2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)最新文献

筛选
英文 中文
IBIGDELFT 2018
Mücadele Kongresi, Telif Hakkı
{"title":"IBIGDELFT 2018","authors":"Mücadele Kongresi, Telif Hakkı","doi":"10.1109/ibigdelft.2018.8625341","DOIUrl":"https://doi.org/10.1109/ibigdelft.2018.8625341","url":null,"abstract":"Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. Copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid throught Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For reprint or republication permission, email to IEEE Copyright Manager at pubs-permission@ieee.org","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114825321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
International Congress on Bigdata Deep Learning and Fighting Cyber Terrorism 大数据、深度学习与打击网络恐怖主义国际大会
Ahmet Kilic, S. Ozdemir, Ilker Ozcelik, R. Erdoğan, Ramazan Terzi, Murat Akin, Bilgehan Arslan, Mehtap Ulker, Baris Bülent Kirlar, Süleyman Demirel, C. Varol, Sam Houston, Ç. Arslan, E. Okamoto, E. Yolacan, Osman Gazi, Fehmi Jafaar, H. Ş. Bilge, I. G. Ozbilgin, R. Erdoğan, H. Sever, M. Kiraz, M. Kaya, Y. Beyazit
{"title":"International Congress on Bigdata Deep Learning and Fighting Cyber Terrorism","authors":"Ahmet Kilic, S. Ozdemir, Ilker Ozcelik, R. Erdoğan, Ramazan Terzi, Murat Akin, Bilgehan Arslan, Mehtap Ulker, Baris Bülent Kirlar, Süleyman Demirel, C. Varol, Sam Houston, Ç. Arslan, E. Okamoto, E. Yolacan, Osman Gazi, Fehmi Jafaar, H. Ş. Bilge, I. G. Ozbilgin, R. Erdoğan, H. Sever, M. Kiraz, M. Kaya, Y. Beyazit","doi":"10.1109/ibigdelft.2018.8625348","DOIUrl":"https://doi.org/10.1109/ibigdelft.2018.8625348","url":null,"abstract":"International Congress on Bigdata Deep Learning and Fighting Cyber Terrorism","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131718538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Security Information and Event Management Systems for Custom Security Visualization Generation 自定义安全可视化生成的安全信息评估和事件管理系统
Ferda Özdemir Sönmez, B. Gunel
{"title":"Evaluation of Security Information and Event Management Systems for Custom Security Visualization Generation","authors":"Ferda Özdemir Sönmez, B. Gunel","doi":"10.1109/ibigdelft.2018.8625291","DOIUrl":"https://doi.org/10.1109/ibigdelft.2018.8625291","url":null,"abstract":"Security Information and Event Management Systems (SIEM) are generally very complex systems encapsulating a large number of functions with different behaviors. Visualization is a common way of data presentation in these systems along with other data presentation ways such as reporting, alerting, text messaging. However, generation of the visualization has different steps. If the data is in a custom format, rather than a predefined format which either obeys a standard or a known file structure, the generation of custom visualizations may not be straightforward. Evaluation information for these tools related to custom visualization generation capabilities may be useful for better decision making. This information can be used while designing visualizations through SIEM systems or purchasing the most useful SIEM system for an organization. In this study, six well-known SIEM systems are evaluated through a common scenario created by the authors to check custom visualization generation capabilities. The contributions include this unique scenario and the advantages and disadvantages regarding various steps of the provided scenario along with the difficulties experienced by the authors during the installation and configuration of these SIEM systems.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114498498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Steganography Application for UTF8 Encoded Texts UTF8编码文本的隐写应用
Cihan Yakar, S. Ozdemir
{"title":"Steganography Application for UTF8 Encoded Texts","authors":"Cihan Yakar, S. Ozdemir","doi":"10.1109/IBIGDELFT.2018.8625308","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625308","url":null,"abstract":"Encryption is the most common method used to protect the texts from being read by the individuals or systems other than the sender and receiver. In encrypted communication, third parties and supervisors can easily realize that a closed information is transmitted. Although this content cannot be resolved immediately, it can be marked as suspicious. Closed text can also be protected by using a hidden method instead of using an encryption method. The hidden text could be attributed “innocent” without notice by the third parties or systems. Recognizing the hidden text will become more difficult when it is included in everyday conversations. In this study, the work of hiding another text within a text encoded in the UTF-8 standard has been made for everyday communication applications. The method used in the study has been controlled by using instant messaging softwares which are widely used.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126142156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Awareness Qualification Level Measurement Model 认知资格水平测量模型
