2013 47th International Carnahan Conference on Security Technology (ICCST)最新文献

筛选
英文 中文
Writer identification on mobile device based on handwritten 基于手写体的移动设备写作者识别
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922063
T. Kutzner, C. Travieso, Ingrid Bonninger, J. B. Alonso, J. L. Vásquez
{"title":"Writer identification on mobile device based on handwritten","authors":"T. Kutzner, C. Travieso, Ingrid Bonninger, J. B. Alonso, J. L. Vásquez","doi":"10.1109/CCST.2013.6922063","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922063","url":null,"abstract":"This paper deals with exploring of the potential of writer identification by handwriting on a touch-screen phone for an application in access control systems. Our aim was to examine the possibility of writer recognition by a biometric model based on handwritten password. A mobile phone-server solution based on distributed blocks is proposed. The implemented approach performs a pre-processing block, in order to segment the handwritten password on the mobile phone. It also applies a feature extraction in order to have our biometric in-formation, running on the server. The classification is done with 10 online and offline features and is classified by a Naive Bayes classifier. We have used a database of 108 handwritten genuine (12 samples came from nine users) and 36 impostors (four false samples from nine users) written on a HTC Desire mobile phone with Android 2.2. The proposed system reached an accuracy of 96.87% in writer verification. The false acceptance rate of the proposed system is 11.11%.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117197918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cumulative probability of detecting an intruder by alarm systems 警报系统探测到入侵者的累积概率
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922037
T. Loveček, A. Veľas, K. Kampová, L. Mariš, V. Mózer
{"title":"Cumulative probability of detecting an intruder by alarm systems","authors":"T. Loveček, A. Veľas, K. Kampová, L. Mariš, V. Mózer","doi":"10.1109/CCST.2013.6922037","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922037","url":null,"abstract":"Currently various methodologies, procedures and software tools are used worldwide for the quantitative assessment of the reliability or effectiveness of the systems for protecting objects evaluating the interaction between the breakthrough resistances and the probabilities of detecting by alarm systems. Their frequent drawback is the fact that currently some concrete values or procedures for acquiring the individual variables are missing, or that these variables do not take into account all the significant influences of the environment. This article defines the possibility of a more complex calculation of one of the basic output quantities, i.e. the cumulative probability of detecting an intruder. Besides the newly defined functional dependences between the input parameters of this output quantity, the article also introduces concrete values of some parameters acquired through experiments (e.g. the probabilities of detecting an intruder by the PIR detector under standard or specific conditions).","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130122676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Realistic synthetic off-line signature generation based on synthetic on-line data 基于在线合成数据的逼真离线合成签名生成
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922041
Miguel A. Ferrer, Moises Diaz-Cabrera, A. Morales, Javier Galbally, M. Gomez-Barrero
{"title":"Realistic synthetic off-line signature generation based on synthetic on-line data","authors":"Miguel A. Ferrer, Moises Diaz-Cabrera, A. Morales, Javier Galbally, M. Gomez-Barrero","doi":"10.1109/CCST.2013.6922041","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922041","url":null,"abstract":"A novel method for the generation of synthetic offline signatures is presented. The proposed algorithm follows a two steps scheme: first, the raw synthetic dynamic functions of the synthetic signature are generated; second, several ink and paper models are applied to transform the on-line data to realistic static signatures. The novel approach is validated using four different publicly available databases both real and synthetic. The experimental protocol includes the comparison of both types of signatures in terms of: i) performance evaluation of two competitive and totally different verification systems; and ii) visual appearance according to human observers. The experimental results show the high similarity existing between synthetically generated and humanly produced samples, and the potential of the proposed method for the study of the signature trait.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130216408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Silhouette classification by using manifold learning for automated threat detection 基于流形学习的轮廓分类自动威胁检测
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922080
Johanna Carvajal-González, J. Valencia-Aguirre, G. Castellanos-Domínguez
{"title":"Silhouette classification by using manifold learning for automated threat detection","authors":"Johanna Carvajal-González, J. Valencia-Aguirre, G. Castellanos-Domínguez","doi":"10.1109/CCST.2013.6922080","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922080","url":null,"abstract":"Video surveillance systems have become an essential tool to enhance security in both public and private places, especially to prevent potentially dangerous situations. However, these systems usually have a high number of nuisance alarms, when they are aimed at detecting automatically abandoned objects. It was found that people waiting (sitting or standing still) in airports, train stations and bus stops are the main cause of false alarms, as available video surveillance technologies are not focused on recognizing the abandoned objects. In this paper, we present a methodology to recognize abandoned objects. The goal is to determinate if the alarm is caused by an unattended baggage or a stationery person, as the former may pose potential security threats. The R transform, which is a geometric invariant feature descriptor and has low computational complexity, is applied to each of the four patches in which the silhouette of the object to be recognized is divided. Afterwards a covariance matrix representation is calculated from both the original high dimensional space and a low dimensional space obtained with Laplacian Egienmaps, being this matrix a point in a Riemannian Manifold. The proposed methodology is evaluated in a single person dataset and a baggage dataset (gathered from the web) and good performance was obtained.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134258677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
High variability geographical obfuscation for location privacy 位置隐私的高可变性地理混淆
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922079
P. Wightman, M. Zurbarán, A. Santander
{"title":"High variability geographical obfuscation for location privacy","authors":"P. Wightman, M. Zurbarán, A. Santander","doi":"10.1109/CCST.2013.6922079","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922079","url":null,"abstract":"In the last few years, the number of applications that use the location of the users in order to provide a more personalized service have been increasing, mainly due to easy access to low cost smartphones, geographical positioning systems and other factors, like social networking. The concern of protecting this information is also increasing due to the capabilities than an eventual attacker could have if the location information is obtained. Some protection techniques have been proposed in the literature; for example, location obfuscation which slightly alters the location to hide the real one. However, this technique could be filtered out with time series-based mechanisms. In this work, the Pinwheel obfuscation technique is proposed in order to reduce the possibility of EMA-based filtering based on high variability and asymmetry of the induced noise. The results show that the level of filtered noise is reduced from 35% in N-RAND and 30% in θ-Rand obfuscation techniques, to 15% in Pinwheel, with asymmetric scenarios, while preserving a long final average distance from the original path after a filtering attack.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126951879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Implementing trustworthy dynamic biometric signature according to the electronic signature regulations 根据电子签名规定实施可信动态生物签名
