication Technologies (ComTech)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115345185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Angle Estimation using Weighted Beampattern in Frequency Diverse Array Radar","authors":"Shaiza, Hussain Ali, Sajid Ahmed","doi":"10.1109/ComTech57708.2023.10165115","DOIUrl":"https://doi.org/10.1109/ComTech57708.2023.10165115","url":null,"abstract":"The frequency diverse array (FDA) radar beampattern is a function of angle, time and range. Therefore, it has more potential applications in target localization. The transmit antenna elements weight design for illumination of a target present in a particular direction and range at a particular instance of time is important for target detection with large probability. In non-uniform weighted FDA radar, a desired transmit beampattern is achieved by using non-uniform weights at the transmit antenna elements using the IFFT algorithm. The IFFT algorithm provides a closed-form solution for transmitting antenna weights. The designed transmit beampattern has a large dwell time and has the potential to illuminate any desired angular region. In this work, a signal model is derived for non-uniform weighting and angle estimation is performed using the minimum-power-distortionless response beamformer at the receiver. The Cramer-Rao lower bound (CRLB) for the FDA radar has been derived. We compared the mean-square-error performance of angle estimation with existing approaches and CRLB.","PeriodicalId":203804,"journal":{"name":"2023 International Conference on Communication Technologies (ComTech)","volume":"393 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127720908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiman Sultan, Asif Masood, Shahzaib Tahir, Fawad Khan, Ahmed A. Sultan
{"title":"An ANN-BP based Multi-Alcohol Classification Model Through Different QCM Gas Sensors","authors":"Aiman Sultan, Asif Masood, Shahzaib Tahir, Fawad Khan, Ahmed A. Sultan","doi":"10.1109/ComTech57708.2023.10165110","DOIUrl":"https://doi.org/10.1109/ComTech57708.2023.10165110","url":null,"abstract":"Alcohol content detection provides several advantages and is crucial in research encompassing product and business development. The findings of a sensor’s precise detection cannot be immediately classified; instead, they need to be processed further to identify the proper type of alcohol. A quartz crystal microbalance (QCM) is one among many sensors that can identify various types of alcohol. In order to identify numerous categories of alcohols, this paper presents an ANN-BP based model trained over 5 different datasets of QCM 3, QCM 6, QCM 7, QCM 10, and QCM 12. The ANN-BP model employs keras optimizer, one-hot encoding to display results and is trained via a fixed learning rate. In this article, five different forms of alcohol are used i.e., 1-octanol, 1-propanol, 2-butanol, and 1-isobutanol. The model is run through several epochs of training with a learning rate of 0.01 and the impact of loss and accuracy with respect to the number of epochs is discussed in detail. The performance analysis of the classification of the test set is carried out by plotting the confusion matrix as well as the metrics of precision, recall, accuracy, and f1 score. The model is also trained by alteration of different hyperparameters and analysis is carried out based on their results.","PeriodicalId":203804,"journal":{"name":"2023 International Conference on Communication Technologies (ComTech)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127133203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nigam Naveed, Aiman Sultan, Fawad Khan, Shahzaib Tahir
{"title":"Efficient, Immutable and Privacy Preserving E-Healthcare Systems using Blockchain","authors":"Nigam Naveed, Aiman Sultan, Fawad Khan, Shahzaib Tahir","doi":"10.1109/ComTech57708.2023.10164855","DOIUrl":"https://doi.org/10.1109/ComTech57708.2023.10164855","url":null,"abstract":"Electronic Healthcare Record (EHR) system consists of a patient (or entity acting on behalf of it) sharing his critical medical information with specific people or organizations. Due to the sensitivity of the medical record, a privacy-preserving access control mechanism needs to be in place for building trust among entities including data owner and organizations. Another important metric to be considered is the integrity and accuracy of the outsourced shared medical record. Although existing techniques in the literature tried to address these challenges, however, they are not tolerant of certain types of attacks including collusion, tampering, etc. This research encompasses the proxy re-encryption mechanism and blockchain technology to address the security and privacy concerns of EHR systems. The performance results and security analysis depicts the effectiveness of the scheme to be adopted in practice.","PeriodicalId":203804,"journal":{"name":"2023 International Conference on Communication Technologies (ComTech)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125155532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Javaria Javaid, A. Kiani, Y. Hafeez, N. Iltaf, Fahad Burhan Ahmed, Ghayour Abbas
{"title":"Improving Software Product Line Challenges In Globally Distributed Environment Using Modern Strategies","authors":"Javaria Javaid, A. Kiani, Y. Hafeez, N. Iltaf, Fahad Burhan Ahmed, Ghayour Abbas","doi":"10.1109/ComTech57708.2023.10165120","DOIUrl":"https://doi.org/10.1109/ComTech57708.2023.10165120","url":null,"abstract":"A family of products is created by organisations by reusing some core assets with variations rather than producing new products and versions due to advancement, regularly changing demands, and rapid delivery in the software industry. On the other side, organisations utilised distributed development from all around the world to manage their limited resources. Therefore, creating a software product line in a widely dispersed environment generates several barriers, such as variability and commonality management, coordination, communication, control, etc. for high-quality goods. Therefore, the