2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)最新文献

筛选
英文 中文
Review of Recent Intrusion Detection Systems and Intrusion Prevention Systems in IoT Networks 物联网网络中入侵检测和入侵防御系统研究进展
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911401
Z. Chiba, N. Abghour, K. Moussaid, O. Lifandali, R. Kinta
{"title":"Review of Recent Intrusion Detection Systems and Intrusion Prevention Systems in IoT Networks","authors":"Z. Chiba, N. Abghour, K. Moussaid, O. Lifandali, R. Kinta","doi":"10.23919/softcom55329.2022.9911401","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911401","url":null,"abstract":"The Internet of Things (IoT) paradigm has gained exponential growth and popularity in recent years. It is a precipitously shifting technology, in which interconnected computing devices and sensors share data and communicate over the Internet, to decipher different problems and deliver new services without human intervention. In fact, IoT is becoming more ubiquitous in our daily lives, connecting physical things to e-services. That is to say; the IoT is the engine that powers home automation, modern health, advanced manufacturing, and smart cities. Thus, IoT holds a lot of promise for enhancing social and corporate life. Despite the rising vogue of IoT equipment, they are weak and vulnerable to many security threats because of the nature of their networks, and inherent hardware limitations that restrict their ability to implement security measures and increase their exposure to vulnerability attacks. Furthermore, the integration and diversification of IoT terminals and applications make IoT more prone to various intrusion attacks. There are many techniques used to preclude IoT from various attacks, Intrusion Detection System (IDS) and Intrusion Preventions System (IPS) are some of them, which can guarantee the security, privacy, and reliability of the IoT. In this paper, we provide a review of several recent and pertinent IDS and IPS proposed for IoT networks, where we highlight the suggested mechanisms and their limitations. This aids to spot the issues that still require to be tackled, well define the mainstream of research direction, and pave the way for novel avenues of research for future researchers.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127002889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predicting Students'Final Exam Grades Based on Learning Material Usage extracted from Moodle Logs 基于Moodle日志中学习材料使用情况预测学生期末考试成绩
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911477
Suzana Marija Dunatov, Kristian Kasalo, Anamaria Lovrinčević, Jelena Maljković, Antonela Prnjak
{"title":"Predicting Students'Final Exam Grades Based on Learning Material Usage extracted from Moodle Logs","authors":"Suzana Marija Dunatov, Kristian Kasalo, Anamaria Lovrinčević, Jelena Maljković, Antonela Prnjak","doi":"10.23919/softcom55329.2022.9911477","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911477","url":null,"abstract":"This paper presents the use of data mining to predict students' final exam grades. We used the data collected from the Moodle platform of the IT course (the University of Split) and compared six classification methods: Decision Tree Classification., k-Nearest Neighbor Classifier., Logistic Regression., Naive Bayes., Random Forest., and Support Vector Machine. Using those methods and Moodle Logs., we aimed to predict the ultimate success in the chosen course. To achieve better accuracy., we evaluated all available and filtered data to determine which algorithms were the most accurate.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132018333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative Recurrent Network For Design SARS-CoV-2 Main Protease Inhibitor 基于生成递归网络的SARS-CoV-2主蛋白酶抑制剂设计
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911377
Adham Khaled, Zeinab Abd El Haliem
{"title":"Generative Recurrent Network For Design SARS-CoV-2 Main Protease Inhibitor","authors":"Adham Khaled, Zeinab Abd El Haliem","doi":"10.23919/softcom55329.2022.9911377","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911377","url":null,"abstract":"Deep learning was adopted in de novo drug design for its generative ability in generating novel molecules, by training on a small set of molecules with known biological activity towards the target, the model will be finetuned to generate similar molecules. We proposed a method similar to the process found in evolution algorithms from creating, evaluating, and selecting from a population for fine-tuning the generative model without the need for molecules with known biological activity and applied it to the SARS-CoV-2, the proposed method decreases the time required to search for SARS-CoV-2 main protease inhibitors by developing a predictive model for predicting the affinity score of the molecules which decreases the time needed for docking to a fraction of the original time, we achieved 97.6 % accuracy in predicting the affinity score of molecules thus speeding up the search for existing molecules and the fine-tuning of the generative model to design protease inhibitors for SARS-CoV-2.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133497286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ATMAS: Airplane Trajectory Missing Alarm System based on Deep Learning 基于深度学习的飞机轨迹丢失报警系统
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911358
Qiaoqiao Zhu, Zexin Wu, Jie Nie