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922039
V. Smejkal, J. Kodl
{"title":"Implementing trustworthy dynamic biometric signature according to the electronic signature regulations","authors":"V. Smejkal, J. Kodl","doi":"10.1109/CCST.2013.6922039","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922039","url":null,"abstract":"Many countries of the world exercise legal regulations, which embedded electronic signature based on asymmetric cryptography in their legislation. However, this kind of signature is cumbersome and not yet overly accepted by the public. This paper studies the possibility of replacing it by dynamic biometric signature (DBS) in relation with demands of the legal regulations (EU in particular) not only as “current” electronic signature (ES) but also as “advanced” electronic signature (AES). However, in order to satisfy the requirements for AES, whilst being implemented it must fulfill demands given by the legislation for this type of signature. The authors describe the methods how to satisfy such demands and thus build a system utilizing DBS with high level of security. Furthermore, the authors discuss the issues of uniqueness of DBS in terms of individual's characteristic motion, and hence the validity of parameters required for unique identification of the user. The study then proposes important methods for identification of an individual. The authors then conclude that DBS under the right implementation can form significant alternative to ES and AES.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129203261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Managing the training a guard in the operation of a high-tech facility access control system 管理培训保安操作高科技设施门禁系统
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922074
D. Shane
{"title":"Managing the training a guard in the operation of a high-tech facility access control system","authors":"D. Shane","doi":"10.1109/CCST.2013.6922074","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922074","url":null,"abstract":"As security requirements deepen, today's enterprise-level high-tech entry control systems automate many of the decision functions that a guard would otherwise perform in a manual system. These automated functions escalate into higher tiered infrastructure operations the guard is typically unaware of. The remaining functions, the entry/denial decisions the guard must make, are the exceptions type, the kind that the guard encounters that the system wont or cant handle. How well the guard performs these functions determines the sustainabililty of the system and its security posture over the long haul. Insight into the performance risks during the initial and sustainment periods due to lack of managed training of all the stakeholders is captured by experience gained from deployment and sustainment of a working system over a five-year period. The maturity of the man-machine interface, the dilemmas the guard faces as the “front man” to the public, the measures that can define his performance in providing requisite security while meeting transit times, the relevance of other stakeholders, and the factors that influence the depth of overall training are presented“.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130129178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A concept of behavioral reputation system in wireless networks 无线网络中行为信誉系统的概念
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922057
Matej Kacic, P. Hanáček, Martin Henzl, I. Homoliak
{"title":"A concept of behavioral reputation system in wireless networks","authors":"Matej Kacic, P. Hanáček, Martin Henzl, I. Homoliak","doi":"10.1109/CCST.2013.6922057","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922057","url":null,"abstract":"Nowadays wireless networks are becoming important in personal and public communication. Most of them are secured by 802.11i standard with strong AES cipher - WPA2. In many cases an attacker has the ability to listen to all encrypted network traffic, which may become a potential intrusion. Each client in wireless network is vulnerable to a variety of threats and attacks. Many attacks, especially in corporate networks, are realized from internal environment. Identity theft is another serious problem of wireless networks. We present a concept of reputation system based on user behavior. Our goal is to precisely identify every entity in wireless network, and then determine malicious behavior of these entities.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114669917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Vessel identification study for non-coherent high-resolution radar 非相干高分辨率雷达舰船识别研究
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922052
C. Carmona-Duarte, M. A. Ferrer-Ballester, J. Calvo-Gallego, B. Dorta-Naranjo
{"title":"Vessel identification study for non-coherent high-resolution radar","authors":"C. Carmona-Duarte, M. A. Ferrer-Ballester, J. Calvo-Gallego, B. Dorta-Naranjo","doi":"10.1109/CCST.2013.6922052","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922052","url":null,"abstract":"This paper presents a vessel identification study based on vessel profile. The study was developed with real data obtained with high-resolution Continuous Wave Lineal Frequency Modulated (CW-LFM) radar. Cases studied in this work are vessels entering and leaving the harbor. Also, in this paper, a comparison between different classification techniques such as Neural Networks, Support Vector Machine and k-Nearest Neighbor is introduced. The differences between normalization methods are evaluated for each classification technique.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126236572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimization of information technology risk event prediction markets 信息技术风险事件预测市场的优化
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922047
Erol Ozan
{"title":"Optimization of information technology risk event prediction markets","authors":"Erol Ozan","doi":"10.1109/CCST.2013.6922047","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922047","url":null,"abstract":"Information technology risk prediction markets have potential to identify the probabilities of risk events that are relevant to information systems. Prediction markets provide a bidding mechanism that allows large number of participants to compete for forming the most accurate predictions for future events. The accuracy of forecasts regarding the frequency, nature, and the form of cyber attacks is crucial for managers and various stakeholders to make effective decisions for investment in cyber defense systems. This paper identifies the key design elements that are involved in the development of a prediction market. The identification of the best configuration for the prediction markets helps organizations to build better defenses against cyber attacks.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126950392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信