9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing最新文献

筛选
英文 中文
A study on evolution of email spam over fifteen years 15年来垃圾邮件演变的研究
De Wang, Danesh Irani, C. Pu
{"title":"A study on evolution of email spam over fifteen years","authors":"De Wang, Danesh Irani, C. Pu","doi":"10.4108/cc.1.1.e3","DOIUrl":"https://doi.org/10.4108/cc.1.1.e3","url":null,"abstract":"Email spam is a persistent problem, especially today, with the increasing dedication and sophistication of spammers. Even popular social media sites such as Facebook, Twitter, and Google Plus are not exempt from email spam as they all interface with email systems. With an “arms-race” between spammers and spam filter developers, spam has been continually changing over the years. In this paper, we analyze email spam trends on a dataset collected by the Spam Archive, which contains 5.1 million spam emails spread over 15 years (1998-2013). We use statistical analysis techniques on different headers in email messages (e.g. content type and length) and embedded items in message body (e.g. URL links and HTML attachments). Also, we investigate topic drift by applying topic modeling on the content of email spam. Moreover, we extract sender-to-receiver IP routing networks from email spam and perform network analysis on it. Our results show the dynamic nature of email spam over one and a half decades and demonstrate that the email spam business is not dying but changing to be more capricious.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"78 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126029535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Internet of Things Forensics: Challenges and approaches 物联网取证:挑战和方法
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-11-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254159
Edewede Oriwoh, D. Jazani, G. Epiphaniou, P. Sant
{"title":"Internet of Things Forensics: Challenges and approaches","authors":"Edewede Oriwoh, D. Jazani, G. Epiphaniou, P. Sant","doi":"10.4108/ICST.COLLABORATECOM.2013.254159","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254159","url":null,"abstract":"The scope of this paper is two-fold: firstly it proposes the application of a 1-2-3 Zones approach to Internet of Things (IoT)-related Digital Forensics (DF) investigations. Secondly, it introduces a Next-Best-Thing Triage (NBT) Model for use in conjunction with the 1-2-3 Zones approach where necessary and vice versa. These two `approaches' are essential for the DF process from an IoT perspective: the atypical nature of IoT sources of evidence (i.e. Objects of Forensic Interest - OOFI), the pervasiveness of the IoT environment and its other unique attributes - and the combination of these attributes - dictate the necessity for a systematic DF approach to incidents. The two approaches proposed are designed to serve as a beacon to incident responders, increasing the efficiency and effectiveness of their IoT-related investigations by maximizing the use of the available time and ensuring relevant evidence identification and acquisition. The approaches can also be applied in conjunction with existing, recognised DF models, methodologies and frameworks.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133654082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 159
Building multi-model collaboration in detecting multimedia semantic concepts (invited paper) 构建多媒体语义概念检测中的多模型协作(特邀论文)
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-11-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254110
Hsin-Yu Ha, Fausto Fleites, Shu‐Ching Chen
{"title":"Building multi-model collaboration in detecting multimedia semantic concepts (invited paper)","authors":"Hsin-Yu Ha, Fausto Fleites, Shu‐Ching Chen","doi":"10.4108/ICST.COLLABORATECOM.2013.254110","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254110","url":null,"abstract":"The booming multimedia technology is incurring a thriving multi-media data propagation. As multimedia data have become more essential, taking over a major potion of the content processed by many applications, it is important to leverage data mining methods to associate the low-level features extracted from multimedia data to high-level semantic concepts. In order to bridge the semantic gap, researchers have investigated the correlation among multiple modalities involved in multimedia data to effectively detect semantic concepts. It has been shown that multimodal fusion plays an important role in elevating the performance of both multimedia content-based retrieval and semantic concepts detection. In this paper, we propose a novel cluster-based ARC fusion method to thoroughly explore the correlation among multiple modalities and classification models. After combining features from multiple modalities, each classification model is built on one feature cluster, which is generated from our previous work FCC-MMF. The correlation between medoid of a feature cluster and a semantic concept is introduced to identify the capability of a classification model. It is further applied with the logistic regression method to refine ARC fusion method proposed in our previous work for semantic concept detection. Several experiments are conducted to compare the proposed method with other related works and the proposed method has outperform other works with higher Mean Average Precision (MAP).","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126782743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A collaborative approach for metadata management for Internet of Things: Linking micro tasks with physical objects 物联网元数据管理的协作方法:将微任务与物理对象连接起来
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-11-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254174
U. Hassan, Murilo Bassora, A. Vahid, Seán O'Riain, E. Curry
