2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)最新文献

筛选
英文 中文
CyberSecurity: A Review of Internet of Things (IoT) Security Issues, Challenges and Techniques 网络安全:物联网(IoT)安全问题、挑战和技术综述
Aishah Abdullah, Reem Hamad, Mada Abdulrahman, Hanan Moala, Salim Elkhediri
{"title":"CyberSecurity: A Review of Internet of Things (IoT) Security Issues, Challenges and Techniques","authors":"Aishah Abdullah, Reem Hamad, Mada Abdulrahman, Hanan Moala, Salim Elkhediri","doi":"10.1109/CAIS.2019.8769560","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769560","url":null,"abstract":"The network revolution is becoming bigger and more complex and data need to be secured against cybercrimes. Cybercrimes caused the loss of billions of dollars affecting the global economy, with the intention to maliciously affect critical and confidential information. With the presence of these crimes committed on a daily basis, the security of the cyberspace has become an urgent reaction to reduce and possibly avoid the effect of cybercrimes. Nowadays, the internet of things (IoT) revolution is becoming the focus of research, and both security and privacy are recognized as the main issues for IoT applications, mainly because of its implementation in critical areas, such as healthcare systems. In this paper, the cybersecurity state in IoT domain along with its security challenges are discussed, also we address some security requirements and techniques to overcome these challenges. Finally, blockchain technology is discussed as a recommended solution to support IoT security.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"63 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128017224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Link Aware High Data Transmission Approach for Internet of Vehicles 基于链路感知的车联网高速数据传输方法
K. Qureshi, F. Bashir, Najam Ul Islam
{"title":"Link Aware High Data Transmission Approach for Internet of Vehicles","authors":"K. Qureshi, F. Bashir, Najam Ul Islam","doi":"10.1109/CAIS.2019.8769538","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769538","url":null,"abstract":"New ubiquitous and advanced communication technologies enabled the Internet of connected Vehicles (IoV). These networks offered data transmission among vehicle nodes for road safety and infotainment services. Various infotainment applications need high data transmission, video streaming and internet services. High data rate oriented data delivery or data transmission is based on parallel paths selection and small frames architecture. Dynamic topologies, high velocity of vehicle nodes, multipath interference obstacles increase the data collision and failure in the network. This paper proposes a Link Aware High Data Transmission (LHT) approach for high data transmission applications. The proposed approach is based on signal strength and bandwidth evaluation for next node selection methods and statistics of vehicle nodes. Simulations are performed to evaluate the performance of proposed approach and compared with existing approaches. The evaluation of the proposed approach shows the better performance and improvement considering various high data streaming related performance metrics.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124002394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Deep Classification Technique for Density Counting 密度计数的深度分类技术
Suheer Al-Hadhrami, Sara Altuwaijri, Norah Alkharashi, R. Ouni
{"title":"Deep Classification Technique for Density Counting","authors":"Suheer Al-Hadhrami, Sara Altuwaijri, Norah Alkharashi, R. Ouni","doi":"10.1109/CAIS.2019.8769489","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769489","url":null,"abstract":"Crowd counting, resulted from extensive analysis, is reflected by many aspects such as appearance similarity between people, background components and the inter-blocking in intense crowds. Current research is challenging these aspects by applying different types of architectures. In this paper, we propose a single conventional neural network for density counting based on four conventional layers. A comparison of our proposed network with Switched Conventional Neural Networks (Switch-CNN) approaches has been performed in order to evaluate its performance in terms of accuracy and loss. As a result, several experiments prove the effectiveness and efficiency of the proposed method. We got 94.6% and 0.2625 for both accuracy and loss respectively.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"6 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120818328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Sentiment Analysis Of English Tweets: A Comparative Study of Supervised and Unsupervised Approaches 英语推文情感分析:监督与非监督方法的比较研究
Suheer Al-Hadhrami, Norah Al-Fassam, Hafida Benhidour
