2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)最新文献

筛选
英文 中文
Implementation and Analysis of USB based Password Stealer using PowerShell in Google Chrome and Mozilla Firefox 基于USB的密码窃取器在b谷歌Chrome和Mozilla Firefox中使用PowerShell实现与分析
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE) Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274566
Abdul Azies Muslim, Avon Budiono, A. Almaarif
{"title":"Implementation and Analysis of USB based Password Stealer using PowerShell in Google Chrome and Mozilla Firefox","authors":"Abdul Azies Muslim, Avon Budiono, A. Almaarif","doi":"10.1109/IC2IE50715.2020.9274566","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274566","url":null,"abstract":"Along with the development of the Windows operating system, browser applications to surf the internet are also growing rapidly. The most widely used browsers today are Google Chrome and Mozilla Firefox. Both browsers have a username and password management feature that makes users login to a website easily, but saving usernames and passwords in the browser is quite dangerous because the stored data can be hacked using brute force attacks or read through a program. One way to get a username and password in the browser is to use a program that can read Google Chrome and Mozilla Firefox login data from the computer’s internal storage and then show those data. In this study, an attack will be carried out by implementing Rubber Ducky using BadUSB to run the ChromePass and PasswordFox program and the PowerShell script using the Arduino Pro Micro Leonardo device as a USB Password Stealer. The results obtained from this study are the username and password on Google Chrome and Mozilla Firefox successfully obtained when the USB is connected to the target device, the average time of the attack is 14 seconds then sending it to the author’s email.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124177835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessment of Information Security Management System: A Case Study of Data Recovery Center in Ministry XYZ 信息安全管理体系评估——以某部数据恢复中心为例
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE) Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274574
Fitri Wijayanti, D. I. Sensuse, A. Putera, Andy Syahrizal
{"title":"Assessment of Information Security Management System: A Case Study of Data Recovery Center in Ministry XYZ","authors":"Fitri Wijayanti, D. I. Sensuse, A. Putera, Andy Syahrizal","doi":"10.1109/IC2IE50715.2020.9274574","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274574","url":null,"abstract":"The DRC of the Ministry XYZ has suffered from a system breach. The DRC's problem will lead to a lack of system information security, availability, and an increasing threat to the whole system of Ministry XYZ. In 2019, the KAMI Index assessment of the Ministry XYZ stated that the level of maturity and completeness of the application of ISO 27001 standards of the XYZ Ministry were at the level of fulfillment of the basic framework. There is a gap between the assessment result and the operational problem within the DRC of Ministry XYZ due to the lack of an information security management system. Therefore, this study conducts the same KAMI Index assessment within the scope of the DRC only and aims to offer a recommendation based on ISO 27001 as the basis of the KAMI Index assessment. This study used discussion, observation, and KAMI Index assessment tools for collecting data and analyze the result. The assessment result of the DRC showed that the maturity level of the ISO 27001 standard on the DRC is on the application of the basic framework. The suggested recommendations to improve the information security management system of the DRC were mostly in the aspect of the information security framework and assets management.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"115 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128394159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accidental Prone Area Detection in Bangladesh using Machine Learning Model 使用机器学习模型检测孟加拉国的意外易发区域
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE) Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274581
Khan Md Hasib, Md. Imran Hossain Showrov, Anik Das
{"title":"Accidental Prone Area Detection in Bangladesh using Machine Learning Model","authors":"Khan Md Hasib, Md. Imran Hossain Showrov, Anik Das","doi":"10.1109/IC2IE50715.2020.9274581","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274581","url":null,"abstract":"Nowadays road accident in Bangladesh is a buzzword due to its lack of carefulness of the driver of the vehicle where some parameter exists. The traffic safety of the roadway is an essential concern not only for transportation governing agencies but also for citizens of our country. For safe driving suggestions, the important thing is to find the variables that are tensed to relate to the fatal accidents that are occurring often. In this paper, we create a model using a machine learning approach on the countrywide traffic accident dataset of Bangladesh as an aim to address this problem. The model also helps out to find the diversity of the data by grouping similar objects together to find the accident-prone areas in the country concerning different accident factors as well as detects the cooperation between these factors and causalities.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133749986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Time-Series Outliers Detection Algorithm with Clustering Approach on Non-Linear Trends 非线性趋势聚类方法的时间序列异常点检测算法
