2012 Third International Conference on Emerging Intelligent Data and Web Technologies最新文献

筛选
英文 中文
Combining Digital Forensic Practices and Database Analysis as an Anti-Money Laundering Strategy for Financial Institutions 结合数字取证实践和数据库分析作为金融机构反洗钱策略
Denys A. Flores, Olga Angelopoulou, Richard J. Self
{"title":"Combining Digital Forensic Practices and Database Analysis as an Anti-Money Laundering Strategy for Financial Institutions","authors":"Denys A. Flores, Olga Angelopoulou, Richard J. Self","doi":"10.1109/EIDWT.2012.22","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.22","url":null,"abstract":"Digital forensics is the science that identify, preserve, collect, validate, analyse, interpret, and report digital evidence that may be relevant in court to solve criminal investigations. Conversely, money laundering is a form of crime that is compromising the internal policies in financial institutions, which is investigated by analysing large amount of transactional financial data. However, the majority of financial institutions have adopted ineffective detection procedures and extensive reporting tasks to detect money laundering without incorporating digital forensic practices to handle evidence. Thus, in this article, we propose an anti-money laundering model by combining digital forensics practices along with database tools and database analysis methodologies. As consequence, admissible Suspicious Activity Reports (SARs) can be generated, based on evidence obtained from forensically analysing database financial logs in compliance with Know-Your-Customer policies for money laundering detection.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127640632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Performance Evaluation of AODV Protocol for Single and Multiple Traffic in MANETs Considering Packet Delivery Fraction Parameter 考虑分组传送率参数的met单流量和多流量AODV协议性能评价
Makoto Ikeda, Elis Kulla, M. Hiyama, L. Barolli, M. Younas, M. Takizawa
{"title":"Performance Evaluation of AODV Protocol for Single and Multiple Traffic in MANETs Considering Packet Delivery Fraction Parameter","authors":"Makoto Ikeda, Elis Kulla, M. Hiyama, L. Barolli, M. Younas, M. Takizawa","doi":"10.1109/EIDWT.2012.21","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.21","url":null,"abstract":"In this paper, we evaluate the performance of Ad hoc On-Demand Distance Vector (AODV) routing protocol for single and multiple traffic in MANETs. We investigate and compare the packet delivery fraction (PDF) and throughput. As network simulator, we used ns-3 and we considered random waypoint mobility model for different number of nodes and different maximum speed by sending single and multiple traffic in the network. Simulation results show that the performance of the network is high when the number of nodes is 20 and maximum speed is 6 m/s for single and multiple traffic.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132180506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Smartphone-Based Coordination Support for the Austrian Medical First Responder System 基于智能手机的奥地利医疗急救系统协调支持
M. Zsifkovits, S. Cheng, Florian Waldner, K. Heidenberger
{"title":"Smartphone-Based Coordination Support for the Austrian Medical First Responder System","authors":"M. Zsifkovits, S. Cheng, Florian Waldner, K. Heidenberger","doi":"10.1109/EIDWT.2012.56","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.56","url":null,"abstract":"Especially in the field of emergency medicine, it is evident that \"non-therapy-time\" needs to be minimized to maximize the possibility of survival. One approach to achieve this goal is the implementation of a medical first responder system, like in Austria, Germany or in the US. Although the system works well in Austria, essential progress in the area of mobile communication enables promising ways of coordination support to increase the system's efficiency. Presented in the following article is the idea of a new smart phone application that optimizes the communication of first responders and the control center. The first responder information and communication software, \"FRICS\", is designed for introduction into the Austrian first responder system.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124036080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Evaluation of Security Algorithms for the AODV MANET Routing Protocol AODV MANET路由协议安全算法的性能评估
A. Hinds, Stelios Sotiriadis, N. Bessis, N. Antonopoulos
{"title":"Performance Evaluation of Security Algorithms for the AODV MANET Routing Protocol","authors":"A. Hinds, Stelios Sotiriadis, N. Bessis, N. Antonopoulos","doi":"10.1109/EIDWT.2012.19","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.19","url":null,"abstract":"This paper describes the need for a unified simulation framework which defines the simulation tools and configuration settings for researchers to perform comparative simulations and test the performance of security tools for the AODV MANET routing protocol. The key objectives of the proposed framework are to provide an unbiased, repeatable simulation environment which collects all important performance metrics and has a configuration optimized for the AODV protocols performance. Any security tool can then be simulated using the framework, showing the performance impact of the tool against the AODV baseline results or other security tools. The framework will control the network performance metrics and mobility models used in the simulation. It is anticipated that this framework will enable researchers to easily repeat experiments and directly compare results without configuration settings influencing the results.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124586131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The Use of Crowdsourcing to Aid Quest Design in Games 利用众包帮助游戏中的任务设计
Sarah Carter, Martin Smith, Suveena Bali, Stelios Sotiriadis, N. Bessis, Richard Hill
{"title":"The Use of Crowdsourcing to Aid Quest Design in Games","authors":"Sarah Carter, Martin Smith, Suveena Bali, Stelios Sotiriadis, N. Bessis, Richard Hill","doi":"10.1109/EIDWT.2012.17","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.17","url":null,"abstract":"In recent years, the usage of emerging technologies such as Grids, Clouds, data-smashups and crowd sourcing has become more widespread. This owes a lot to the continued growth of the Internet technology which has contributed to people becoming more comfortable about sharing information online, and using the Internet to communicate with others for both personal and professional purposes. The recent surge in smart phone usage has also helped to increase people's use of technology wherever they are - leading to innovative use of mobile phones to source and generate data for a variety of purposes. In this paper, we discuss the recent emerging technologies with a special focus on the possible usage of the crowd sourcing concept. Specifically, we discuss methods of quality verification to assist computer game design scenario case. Within this context, we present a technical architecture to enable quest design in games and conclude with prompting future steps of our work.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"2018 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125647510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Household Energy Use and Creating Awareness: Opportunities for ICT 家庭能源使用和提高意识:信息通信技术的机遇