{"title":"Sentiment Analysis Of English Tweets: A Comparative Study of Supervised and Unsupervised Approaches","authors":"Suheer Al-Hadhrami, Norah Al-Fassam, Hafida Benhidour","doi":"10.1109/CAIS.2019.8769550","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769550","url":null,"abstract":"Currently, social networks have become the core of internet daily usage. Their popularity is increasing among the public users every day. Therefore, they can be considered as the main resource for gathering people's opinions and sentiments towards different topics. In this study, a comparison of three different machine learning algorithms used for sentiment analysis: Support Victor Machine, Random Forest Classification and K-mean Clustering is conducted. Unigrams and bigrams are used as features for all approaches. The results show that Support Vector Machine outperforms the other approaches.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132102440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Improving an Identity Authentication Management Protocol in IIoT 改进工业物联网中的身份认证管理协议
Asayel AlAbdullatif, Kholood AlAjaji, N. Al-Serhani, Rachid Zagrouba, Maryam M. Aldossary
{"title":"Improving an Identity Authentication Management Protocol in IIoT","authors":"Asayel AlAbdullatif, Kholood AlAjaji, N. Al-Serhani, Rachid Zagrouba, Maryam M. Aldossary","doi":"10.1109/CAIS.2019.8769499","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769499","url":null,"abstract":"The Internet of Things (IoT) is where almost anything can be controlled and managed remotely. Although the IoT evolution led to quality of life enhancement, many of its devices are insecure. The lack of robust key management systems, efficient identity authentication, low fault tolerance, and many other issues lead IoT devices into being easily targeted by attackers. The aim of this research is to enhance an authentication protocol that helps in the authentication process of IoT devices and CPANs (Personal Area Network Coordinators) in an Industrial Internet of Things (IIoT) environment. To propose a solution for this issue, and to find out the optimal contribution, a comparison and analysis on the current IoT security solutions have been conducted. Based on the analysis, it is found that the superior solution was a Blockchain-based solution called BCTrust. In this paper, the aim is to improve the basis authentication protocol adopted by BCTrust. The protocol is to be improved mainly by two sides, firstly, eliminating the blacklisting mechanism that can be leveraged by attackers to negatively impact the network. Secondly, introducing a new way for generating the identifiers of the IIoT devices. This would enhance the security and efficiency of BCTrust, specifically in the generation of IIoT secret keys.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130851977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Benefits of Artificial Intelligence in Medicine 人工智能在医学上的益处
Samira Yeasmin
{"title":"Benefits of Artificial Intelligence in Medicine","authors":"Samira Yeasmin","doi":"10.1109/CAIS.2019.8769557","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769557","url":null,"abstract":"Artificial intelligence is one of the most discussed topics of the present time. The burning question of today about artificial intelligence is “will it be beneficial or dangerous for a human being”. This research paper analyzes the benefits of artificial intelligence in medicine. It examines how artificial intelligence assists the medical field as well as how patient's health is affected using this popular phenomenon in diagnosing diseases, patient's treatment, reducing errors, and virtually being present with the patients. Finally, the paper reveals how artificial intelligence may have an impact on medical science. A survey was conducted to learn about people's perspective towards artificial intelligence in medicine and the results are shared in the paper.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128611217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Smart Parking System for Monitoring Cars and Wrong Parking 监控车辆和错误停车的智能停车系统
Faris Alshehri, A. Almawgani, Ayed Alqahtani, Abdurahman Alqahtani
{"title":"Smart Parking System for Monitoring Cars and Wrong Parking","authors":"Faris Alshehri, A. Almawgani, Ayed Alqahtani, Abdurahman Alqahtani","doi":"10.1109/CAIS.2019.8769463","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769463","url":null,"abstract":"The parking problems are so many in this time because many people own cars are increasing and Lack of space, there are many solutions for some issues, but some of these solutions still have issues, such as cost it is a big problem and the numbers of sensors in one park. This paper proposes a simple method of smart parking system that monitoring cars and wrong parking. We are sing skills to deal with some small pieces such as Arduino, Ultrasonic sensor, PIR motion sensor and Nexion display to display the results. The primary goal of this paper to solve one of the problems that a lot of people suffered the wrong parking, by making the parking smart and with it we will reach the ideal efficiency without the high cost or many sensors in one park. The smart parking system takes a signal from three Ultrasonic sensors in a Moving Arduino, the Moving Arduino analysis the signal and Convert the signal to code, then send the code by using a wireless radio frequency to the Fixed Arduino. The Fixed Arduino will display it using Nextion display touch screen telling us the results. If any problem on the parking car like wrong park the display will show us a green car and red line, a vacant park will be a black car and correctly park will be a green car. After making the prototype and testing the model we find that the result is 95% correctly with 5% mistake because the model and the objectives was small in our point of view.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126536933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Factors that Influence the Adoption of Information Security on Requirement Phase for Custom-Made Software at SMEs 中小企业在定制软件需求阶段采用信息安全的影响因素