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE) Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274644
H. Widiputra, Adele Mailangkay, Elliana Gautama
{"title":"Time-Series Outliers Detection Algorithm with Clustering Approach on Non-Linear Trends","authors":"H. Widiputra, Adele Mailangkay, Elliana Gautama","doi":"10.1109/IC2IE50715.2020.9274644","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274644","url":null,"abstract":"It has been found that the existence of outliers, particularly in time-series data, can be significantly influenced the modelling and analysis results that are conducted on the data, which is further may lead to improper decision making. Nevertheless, the task of time-series outlier detection can be quite challenging when dealing with collection of data that retain non-linear trends over time as the progression of series may shifted and would be infer as possible outliers. In this study, an algorithm for time-series outlier detection that makes use of a clustering approach on time-series data to construct a set of localized trend models that is capable to identify anomalous data in a collection of non-linear trends is proposed. Decisively, results from conducted experiments confirm that the procedure performs prompt, incremental valuation of information as soon as it becomes accessible, able to handle significant amount of data, and does not need any pre-classification of anomalies. Furthermore, trials with real-world data from insurance field confirm that the proposed method is able to correctly identify abnormal data and can be of help to increase decision making process.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115081894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IC2IE 2020 TOC
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE) Pub Date : 2020-09-15 DOI: 10.1109/ic2ie50715.2020.9274611
{"title":"IC2IE 2020 TOC","authors":"","doi":"10.1109/ic2ie50715.2020.9274611","DOIUrl":"https://doi.org/10.1109/ic2ie50715.2020.9274611","url":null,"abstract":"","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114478850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Urban Area Change Detection with Combining CNN and RNN from Sentinel-2 Multispectral Remote Sensing Data 基于CNN和RNN的Sentinel-2多光谱遥感城市面积变化检测
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE) Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274617
Uus Khusni, H. I. Dewangkoro, A. M. Arymurthy
{"title":"Urban Area Change Detection with Combining CNN and RNN from Sentinel-2 Multispectral Remote Sensing Data","authors":"Uus Khusni, H. I. Dewangkoro, A. M. Arymurthy","doi":"10.1109/IC2IE50715.2020.9274617","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274617","url":null,"abstract":"Change detection is one of the hot issues related to world observation and has been extensively studied in recent decades. The application of remote sensing technology provides inputs to systems for urban change detection primarily focus on the urban data user environment. Urban change detection refers to the general problem of monitoring the urban system and discerning changes that are occurring within that system that use to urban planners, managers, and researchers. Current methods based on a simple mechanism for independently encoding bi-temporal images to get their representation vectors. In fact, these methods do not make full use of the rich information between bi-temporal images. We propose to combine deep learning methods such as Convolutional Neural Network (U-Net) for feature extraction and Recurrent Neural Network (BiLSTM) temporal modeling. Our developed model while the validation phase gets 97.418% overall accuracy on the Onera Satellite Change Detection (OSCD) Sentinel-2 bi-temporal dataset.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117123481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Speech Emotion Identification Using Linear Predictive Coding and Recurrent Neural 基于线性预测编码和递归神经网络的语音情绪识别
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE) Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274629
Muhammad Yusup Zakaria, E. C. Djamal, Fikri Nugraha, Fatan Kasyidi
{"title":"Speech Emotion Identification Using Linear Predictive Coding and Recurrent Neural","authors":"Muhammad Yusup Zakaria, E. C. Djamal, Fikri Nugraha, Fatan Kasyidi","doi":"10.1109/IC2IE50715.2020.9274629","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274629","url":null,"abstract":"Social, affective communication in recent years shows significant developments, especially in the verbal understanding of emotions. Human connection naturally adjusts to their responses based on the actions of their interlocutor in a particular matter. Previous research has shown that the use of neural network architecture can identify emotions based on speech, but the results of accuracy are not good due to the imbalance of data and problems with the design of the classification system. This study uses Linear Predictive