{"title":"ATMAS: Airplane Trajectory Missing Alarm System based on Deep Learning","authors":"Qiaoqiao Zhu, Zexin Wu, Jie Nie","doi":"10.23919/softcom55329.2022.9911358","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911358","url":null,"abstract":"With the rapid development of civil aviation, more emphasis has been placed on airplane safety. However, the traditional method of dealing with the airplane vanishing from the radar is to rely on the controllers to contact the pilot when the disappearances occur, which brings a safety risk owing to the time delay. This paper proposes an automatic alarm system called Airplane Trajectory Missing Alarm System (ATMAS). ATMAS is made up of two components: a Long Short-Term Memory (LSTM) neural network and a Multi-Layer Perceptron (MLP). LSTM extracts the semantic context in trajectory, and MLP determines whether to alarm based on the context. By applying the airplane trajectory in Qingdao controlled airspace as a case study, ATMAS takes the records in the last minute as input and indicates whether the airplane will vanish from the radar in the following minute. The accuracy of the alarm reaches 90.15%.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134146499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Deep Learning Technique for Sentiment Analysis in E-Learning Platform with Natural Language Processing 基于自然语言处理的电子学习平台情感分析混合深度学习技术
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911232
Jayashree Das, Anupam Das, J. Rosak-Szyrocka
{"title":"A Hybrid Deep Learning Technique for Sentiment Analysis in E-Learning Platform with Natural Language Processing","authors":"Jayashree Das, Anupam Das, J. Rosak-Szyrocka","doi":"10.23919/softcom55329.2022.9911232","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911232","url":null,"abstract":"E-learning-based teaching methodologies are increasing now-a-days and also, the online classes are considered as highly popular that ensures the virtual platform for online education from anywhere in the world. The social networks are widely distributed that generates different opinions on various perspectives of life through the messages on the web. This textural information is highly sourced with the data for performing the sentiment analysis and opinion mining that is expressed through the text. This text provides the feelings of the students with the statements that show agreement or disagreement in the comment sections to reveal the negative or positive feelings of the students towards the learning. The major goal of this paper is to design of new sentiment analysis model for e-learning platform with the help of natural language processing techniques. Initially, the standard text data regarding e-learning platform with user reviews are gathered from benchmark resources. The gathered data is forwarded to pre-processing technique, where the unnecessary content is avoided for maximizing the performance of sentiment analysis. Further, word to vector conversion is carried out using glove embedding scheme for getting the relevant data for sentiment analysis. Further, the sentiment classification is carried out by Convolutional Neural Networks (CNN) with Gated Recurrent Unit (GRU). Finally, the sentiments are analyzed through hybrid deep learning in the field of e-learning. The investigation reveals promising results in sentiment analysis tasks.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129545696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
NetApps Approach for Accelerating Vertical Adoption of 5G Networks: A UAV Case 加速垂直5G网络采用的NetApps方法:以无人机为例
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911276
Ignacio Martinez-Alpiste, Gelayol Golcarenarenji, D. Klonidis, J. A. Calero, Q. Wang
{"title":"NetApps Approach for Accelerating Vertical Adoption of 5G Networks: A UAV Case","authors":"Ignacio Martinez-Alpiste, Gelayol Golcarenarenji, D. Klonidis, J. A. Calero, Q. Wang","doi":"10.23919/softcom55329.2022.9911276","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911276","url":null,"abstract":"Whilst the Fifth Generation (5G) mobile networks are being deployed worldwide, the adoption of this next-generation networking paradigm by the vertical businesses such as the 4th industrial revolution (Industry 4.0) sectors is lagging. One of the empirical barriers for the verticals to embrace 5G rapidly is the lack of easy-to-access platforms that facilitate cost-efficient deployment of their Network Applications (NetApps) to create end-to-end services. This paper presents a novel and realistic NetApp platform to remove this barrier, thereby speeding up the smooth vertical businesses' transition to 5G and beyond networks. Particularly, the paper provides a vision and insights on an innovative Unmanned Aerial Vehicle (UAV) based Industry 4.0 NetApp to cast lights on how 5G NetApps can help shape the resultant new business models and open new business opportunities. In this case, the NetApp is able to improve the results by detecting intruders in real time and reducing the delay of detection by 226 ms (38%).","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115212185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of a Software Vulnerabilities and Application Research Tool 软件漏洞与应用研究工具的设计与实现
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911314
E. Benetti, A. Zucchelli, G. Mazzini
{"title":"Design and Implementation of a Software Vulnerabilities and Application Research Tool","authors":"E. Benetti, A. Zucchelli, G. Mazzini","doi":"10.23919/softcom55329.2022.9911314","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911314","url":null,"abstract":"In a distributed environment that includes a large number of virtual machines managed by a single entity, maintaining an up-to-date inventory of the same is essential for several reasons. First of all, cybersecurity is an element of increasing importance that must necessarily be taken into consideration: in the event of a vulnerability, knowing quickly which virtual machines are affected in order to proceed with the fix minimizes problem resolution times and therefore the probability of attacks. Furthermore, knowing instantly which virtual machines contain certain versions of packages helps in identifying the best host on which to develop new projects according to specific needs. This paper proposes a possible solution already in use in a company that manages a considerable amount of servers and projects of decidedly heterogeneous types developed on them.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123383994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vehicle Distance Estimation Based on Stereo Camera System with Implementation on a Real ADAS Board 基于立体摄像系统的车辆距离估计及其在实际ADAS板上的实现