{"title":"A collaborative approach for metadata management for Internet of Things: Linking micro tasks with physical objects","authors":"U. Hassan, Murilo Bassora, A. Vahid, Seán O'Riain, E. Curry","doi":"10.4108/ICST.COLLABORATECOM.2013.254174","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254174","url":null,"abstract":"There has been considerable efforts in modelling the semantics of Internet of Things and their specific context. Acquiring and managing metadata related to the physical devices and their surrounding environment becomes challenging due to the dynamic nature of environment. This paper focuses on managing metadata for Internet of Things with the help of crowds. Specifically, the paper proposes a collaborative approach for collecting and maintaining metadata through micro tasks that can be performed using variety of platforms e.g. mobiles, laptops, kiosks, etc. The approach allows non-experts to contribute towards metadata management through micro tasks, therefore resulting in reduced cost and time. Applicability of the proposed approach is demonstrated through a use case implementation for managing sensor metadata for energy management in small buildings.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127070450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A social trust based friend recommender for online communities “invited paper” 基于社会信任的网络社区好友推荐“受邀论文”
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-11-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254213
S. Nepal, Cécile Paris, Payam Aghaei Pour, S. Bista, J. Freyne
{"title":"A social trust based friend recommender for online communities “invited paper”","authors":"S. Nepal, Cécile Paris, Payam Aghaei Pour, S. Bista, J. Freyne","doi":"10.4108/ICST.COLLABORATECOM.2013.254213","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254213","url":null,"abstract":"Recommendations to connect like-minded people can result in increased engagement amongst members of online communities, thus playing an important role in their sustainability. We have developed a suite of algorithms for friend recommendations using a social trust model called STrust. In STrust, the social trust of individual members is derived from their behaviours in the community. The unique features of our friend recommendation algorithms are that they capture different behaviours by (a) distinguishing between passive and active behaviours, (b) classifying behaviours as contributing to users' popularity or engagement and (c) considering different member activities in a variety of contexts. In this paper, we present our social trust based recommendation algorithms and evaluate them against algorithms based on the social graph (such as Friends-Of-A-Friend). We use data collected from the online CSIRO Total Wellbeing Diet portal which has been trialled by over 5,000 Australians over a 12 week period. Our results show that social trust based recommendation algorithms outperform social graph based algorithms.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129292001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Privacy aware service selection of composite web services invited paper 复合web服务的隐私感知服务选择
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-11-12 DOI: 10.4108/ICST.COLLABORATECOM.2013.254264
A. Squicciarini, B. Carminati, Sushama Karumanchi
{"title":"Privacy aware service selection of composite web services invited paper","authors":"A. Squicciarini, B. Carminati, Sushama Karumanchi","doi":"10.4108/ICST.COLLABORATECOM.2013.254264","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254264","url":null,"abstract":"Web service selection involves finding services from a possibly huge database of similar services. Hence, the challenges involved in finding a suitable service include large time consumption, and difficulty of finding a perfect match according to the user specified search keywords. In addition, significant privacy and security concerns arise, as the information involved with service selection and provisioning may be sensitive for both providers and users. In this paper, we propose a comprehensive framework to uniformly protect users and service providers at the time of service selection. We define a solution that (a) supports private service selection, such that both criteria and service attributes are kept private during the matching and (b) includes an approach to protect service provisioning rules from unwanted disclosure, both from the user and the service provider's perspective. We implemented our solution and integrated with the current Web service standard technologies. We conducted an extensive experimental evaluation, using datasets of actual WSDL documents. Our experimental evaluation and complexity analysis demonstrate that our algorithms are both effective and efficient.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132060380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Efficient opportunistic sensing using mobile collaborative platform MOSDEN 使用移动协作平台MOSDEN的高效机会感测
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-10-15 DOI: 10.4108/ICST.COLLABORATECOM.2013.254090
P. Jayaraman, Charith Perera, Dimitrios Georgakopoulos, A. Zaslavsky