Coding (LPC). LPC can represent the pronunciation of one’s dialogue. From 16 coefficient LPC is used as a vector feature as input for voice emotion identification using Recurrent Neural Network (RNN). Long Short Term Memory (LSTM) or Gated Recurrent Unit (GRU) architecture is used to overcome vanishing or exploding gradient. At the identification stage, that uses forward propagation with a softmax activation function. We have conducted a simulation using RNN as a method for making emotional identification. The results of this study RNNGRU using Adam optimization model with a learning rate of 0.001 get an accuracy of 90.93% and a losses value of 0.216. In comparison, the RNN-LSTM got an accuracy of 87.50% and losses value of 0.262. The experimental results show that the best model is achieved when using the RNN-GRU with the Adam optimization method. The F-Measure value obtained is 0.91.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123687488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovative Design of Internet of Things LoRa to Determine Radio Refractivity in Real-Time 物联网LoRa实时确定无线电折射率的创新设计
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE) Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274626
Kevin Fitzgerald Senewe, M. Suryanegara
{"title":"Innovative Design of Internet of Things LoRa to Determine Radio Refractivity in Real-Time","authors":"Kevin Fitzgerald Senewe, M. Suryanegara","doi":"10.1109/IC2IE50715.2020.9274626","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274626","url":null,"abstract":"This paper aims to propose an Internet of Things (IoT)LoRa based system that determines radio refractivity in real-time. Our system consists of temperature and humidity sensor, LoRa gateway, LoRa shield, and Arduino UNO. ThingSpeak IoT platform is used to aggregate, visualize, and analyze live data streams using a numerical computing platform in the cloud. Real-time radio refractivity measurements will help network engineers when designing communication systems because the data obtained by this system are data specifically for that location, not the overall area. We have conducted the testing of our system for two days in the city of Sawangan, Indonesia and it succeded in obtaining real-time refractivity data.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126505737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interactive Augmented Reality For The Depth Of An Object Using The Model-Based Occlusion Method 使用基于模型的遮挡方法实现对象深度的交互式增强现实
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE) Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274565
Tonny Hidayat, Ika Asti Astuti
{"title":"Interactive Augmented Reality For The Depth Of An Object Using The Model-Based Occlusion Method","authors":"Tonny Hidayat, Ika Asti Astuti","doi":"10.1109/IC2IE50715.2020.9274565","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274565","url":null,"abstract":"The general concept in marker-based Augmented Reality is to add virtual objects in the real world using markers as object tracking. In its development AR devices can detect 3D real objects as object tracking (3D Object Tracking) so as to allow interaction between virtual objects and real objects. However, the application of AR for general devices such as Android smartphones that do not have depth sensors, virtual objects are added without having depth information from the real world so that virtual content is always displayed in front of or on top of real objects and causes Occlusion problems. Occlusion refers to the problem when real objects that are closer to the user are covered by more distant virtual objects. This research formulates the handling of the Occlusion problem using the Model-Based Occlusion method in which the geometry information of the model from real objects must be known and registered in advance to the system. To maintain the suitability of the model’s geometry information with its real object, Tracking is needed. In this case using 3D Object Tracking by utilizing real objects that have been registered in the ModelBased Occlusion. The results of this study are the virtual objects that appear can occupy the correct position in the Augmented Reality application. In this case using 3D Object Tracking by utilizing real objects that have been registered in the ModelBased Occlusion. The results of this study are the virtual objects that appear can occupy the correct position in the Augmented Reality application. In this case using 3D Object Tracking by utilizing real objects that have been registered in the ModelBased Occlusion. The results of this study are the virtual objects that appear can occupy the correct position in the Augmented Reality application.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130008803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IC2IE 2020 List Reviewer Page IC2IE 2020列表审查页面
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE) Pub Date : 2020-09-15 DOI: 10.1109/ic2ie50715.2020.9274584
{"title":"IC2IE 2020 List Reviewer Page","authors":"","doi":"10.1109/ic2ie50715.2020.9274584","DOIUrl":"https://doi.org/10.1109/ic2ie50715.2020.9274584","url":null,"abstract":"","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127674190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信