primary goal of this paper is to employ modern strategies to address all of the aforementioned difficulties. We employed the highly scalable Team Foundation Server (TFS) technology for the software product line in a global setting. Team collaboration, variability management, communication support, and global dispersed core asset management are the most frequently encountered aspects. In order to assess our work, we performed a control experiment. To assess the significance of our findings, we also conducted a reliability study. The results demonstrate that our results are statistically significant and that our proposed approach performs better than the traditional approach. The proposed approach assists in increasing the productivity of families of products for both practitioners and academics working in global software development (GSD).","PeriodicalId":203804,"journal":{"name":"2023 International Conference on Communication Technologies (ComTech)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120938537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zeeshan Mehmood, Aiman Sultan, Fawad Khan, Shahzaib Tahir
{"title":"Machine Learning Based Encrypted Content Type Identification","authors":"Zeeshan Mehmood, Aiman Sultan, Fawad Khan, Shahzaib Tahir","doi":"10.1109/ComTech57708.2023.10164955","DOIUrl":"https://doi.org/10.1109/ComTech57708.2023.10164955","url":null,"abstract":"In the advancing era, Machine Learning has become the backbone of IT and is being used almost in every system. Whereas Cryptography is another widely used technology, which is used for the communication of data via secure means. If the cryptosystems provide indistinguishability, it is considered secure, which means that the attacker cannot get anything from encrypted data, in case of chosen ciphertext attack. To check the feasibility of distinguishability on the ciphertext of secured block ciphers and the identification of the underlying content, this research has applied cryptanalysis on AES-128, CBC, and ECB mode over multiple ML classification models of SVM, KNN, and RF. Datasets were created by using the frequency distribution method, and they were divided into training and testing datasets. The results demonstrate that the EBC mode of AES 128 encryption for different data types is found susceptible to content identification while the accuracy for data encrypted by AES 128 in CBC mode remains low to yield any information regarding its content type.","PeriodicalId":203804,"journal":{"name":"2023 International Conference on Communication Technologies (ComTech)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128324850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Co-Clustering based Hybrid Collaborative Filtering Model","authors":"Aamana, N. Iltaf, H. Afzal, Qurat Ul Ain","doi":"10.1109/ComTech57708.2023.10165021","DOIUrl":"https://doi.org/10.1109/ComTech57708.2023.10165021","url":null,"abstract":"Recommender systems are intellectual systems of information filtering that makes relevant suggestions for customers. Main propose of generating relevant information for customers is to improve their experience. A recommender system which gives fast, accurate recommendations and good experience to users is more attractive and develop more interests in users. As the strength of internet users and items are growing day by day many challenges are faced by recommender systems. One of the challenges is data sparsity. Highly sparse data gives decreased accuracy of predictions. High quality predictions are dependent upon how well the recommender system address its challenges. This research work proposes Collaborative filtering based recommender system technique. Neighbours are determined using dimensionality reduction based Spectral Co-clustering technique. The approach presented is Confidence based weighted fusion method (CBWF) merged with the rating predictions from User based CF (UbCF) and Item based (IbCF). Along with confidence a parameter σ is used. Previously σ was varied based on the datasets. In this research parameter σ is controlled and made dependent upon the correlation characteristics of individual users and items based on their state. Spectral-co-clustering overcomes the sparseness of dataset and limitation of scalability. While fusion of UbCF and IbCF in confidence based weighted sum improves the prediction accuracy of system. Finally predictive evaluation metrics are used to compare results for proposed technique with conventional techniques, one dimensional clustering, two dimensional clustering and HCF techniques to show the improvement that this research work has made.","PeriodicalId":203804,"journal":{"name":"2023 International Conference on Communication Technologies (ComTech)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125894283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Analysis of Implementation of Privacy by Design Principles on different Blockchain platforms","authors":"Muhammad Haroon Alam, Abdul Basit, F. Arif","doi":"10.1109/ComTech57708.2023.10165248","DOIUrl":"https://doi.org/10.1109/ComTech57708.2023.10165248","url":null,"abstract":"Blockchain is a pillar in 4IR (4th Industrial Revolution) of the digital world. Selection of the right blockchain platform, for anonymity, is a challenge that can be overcome while getting acknowledged how anonymous a platform is. Even though privacy is ensured by most of the platforms yet a source to demonstrate which platform is ensuring it at its best is quite an urge and can be fulfilled after formulating the comparative analysis on each one of those platforms under consideration. This paper will provide that required analysis by comparing privacy by design principles on different blockchain platforms. It will be quite helpful for developing decentralized applications where privacy will be provided by design principles.","PeriodicalId":203804,"journal":{"name":"2023 International Conference on Communication Technologies (ComTech)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132016471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}