Salih Erdem Erol, Ş. Sağiroğlu
{"title":"Awareness Qualification Level Measurement Model","authors":"Salih Erdem Erol, Ş. Sağiroğlu","doi":"10.1109/IBIGDELFT.2018.8625305","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625305","url":null,"abstract":"To be able to talk about effective information security against all types of attacks, from a simple cyber attack to cyber terrorism and even cyber warfare, awareness must be defined as a problem, not a solution. To solve this problem “You can not manage what you can not measure!” point of view must be the starting point. Information security problem can be solved if security awareness level can be measured accurately and raising the awareness level according to the measurements. After studies in the literature are examined, it is seen that there is no dynamic model for measuring the cyber security awareness, score based leveling, survey and focus area based approaches are used, measurements are made for certain levels/groups and do not have a certain leveling standardization. In this study, a “capability based dynamic model” has been proposed for the first time in order to measure awareness level. It is seen that the proposed model is superior to the models in literature by these specifications; designed in a stepped structure with leveling standardization, applicable to all groups/levels and capability based approach used. It is considered that the developed model will contribute to the increase of cyber security awareness.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123937371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Technical Analysis on Financial Time Series Data Based on Map-Reduce Programming Model: A Case Study 基于Map-Reduce规划模型的金融时间序列数据技术分析
Yasin Uygun, Mehmet Onur Erboy, M. Aktaş, O. Kalipsiz, Ishak Aykurt
{"title":"Technical Analysis on Financial Time Series Data Based on Map-Reduce Programming Model: A Case Study","authors":"Yasin Uygun, Mehmet Onur Erboy, M. Aktaş, O. Kalipsiz, Ishak Aykurt","doi":"10.1109/IBIGDELFT.2018.8625357","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625357","url":null,"abstract":"Technical analysis is a widely used method for forecasting the price direction on the financial time series data. This method requires the use of different number and types of analysis algorithms (technical indicators) together. Although these algorithms show successful performance on small-scalefinancial time series data, significant performance decreases are detected when the size of data increased. On the large-scale financial time series data, it is necessary to implement these algorithms based on the Map-Reduce programming model and examine the performance of the algorithms which are implemented based on this model comparatively. For this purpose, seven different indicators are studied within the scope of this study, new versions of these indicators are implemented using Map-Reduce parallel data processing model and performance comparisons are made with these algorithms. As a result of these comparisons on single-node and multi-node, significant performance gains have been obtained using Map-Reduce programming model.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122657052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Generating MDS Matrices in Toeplitz Form by Using Generalised Hadamard Form 用广义Hadamard形式生成Toeplitz形式的MDS矩阵
M. K. Pehlivanoglu, S. Akleylek, M. T. Sakalli, N. Duru
{"title":"Generating MDS Matrices in Toeplitz Form by Using Generalised Hadamard Form","authors":"M. K. Pehlivanoglu, S. Akleylek, M. T. Sakalli, N. Duru","doi":"10.1109/IBIGDELFT.2018.8625280","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625280","url":null,"abstract":"In this paper, hardware efficient diffusion layers are generated. Non-involutory and new 8×8 MDS matrices over GF(28) with the best-known XOR counts are constructed by using a new matrix form, which is developed by circulant matrix form and the idea used in developing Generalised Hadamard (GHadamard) matrix form. Then, it is shown that the proposed matrix form is a subset of Toeplitz matrix form.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123184170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信