{"title":"Efficient opportunistic sensing using mobile collaborative platform MOSDEN","authors":"P. Jayaraman, Charith Perera, Dimitrios Georgakopoulos, A. Zaslavsky","doi":"10.4108/ICST.COLLABORATECOM.2013.254090","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254090","url":null,"abstract":"Mobile devices are rapidly becoming the primary computing device in people's lives. Application delivery platforms like Google Play, Apple App Store have transformed mobile phones into intelligent computing devices by the means of applications that can be downloaded and installed instantly. Many of these applications take advantage of the plethora of sensors installed on the mobile device to deliver enhanced user experience. The sensors on the smartphone provide the opportunity to develop innovative mobile opportunistic sensing applications in many sectors including healthcare, environmental monitoring and transportation. In this paper, we present a collaborative mobile sensing framework namely Mobile Sensor Data EngiNe (MOSDEN) that can operate on smartphones capturing and sharing sensed data between multiple distributed applications and users. MOSDEN follows a component-based design philosophy promoting reuse for easy and quick opportunistic sensing application deployments. MOSDEN separates the application-specific processing from the sensing, storing and sharing. MOSDEN is scalable and requires minimal development effort from the application developer. We have implemented our framework on Android-based mobile platforms and evaluate its performance to validate the feasibility and efficiency of MOSDEN to operate collaboratively in mobile opportunistic sensing applications. Experimental outcomes and lessons learnt conclude the paper.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131447803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
Computation integrity in mobile cloud: Running probabilistically checkable proof on Android 移动云计算完整性:在Android上运行概率可校验证明
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-10-01 DOI: 10.4108/ICST.COLLABORATECOM.2013.254081
Clinton Walker, Qijun Gu, Terry Penner
{"title":"Computation integrity in mobile cloud: Running probabilistically checkable proof on Android","authors":"Clinton Walker, Qijun Gu, Terry Penner","doi":"10.4108/ICST.COLLABORATECOM.2013.254081","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254081","url":null,"abstract":"Mobile cloud computing is a viable collaborative computing paradigm for the Internet of Things (IOT) to strengthen the synergy of mobile devices. The security of such collaborative computing needs much attention. This paper explores how to use Probabilistically Checkable Proof (PCP) on Android devices to verify if offloaded computation is correctly executed by remote devices. The paper shows that PCP could be viable for use in a mobile cloud environment. However, PCP may incur a significant overhead due to the low data throughput of the wireless network used by Android devices. The cost of overhead may outweigh any gains from verifying computation on remote Android devices. We conducted various experiments utilizing PCP in a mobile network of several Android devices and showed where PCP is beneficial and where improvements could be made to create an efficient and practical system.","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129288532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Collaborative approach for inter-domain botnet detection in large-scale networks 大规模网络域间僵尸网络检测的协同方法
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-10-01 DOI: 10.4108/ICST.COLLABORATECOM.2013.254051
Hachem Guerid, Karel Mittig, A. Serhrouchni
{"title":"Collaborative approach for inter-domain botnet detection in large-scale networks","authors":"Hachem Guerid, Karel Mittig, A. Serhrouchni","doi":"10.4108/ICST.COLLABORATECOM.2013.254051","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254051","url":null,"abstract":"The members of almost all botnets are distributed between several networks. Such distribution hardens their detection as the centralized approaches require to centralize network data for their analysis, which is indeed not possible in regard to the legacy and business constraints applied to network operators. In this paper, we propose a collaborative and inter-domain botnet detection system which conciliates the requirements of privacy and business preservation, while enabling realtime analysis for large scale networks. The different probes of our collaborative detection system exchange anonymised information in order to synchronize the network analysis of the members of botnets and to identify the malicious servers controlling them. We evaluated our system using anonymised traffic captured on an operator's network, and the results showed an improvement of 31% of malicious servers detected resulting from the collaboration, and this without significant performance impact and bandwidth overhead (respectively 4% and 11kb/s).","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114249798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Data-based access control in named data networking 命名数据网络中基于数据的访问控制
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Pub Date : 2013-10-01 DOI: 10.4108/ICST.COLLABORATECOM.2013.254180
Balkis Hamdane, M. Msahli, A. Serhrouchni, S. Fatmi
{"title":"Data-based access control in named data networking","authors":"Balkis Hamdane, M. Msahli, A. Serhrouchni, S. Fatmi","doi":"10.4108/ICST.COLLABORATECOM.2013.254180","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2013.254180","url":null,"abstract":"Named Data Networking (NDN) presents one of the first and most emergent Information Centric Networking (ICN) project. It offers an excellent substrate to solve today's Internet problems. To ensure security challenge, it adopts a data-centric model. The access control represents a fundamental security aspect. It prevents the data publication under any sensitive namespace and the access to any confidential content. In this paper, we use the generic and conceptual access control scheme called UCONABC to propose an optimum and secured data centric access control model. In our proposal, data is protected by encryption and lock password. Its access is managed by a centralized access list (ACL).","PeriodicalId":222111,"journal":{"name":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131206639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信