Jeroen Stragier, Laurence Hauttekeete, L. Marez, Jan Derboven, Lieve Laporte
{"title":"Household Energy Use and Creating Awareness: Opportunities for ICT","authors":"Jeroen Stragier, Laurence Hauttekeete, L. Marez, Jan Derboven, Lieve Laporte","doi":"10.1109/eidwt.2012.35","DOIUrl":"https://doi.org/10.1109/eidwt.2012.35","url":null,"abstract":"Household energy use is growing and energy prices are rising. A growing need exists among households to get more insights into their energy use. ICT can offers solutions here in terms of smart metering and home energy management. Through our research, we wanted to get a view on the adoption potential, willingness to pay and adoption determinants for these tools. Our results indicate a substantial adoption potential for smart metering tools and an existing but limited potential for home energy management systems. An important adoption determinant will be the price of these systems, since they are aimed at helping households to save energy. If the price is higher than the potential savings, interest is likely to be low.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134465126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Customized Profile Accessibility and Privacy for Users of Social Networks 自定义配置文件的可访问性和隐私为社会网络的用户
E. Okoro, Stelios Sotiriadis, N. Bessis, Richard Hill
{"title":"Customized Profile Accessibility and Privacy for Users of Social Networks","authors":"E. Okoro, Stelios Sotiriadis, N. Bessis, Richard Hill","doi":"10.1109/EIDWT.2012.18","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.18","url":null,"abstract":"Social networking applications have become a very popular means of communication and interaction in recent times and user participation has increased tremendously. It has become a norm that personal information is constantly shared with other social network users. The types of data uploaded and shared on user profiles also include sensitive information that one would rather it was accessible to a select few. The issues of security and privacy although very important seem to be a secondary consideration in the development and extensive usage of social networks. This paper highlights the potential attacks owing to the vast amount of user personal information available on social networks. The paper is concluded with proposing a theoretical model aimed at resolving the problems associated with the current default privacy and wider accessibility design implemented by most social networks.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130807399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visualization of Evolutionary Computation Process for Node Placement in WMNs Considering Weibull and Exponential Distribution of Mesh Clients 考虑Weibull和指数分布的WMNs节点布局进化计算过程可视化
Admir Barolli, Tetsuya Oda, Evjola Spaho, L. Barolli, F. Xhafa, M. Takizawa
{"title":"Visualization of Evolutionary Computation Process for Node Placement in WMNs Considering Weibull and Exponential Distribution of Mesh Clients","authors":"Admir Barolli, Tetsuya Oda, Evjola Spaho, L. Barolli, F. Xhafa, M. Takizawa","doi":"10.1109/EIDWT.2012.12","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.12","url":null,"abstract":"In this paper, we use WMN-GA system for node placement problem in WMNs. For a given grid size and a given number of mesh nodes, our WMN-GA system use Genetic Algorithms (GAs) to find where to position the mesh nodes in order to maximize the coverage and the connectivity of the network. We evaluate and compare the performance of Weibull and Exponential distributions considering giant component and number of covered users parameters. For both scenarios, we present the visualization of evolutionary computation process. The simulation results show that for Weibull distribution the system has better performance.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131508303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collecting Evidence from Large-Scale Heterogeneous Virtual Computing Infrastructures Using Website Capture 利用网站捕获从大规模异构虚拟计算基础设施收集证据
T. Chowdhury, S. Vidalis
{"title":"Collecting Evidence from Large-Scale Heterogeneous Virtual Computing Infrastructures Using Website Capture","authors":"T. Chowdhury, S. Vidalis","doi":"10.1109/EIDWT.2012.47","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.47","url":null,"abstract":"Collecting evidence using Website Capture tools and techniques enables law enforcement agencies and independent investigators to investigate crimes that are committed over the Internet or through the use of the World Wide Web, even when the suspect is hiding behind large scale heterogeneous virtual computing infrastructures. These crimes range from theft and fraud to the more extreme crimes of paedophilia, terrorist propaganda and corporate warfare. The paper offers a critique on how Website Capture is applied and the methods required for successful and valid capture and analysis of live digital evidence. We explore the different types of tools required to conduct Website Capture, why they are required and the procedure to successfully conduct Website Capture.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123965455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the Attacks over the Elliptic Curve-Based Cryptosystems 基于椭圆曲线的密码系统的攻击
G. Moise
{"title":"On the Attacks over the Elliptic Curve-Based Cryptosystems","authors":"G. Moise","doi":"10.1109/EIDWT.2012.36","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.36","url":null,"abstract":"The aim of this paper is to a present survey of attacks on the elliptic curve cryptosystems. We propose a taxonomy for these attacks and a brief presentation for each type of attack and its complexity. The attacks' complexity demonstrates the high security level of the elliptic curve-based cryptosystems. Also, there are presented the most known elliptic curves-based cryptographic protocols: the Elliptic Curves-based Diffie-Hellman Key Exchange, ElGamal Public Key Cryptosystem and Elliptic Curve Digital Signature Algorithm.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"22 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120891399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信