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911360
Marko Miljković, M. Vranješ, David Mijic, M. Dukic
{"title":"Vehicle Distance Estimation Based on Stereo Camera System with Implementation on a Real ADAS Board","authors":"Marko Miljković, M. Vranješ, David Mijic, M. Dukic","doi":"10.23919/softcom55329.2022.9911360","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911360","url":null,"abstract":"In Advanced Driver-Assistance Systems (ADAS) one of the main tasks is to determine the distance of the objects in the vehicle's surroundings. This paper presents a solution that determines the distance of a detected vehicle using a stereo image pair, which is implemented on a real ADAS embedded platform (ADAS board). To improve the performance of the solution, after disparity map calculation, the presented solution implements Fast Global Smoothing (FGS) filter with guidance over the disparity map, which smooths disparity map surfaces that represent the same object of the scene, while preserving its edges. This solution is tested in a real environment using the real ADAS board and specific automotive cameras. Distinct vehicles located at different distances from the cameras are used in tests. The results show the proposed solution can provide high-performance results when implemented on a real ADAS platform while processing 7 frames per second for videos with a resolution of 1280×360 pixels. Furthermore, it is possible to conclude that despite the somewhat slower execution of the solution using the FGS filter with guidance, it makes sense to use it because, with still acceptable execution frequency, it provides a much better distance estimation, which is extremely important for ADAS.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123656258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SWAP: Secure Warning Messages Authentication and Propagation in Internet of Vehicles 车联网中安全警告信息的认证与传播
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911337
Alessandro Brighente, M. Conti, Harsha Vasudev
{"title":"SWAP: Secure Warning Messages Authentication and Propagation in Internet of Vehicles","authors":"Alessandro Brighente, M. Conti, Harsha Vasudev","doi":"10.23919/softcom55329.2022.9911337","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911337","url":null,"abstract":"The sensing and communication capabilities of the Internet of Vehicles (IoV) allow for the design of safer Intelligent Transportation Systems (ITS), with capabilities for reduced crashes and drivers' injuries. To this aim, entities in the IoV can autonomously exchange Warning Messages (WMs) on the road status to help drivers, passengers, and vehicles to take immediate actions and reduce road accidents. WMs authentication, timely propagation, and integrity is a fundamental requirement, as the injection of false WMs or their delay by a malicious user can lead to accidents or traffic congestion. The currently available WMs authentication and propagation schemes focus on the security properties, without however accounting for the scalability issues related to the large number of entities connected in the IoV. In this paper, we propose Secure Warning Message Authentication and Propagation (SWAP), an authentication protocol specifically designed for WM propagation in the Internet of Vehicles (IoV). We introduce the Warning Message Authority (WMA), a novel entity responsible for secure WMs handling. Thanks to the WMA, WMs are managed by dedicated resources that allow for the timely delivery of safety-critical information, avoiding delays due to network congestion at the Trusted Authority (TA). We prove the security of SWAP by using the Random Oracle Model (ROM) and via security analysis. Compared to state of the art authentication schemes, SWAP reduces the number of communication bits by 100 bits, and provides a ten-fold decrease of the computation time.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127223233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Telecom Fraud Detection with Machine Learning on Imbalanced Dataset 基于不平衡数据集的机器学习电信欺诈检测
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911518
Ivan Krasić, S. Celar
{"title":"Telecom Fraud Detection with Machine Learning on Imbalanced Dataset","authors":"Ivan Krasić, S. Celar","doi":"10.23919/softcom55329.2022.9911518","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911518","url":null,"abstract":"This paper compares the performance of different ML algorithms to a fraud dataset. Telecom operators have long history and experience against fraud activities. During the time and changing the role of telecom operators, from service and infrastructure carriers to communication service providers handling data, voice, and content transfer. There is an urgent need to develop efficient and adaptive algorithms for early fraud detection and prevention. In this paper, we used machine learning techniques as an effective method to detect fraudsters in mobile communications. Fraud datasets are derived from the real telco operator's environment. Different experiments with a few popular machine learning classification algorithms were performed to evaluate the performance of the model. The used dataset, characterized by highly imbalanced distribution, is oversampled with SMOTE method to generate synthetic minority class instances and provide experiments. Performance metrics are evaluated and future research directives are proposed.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127459166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信