Fatimah Alghamdi, Nermin Hamza, Moutasm Tamimi
{"title":"Factors that Influence the Adoption of Information Security on Requirement Phase for Custom-Made Software at SMEs","authors":"Fatimah Alghamdi, Nermin Hamza, Moutasm Tamimi","doi":"10.1109/CAIS.2019.8769519","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769519","url":null,"abstract":"This paper reports security factors to custom-made software at SMEs from development perspectives. The primary purpose of this work is to support the In-house software development companies to understand the security issues are being addressed to deal with customer demands. It targets the requirement phase from the overall Software Development Life Cycle (SDLC) by conducting a systematic snapshot mapping in the literature addressing the security requirements in the period from 2000 to 2018. The data extraction process resulted in gathering 40 relevant papers. Primary, reviewed papers addressed classification factors based on management, development, organizational, and environmental perspectives. Secondary, it addressed classification governance issues, and security services including authorization, authentication, availability, confidentiality, and integrity. Our results revealed that project management issues have studied significantly. A large number of the studies are conducted at security management factors and adopting the authorization security service. This study presents a future trend based on a gap research forum that revealed after conducting the systematic mapping approach.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114459109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Shopping and tourism for blind people using RFID as an application of IoT 利用RFID为盲人购物和旅游作为物联网的应用
S. Alghamdi
{"title":"Shopping and tourism for blind people using RFID as an application of IoT","authors":"S. Alghamdi","doi":"10.1109/CAIS.2019.8769581","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769581","url":null,"abstract":"This research aims to provide a service for blind people, based on that assumption visually impaired people would prefer to shop independently, without assistance from others. For this to happen, when a blind person walks in a mall, he or she would need to know the shops in the surrounding area and what these shops offer. The proposed software, based on Radio Frequency Identification (RFID) technology, aims to assist blind people in shopping, by indicating their position, providing them with useful information about each nearby store, and guiding them to reach their desired destinations. The software can also offer a notification service depending on the current time, the estimated required shopping time and the closing time of a particular store, to notify the user sufficiently in advance to make their desired purchases. A high percentage of success in that software been achieved and produced through this research.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115857612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
TeBook A Mobile Holy Quran Memorization Tool 一个移动的神圣古兰经记忆工具
Mohd Hafiz Bin Abdullah, Z. A. Aziz, Rose Hafsah Abd. Rauf, Noratikah Shamsudin, R. A. Latiff
{"title":"TeBook A Mobile Holy Quran Memorization Tool","authors":"Mohd Hafiz Bin Abdullah, Z. A. Aziz, Rose Hafsah Abd. Rauf, Noratikah Shamsudin, R. A. Latiff","doi":"10.1109/CAIS.2019.8769472","DOIUrl":"https://doi.org/10.1109/CAIS.2019.8769472","url":null,"abstract":"Among a popular technique for learning and memorizing the Holy Quran is by using the evaluation technique. In Malay language, the act of evaluating Holy Quran recitation for correctness is called “tebuk”. It is the act of identifying the content of Holy Quran for location of specific verse or surah according to the scripts. The activity involves two parties, the reciter and evaluator. Unfortunately, the involvement of other person as evaluator makes it impossible for the evaluation to be done at any time which is deemed suited by the reciter. The purpose of this application is to provide a means for Holy Quran's recitation evaluation without the involvement of third party by leveraging the use of speech recognition and online Holy Quran search engine. With this application, learners are able to learn to memorize without the constraints of being in a fixed place and this can happen outside the classroom. Device used are of lightweight, portable and can be carried around for teaching and learning activities. The application is developed for Android mobile platform which is available for many Android-based mobile phones and devices. The application is currently available to download and use for free from Google Play Store by the name of “TeBook”.","PeriodicalId":220129,"journal":{"name":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126637360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信